* tar xzf utvpn-src-unix-v101-7101-public-2010.06.27.tar.gz
[lab.git] / utvpn / utvpn-unix-v101-7101-public / src / Mayaqua / Encrypt.c
diff --git a/utvpn/utvpn-unix-v101-7101-public/src/Mayaqua/Encrypt.c b/utvpn/utvpn-unix-v101-7101-public/src/Mayaqua/Encrypt.c
new file mode 100644 (file)
index 0000000..864b803
--- /dev/null
@@ -0,0 +1,3545 @@
+// SoftEther UT-VPN SourceCode\r
+// \r
+// Copyright (C) 2004-2010 SoftEther Corporation.\r
+// Copyright (C) 2004-2010 University of Tsukuba, Japan.\r
+// Copyright (C) 2003-2010 Daiyuu Nobori.\r
+// All Rights Reserved.\r
+// \r
+// http://utvpn.tsukuba.ac.jp/\r
+// \r
+// This program is free software; you can redistribute it and/or\r
+// modify it under the terms of the GNU General Public License\r
+// version 2 as published by the Free Software Foundation.\r
+// \r
+// This program is distributed in the hope that it will be useful,\r
+// but WITHOUT ANY WARRANTY; without even the implied warranty of\r
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\r
+// GNU General Public License for more details.\r
+// \r
+// You should have received a copy of the GNU General Public License version 2\r
+// along with this program; if not, write to the Free Software\r
+// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.\r
+// \r
+// このファイルは GPL バージョン 2 ライセンスで公開されています。\r
+// 誰でもこのファイルの内容を複製、改変したり、改変したバージョンを再配布\r
+// することができます。ただし、原著作物を改変した場合は、原著作物の著作権表示\r
+// を除去することはできません。改変した著作物を配布する場合は、改変実施者の\r
+// 著作権表示を原著作物の著作権表示に付随して記載するようにしてください。\r
+// \r
+// この SoftEther UT-VPN オープンソース・プロジェクトは、日本国の\r
+// ソフトイーサ株式会社 (SoftEther Corporation, http://www.softether.co.jp/ )\r
+// および筑波大学 (University of Tsukuba, http://www.tsukuba.ac.jp/ ) によって\r
+// ホストされています。\r
+// 本プログラムの配布者は、本プログラムを、業としての利用以外のため、\r
+// および、試験または研究のために利用が行われることを想定して配布\r
+// しています。\r
+// SoftEther UT-VPN プロジェクトの Web サイトは http://utvpn.tsukuba.ac.jp/ に\r
+// あります。\r
+// 本ソフトウェアの不具合の修正、機能改良、セキュリティホールの修復などのコード\r
+// の改変を行った場合で、その成果物を SoftEther UT-VPN プロジェクトに提出して\r
+// いただける場合は、 http://utvpn.tsukuba.ac.jp/ までソースコードを送付して\r
+// ください。SoftEther UT-VPN プロジェクトの本体リリースまたはブランチリリース\r
+// に組み込みさせていただきます。\r
+// \r
+// GPL に基づいて原著作物が提供される本ソフトウェアの改良版を配布、販売する\r
+// 場合は、そのソースコードを GPL に基づいて誰にでも開示する義務が生じます。\r
+// \r
+// 本ソフトウェアに関連する著作権、特許権、商標権はソフトイーサ株式会社\r
+// (SoftEther Corporation) およびその他の著作権保持者が保有しています。\r
+// ソフトイーサ株式会社等はこれらの権利を放棄していません。本ソフトウェアの\r
+// 二次著作物を配布、販売する場合は、これらの権利を侵害しないようにご注意\r
+// ください。\r
+// \r
+// お願い: どのような通信ソフトウェアにも通常は必ず未発見の\r
+// セキュリティホールが潜んでいます。本ソースコードをご覧いただいた結果、\r
+// UT-VPN にセキュリティホールを発見された場合は、当該セキュリティホールの\r
+// 情報を不特定多数に開示される前に、必ず、ソフトイーサ株式会社\r
+// および脆弱性情報の届出を受け付ける公的機関まで通報いただき、\r
+// 公益保護にご協力いただきますようお願い申し上げます。\r
+// \r
+// ソフトイーサ株式会社は、当該セキュリティホールについて迅速に対処を\r
+// 行い、UT-VPN および UT-VPN に関連するソフトウェアのユーザー・顧客\r
+// を保護するための努力を行います。\r
+// \r
+// ソフトイーサへの届出先: http://www.softether.co.jp/jp/contact/\r
+// 日本国内の脆弱性情報届出受付公的機関:\r
+//         独立行政法人 情報処理推進機構\r
+//         http://www.ipa.go.jp/security/vuln/report/\r
+// \r
+// 上記各事項について不明な点は、ソフトイーサ株式会社までご連絡ください。\r
+// 連絡先: http://www.softether.co.jp/jp/contact/\r
+\r
+// -----------------------------------------------\r
+// [ChangeLog]\r
+// 2010.05.20\r
+//  新規リリース by SoftEther\r
+// -----------------------------------------------\r
+\r
+// Encrypt.c\r
+// 暗号化および電子証明書ルーチン\r
+\r
+#define        ENCRYPT_C\r
+\r
+#define        __WINCRYPT_H__\r
+\r
+#include <stdio.h>\r
+#include <stdlib.h>\r
+#include <string.h>\r
+#include <wchar.h>\r
+#include <stdarg.h>\r
+#include <time.h>\r
+#include <errno.h>\r
+#include <openssl/ssl.h>\r
+#include <openssl/err.h>\r
+#include <openssl/rand.h>\r
+#include <openssl/engine.h>\r
+#include <openssl/bio.h>\r
+#include <openssl/x509.h>\r
+#include <openssl/pkcs7.h>\r
+#include <openssl/pkcs12.h>\r
+#include <openssl/rc4.h>\r
+#include <openssl/md5.h>\r
+#include <openssl/sha.h>\r
+#include <Mayaqua/Mayaqua.h>\r
+\r
+LOCK *openssl_lock = NULL;\r
+\r
+LOCK **ssl_lock_obj = NULL;\r
+UINT ssl_lock_num;\r
+static bool openssl_inited = false;\r
+\r
+// コールバック関数用\r
+typedef struct CB_PARAM\r
+{\r
+       char *password;\r
+} CB_PARAM;\r
+\r
+// 証明書が特定のディレクトリの CRL によって無効化されているかどうか確認する\r
+bool IsXRevoked(X *x)\r
+{\r
+       char dirname[MAX_PATH];\r
+       UINT i;\r
+       bool ret = false;\r
+       DIRLIST *t;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       GetExeDir(dirname, sizeof(dirname));\r
+\r
+       // CRL ファイルの検索\r
+       t = EnumDir(dirname);\r
+\r
+       for (i = 0;i < t->NumFiles;i++)\r
+       {\r
+               char *name = t->File[i]->FileName;\r
+               if (t->File[i]->Folder == false)\r
+               {\r
+                       if (EndWith(name, ".crl"))\r
+                       {\r
+                               char filename[MAX_PATH];\r
+                               X_CRL *r;\r
+\r
+                               ConbinePath(filename, sizeof(filename), dirname, name);\r
+\r
+                               r = FileToXCrl(filename);\r
+\r
+                               if (r != NULL)\r
+                               {\r
+                                       if (IsXRevokedByXCrl(x, r))\r
+                                       {\r
+                                               ret = true;\r
+                                       }\r
+\r
+                                       FreeXCrl(r);\r
+                               }\r
+                       }\r
+               }\r
+       }\r
+\r
+       FreeDir(t);\r
+\r
+       return ret;\r
+}\r
+\r
+// 証明書が CRL によって無効化されているかどうか確認する\r
+bool IsXRevokedByXCrl(X *x, X_CRL *r)\r
+{\r
+#ifdef OS_WIN32\r
+       X509_REVOKED tmp;\r
+       X509_CRL_INFO *info;\r
+       int index;\r
+       // 引数チェック\r
+       if (x == NULL || r == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Zero(&tmp, sizeof(tmp));\r
+       tmp.serialNumber = X509_get_serialNumber(x->x509);\r
+\r
+       info = r->Crl->crl;\r
+\r
+       if (sk_X509_REVOKED_is_sorted(info->revoked) == false)\r
+       {\r
+               sk_X509_REVOKED_sort(info->revoked);\r
+       }\r
+\r
+       index = sk_X509_REVOKED_find(info->revoked, &tmp);\r
+\r
+       if (index < 0)\r
+       {\r
+               return false;\r
+       }\r
+       else\r
+       {\r
+               return true;\r
+       }\r
+#else  // OS_WIN32\r
+       return false;\r
+#endif // OS_WIN32\r
+}\r
+\r
+// CRL の解放\r
+void FreeXCrl(X_CRL *r)\r
+{\r
+       // 引数チェック\r
+       if (r == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       X509_CRL_free(r->Crl);\r
+\r
+       Free(r);\r
+}\r
+\r
+// ファイルを CRL に変換\r
+X_CRL *FileToXCrl(char *filename)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       X_CRL *ret = FileToXCrlW(filename_w);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+X_CRL *FileToXCrlW(wchar_t *filename)\r
+{\r
+       BUF *b;\r
+       X_CRL *r;\r
+       // 引数チェック\r
+       if (filename == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = ReadDumpW(filename);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       r = BufToXCrl(b);\r
+\r
+       FreeBuf(b);\r
+\r
+       return r;\r
+}\r
+\r
+// バッファを CRL に変換\r
+X_CRL *BufToXCrl(BUF *b)\r
+{\r
+       X_CRL *r;\r
+       X509_CRL *x509crl;\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = BufToBio(b);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x509crl = NULL;\r
+\r
+       if (d2i_X509_CRL_bio(bio, &x509crl) == NULL || x509crl == NULL)\r
+       {\r
+               FreeBio(bio);\r
+               return NULL;\r
+       }\r
+\r
+       r = ZeroMalloc(sizeof(X_CRL));\r
+       r->Crl = x509crl;\r
+\r
+       FreeBio(bio);\r
+\r
+       return r;\r
+}\r
+\r
+// バッファを公開鍵に変換\r
+K *RsaBinToPublic(void *data, UINT size)\r
+{\r
+       RSA *rsa;\r
+       K *k;\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (data == NULL || size < 4)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       rsa = RSA_new();\r
+\r
+       if (rsa->e != NULL)\r
+       {\r
+               BN_free(rsa->e);\r
+       }\r
+\r
+       rsa->e = BN_new();\r
+       BN_set_word(rsa->e, RSA_F4);\r
+\r
+       if (rsa->n != NULL)\r
+       {\r
+               BN_free(rsa->n);\r
+       }\r
+\r
+       rsa->n = BinToBigNum(data, size);\r
+\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_RSA_PUBKEY_bio(bio, rsa);\r
+       }\r
+       Unlock(openssl_lock);\r
+       BIO_seek(bio, 0);\r
+       k = BioToK(bio, false, false, NULL);\r
+       FreeBio(bio);\r
+\r
+       RSA_free(rsa);\r
+\r
+       return k;\r
+}\r
+\r
+// 公開鍵をバッファに変換\r
+BUF *RsaPublicToBuf(K *k)\r
+{\r
+       BUF *b;\r
+       // 引数チェック\r
+       if (k == NULL || k->pkey == NULL || k->pkey->pkey.rsa == NULL\r
+               || k->pkey->pkey.rsa->n == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = BigNumToBuf(k->pkey->pkey.rsa->n);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       return b;\r
+}\r
+\r
+// 公開鍵をバイナリに変換\r
+void RsaPublicToBin(K *k, void *data)\r
+{\r
+       BUF *b;\r
+       // 引数チェック\r
+       if (k == NULL || k->pkey == NULL || k->pkey->pkey.rsa == NULL\r
+               || k->pkey->pkey.rsa->n == NULL || data == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       b = BigNumToBuf(k->pkey->pkey.rsa->n);\r
+       if (b == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       Copy(data, b->Buf, b->Size);\r
+\r
+       FreeBuf(b);\r
+}\r
+\r
+// 公開鍵サイズの取得\r
+UINT RsaPublicSize(K *k)\r
+{\r
+       BUF *b;\r
+       UINT ret;\r
+       // 引数チェック\r
+       if (k == NULL || k->pkey == NULL || k->pkey->pkey.rsa == NULL\r
+               || k->pkey->pkey.rsa->n == NULL)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       b = BigNumToBuf(k->pkey->pkey.rsa->n);\r
+       if (b == NULL)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       ret = b->Size;\r
+\r
+       FreeBuf(b);\r
+\r
+       return ret;\r
+}\r
+\r
+// ポインタを 32 ビットにハッシュする\r
+UINT HashPtrToUINT(void *p)\r
+{\r
+       UCHAR hash_data[MD5_SIZE];\r
+       UINT ret;\r
+       // 引数チェック\r
+       if (p == NULL)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       Hash(hash_data, &p, sizeof(p), false);\r
+\r
+       Copy(&ret, hash_data, sizeof(ret));\r
+\r
+       return ret;\r
+}\r
+\r
+// NAME のコピー\r
+NAME *CopyName(NAME *n)\r
+{\r
+       // 引数チェック\r
+       if (n == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       return NewName(n->CommonName, n->Organization, n->Unit,\r
+               n->Country, n->State, n->Local);\r
+}\r
+\r
+// バイナリを BIGNUM に変換\r
+BIGNUM *BinToBigNum(void *data, UINT size)\r
+{\r
+       BIGNUM *bn;\r
+       // 引数チェック\r
+       if (data == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bn = BN_new();\r
+       BN_bin2bn(data, size, bn);\r
+\r
+       return bn;\r
+}\r
+\r
+// バッファを BIGNUM に変換\r
+BIGNUM *BufToBigNum(BUF *b)\r
+{\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       return BinToBigNum(b->Buf, b->Size);\r
+}\r
+\r
+// BIGNUM をバッファに変換\r
+BUF *BigNumToBuf(BIGNUM *bn)\r
+{\r
+       UINT size;\r
+       UCHAR *tmp;\r
+       BUF *b;\r
+       // 引数チェック\r
+       if (bn == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       size = BN_num_bytes(bn);\r
+       tmp = ZeroMalloc(size);\r
+       BN_bn2bin(bn, tmp);\r
+\r
+       b = NewBuf();\r
+       WriteBuf(b, tmp, size);\r
+       Free(tmp);\r
+\r
+       SeekBuf(b, 0, 0);\r
+\r
+       return b;\r
+}\r
+\r
+// OpenSSL のロックの初期化\r
+void OpenSSL_InitLock()\r
+{\r
+       UINT i;\r
+\r
+       // ロックオブジェクトの初期化\r
+       ssl_lock_num = CRYPTO_num_locks();\r
+       ssl_lock_obj = Malloc(sizeof(LOCK *) * ssl_lock_num);\r
+       for (i = 0;i < ssl_lock_num;i++)\r
+       {\r
+               ssl_lock_obj[i] = NewLock();\r
+       }\r
+\r
+       // ロック関数の設定\r
+       CRYPTO_set_locking_callback(OpenSSL_Lock);\r
+       CRYPTO_set_id_callback(OpenSSL_Id);\r
+}\r
+\r
+// OpenSSL のロックの解放\r
+void OpenSSL_FreeLock()\r
+{\r
+       UINT i;\r
+\r
+       for (i = 0;i < ssl_lock_num;i++)\r
+       {\r
+               DeleteLock(ssl_lock_obj[i]);\r
+       }\r
+       Free(ssl_lock_obj);\r
+       ssl_lock_obj = NULL;\r
+\r
+       CRYPTO_set_locking_callback(NULL);\r
+       CRYPTO_set_id_callback(NULL);\r
+}\r
+\r
+// OpenSSL のロック関数\r
+void OpenSSL_Lock(int mode, int n, const char *file, int line)\r
+{\r
+       LOCK *lock = ssl_lock_obj[n];\r
+\r
+       if (mode & CRYPTO_LOCK)\r
+       {\r
+               // ロック\r
+               Lock(lock);\r
+       }\r
+       else\r
+       {\r
+               // ロック解除\r
+               Unlock(lock);\r
+       }\r
+}\r
+\r
+// スレッド ID の返却\r
+unsigned long OpenSSL_Id(void)\r
+{\r
+       return (unsigned long)ThreadId();\r
+}\r
+\r
+// 証明書の表示名を取得\r
+void GetPrintNameFromX(wchar_t *str, UINT size, X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL || str == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetPrintNameFromName(str, size, x->subject_name);\r
+}\r
+void GetPrintNameFromXA(char *str, UINT size, X *x)\r
+{\r
+       wchar_t tmp[MAX_SIZE];\r
+       // 引数チェック\r
+       if (str == NULL || x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetPrintNameFromX(tmp, sizeof(tmp), x);\r
+\r
+       UniToStr(str, size, tmp);\r
+}\r
+void GetAllNameFromXEx(wchar_t *str, UINT size, X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL || str == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetAllNameFromNameEx(str, size, x->subject_name);\r
+}\r
+void GetAllNameFromXExA(char *str, UINT size, X *x)\r
+{\r
+       wchar_t tmp[MAX_SIZE];\r
+       // 引数チェック\r
+       if (str == NULL || x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetAllNameFromXEx(tmp, sizeof(tmp), x);\r
+\r
+       UniToStr(str, size, tmp);\r
+}\r
+\r
+// NAME から表示名を取得\r
+void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name)\r
+{\r
+       // 引数チェック\r
+       if (str == NULL || name == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       if (name->CommonName != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->CommonName);\r
+       }\r
+       else if (name->Organization != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->Organization);\r
+       }\r
+       else if (name->Unit != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->Unit);\r
+       }\r
+       else if (name->State != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->State);\r
+       }\r
+       else if (name->Local != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->Local);\r
+       }\r
+       else if (name->Country != NULL)\r
+       {\r
+               UniStrCpy(str, size, name->Country);\r
+       }\r
+       else\r
+       {\r
+               UniStrCpy(str, size, L"untitled");\r
+       }\r
+}\r
+\r
+// 証明書からすべての名前文字列を取得\r
+void GetAllNameFromX(wchar_t *str, UINT size, X *x)\r
+{\r
+       UCHAR md5[MD5_SIZE], sha1[SHA1_SIZE];\r
+       char tmp1[MD5_SIZE * 3 + 8], tmp2[SHA1_SIZE * 3 + 8];\r
+       wchar_t tmp3[sizeof(tmp1) + sizeof(tmp2) + 64];\r
+       // 引数チェック\r
+       if (str == NULL || x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetAllNameFromName(str, size, x->subject_name);\r
+\r
+       if (x->serial != NULL && x->serial->size >= 1)\r
+       {\r
+               char tmp[128];\r
+               wchar_t tmp2[128];\r
+\r
+               BinToStr(tmp, sizeof(tmp), x->serial->data, x->serial->size);\r
+               UniFormat(tmp2, sizeof(tmp2), L", SERIAL=\"%S\"", tmp);\r
+\r
+               UniStrCat(str, size, tmp2);\r
+       }\r
+\r
+       // ダイジェスト値\r
+       GetXDigest(x, md5, false);\r
+       GetXDigest(x, sha1, true);\r
+\r
+       BinToStr(tmp1, sizeof(tmp1), md5, MD5_SIZE);\r
+       BinToStr(tmp2, sizeof(tmp2), sha1, SHA1_SIZE);\r
+\r
+       UniFormat(tmp3, sizeof(tmp3), L" (Digest: MD5=\"%S\", SHA1=\"%S\")", tmp1, tmp2);\r
+       UniStrCat(str, size, tmp3);\r
+}\r
+void GetAllNameFromA(char *str, UINT size, X *x)\r
+{\r
+       wchar_t tmp[MAX_SIZE];\r
+       // 引数チェック\r
+       if (str == NULL || x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       GetAllNameFromX(tmp, sizeof(tmp), x);\r
+       UniToStr(str, size, tmp);\r
+}\r
+\r
+// NAME からすべての名前文字列を取得\r
+void GetAllNameFromName(wchar_t *str, UINT size, NAME *name)\r
+{\r
+       // 引数チェック\r
+       if (str == NULL || name == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       UniStrCpy(str, size, L"");\r
+       if (name->CommonName != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sCN=%s, ", str, name->CommonName);\r
+       }\r
+       if (name->Organization != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sO=%s, ", str, name->Organization);\r
+       }\r
+       if (name->Unit != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sOU=%s, ", str, name->Unit);\r
+       }\r
+       if (name->State != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sS=%s, ", str, name->State);\r
+       }\r
+       if (name->Local != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sL=%s, ", str, name->Local);\r
+       }\r
+       if (name->Country != NULL)\r
+       {\r
+               UniFormat(str, size, L"%sC=%s, ", str, name->Country);\r
+       }\r
+\r
+       if (UniStrLen(str) >= 3)\r
+       {\r
+               UINT len = UniStrLen(str);\r
+               if (str[len - 2] == L',' &&\r
+                       str[len - 1] == L' ')\r
+               {\r
+                       str[len - 2] = 0;\r
+               }\r
+       }\r
+}\r
+void GetAllNameFromNameEx(wchar_t *str, UINT size, NAME *name)\r
+{\r
+       // 引数チェック\r
+       if (str == NULL || name == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       UniStrCpy(str, size, L"");\r
+       if (name->CommonName != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->CommonName);\r
+       }\r
+       if (name->Organization != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->Organization);\r
+       }\r
+       if (name->Unit != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->Unit);\r
+       }\r
+       if (name->State != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->State);\r
+       }\r
+       if (name->Local != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->Local);\r
+       }\r
+       if (name->Country != NULL)\r
+       {\r
+               UniFormat(str, size, L"%s%s, ", str, name->Country);\r
+       }\r
+\r
+       if (UniStrLen(str) >= 3)\r
+       {\r
+               UINT len = UniStrLen(str);\r
+               if (str[len - 2] == L',' &&\r
+                       str[len - 1] == L' ')\r
+               {\r
+                       str[len - 2] = 0;\r
+               }\r
+       }\r
+}\r
+\r
+// 鍵のクローン\r
+K *CloneK(K *k)\r
+{\r
+       BUF *b;\r
+       K *ret;\r
+       // 引数チェック\r
+       if (k == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = KToBuf(k, false, NULL);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       ret = BufToK(b, k->private_key, false, NULL);\r
+       FreeBuf(b);\r
+\r
+       return ret;\r
+}\r
+\r
+// 証明書のクローン\r
+X *CloneX(X *x)\r
+{\r
+       BUF *b;\r
+       X *ret;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = XToBuf(x, false);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       ret = BufToX(b, false);\r
+       FreeBuf(b);\r
+\r
+       return ret;\r
+}\r
+\r
+// P12 を生成する\r
+P12 *NewP12(X *x, K *k, char *password)\r
+{\r
+       PKCS12 *pkcs12;\r
+       P12 *p12;\r
+       // 引数チェック\r
+       if (x == NULL || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+       if (password && StrLen(password) == 0)\r
+       {\r
+               password = NULL;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               pkcs12 = PKCS12_create(password, NULL, k->pkey, x->x509, NULL, 0, 0, 0, 0, 0);\r
+               if (pkcs12 == NULL)\r
+               {\r
+                       Unlock(openssl_lock);\r
+                       return NULL;\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       p12 = PKCS12ToP12(pkcs12);\r
+\r
+       return p12;\r
+}\r
+\r
+// P12 が暗号化されているかどうかチェックする\r
+bool IsEncryptedP12(P12 *p12)\r
+{\r
+       X *x;\r
+       K *k;\r
+       // 引数チェック\r
+       if (p12 == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (ParseP12(p12, &x, &k, NULL) == true)\r
+       {\r
+               FreeX(x);\r
+               FreeK(k);\r
+               return false;\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// P12 から X と K を取り出す\r
+bool ParseP12(P12 *p12, X **x, K **k, char *password)\r
+{\r
+       EVP_PKEY *pkey;\r
+       X509 *x509;\r
+       // 引数チェック\r
+       if (p12 == NULL || x == NULL || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+       if (password && StrLen(password) == 0)\r
+       {\r
+               password = NULL;\r
+       }\r
+       if (password == NULL)\r
+       {\r
+               password = "";\r
+       }\r
+\r
+       // パスワード確認\r
+       Lock(openssl_lock);\r
+       {\r
+               if (PKCS12_verify_mac(p12->pkcs12, password, -1) == false &&\r
+                       PKCS12_verify_mac(p12->pkcs12, NULL, -1) == false)\r
+               {\r
+                       Unlock(openssl_lock);\r
+                       return false;\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       // 抽出\r
+       Lock(openssl_lock);\r
+       {\r
+               if (PKCS12_parse(p12->pkcs12, password, &pkey, &x509, NULL) == false)\r
+               {\r
+                       if (PKCS12_parse(p12->pkcs12, NULL, &pkey, &x509, NULL) == false)\r
+                       {\r
+                               Unlock(openssl_lock);\r
+                               return false;\r
+                       }\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       // 変換\r
+       *x = X509ToX(x509);\r
+\r
+       if (*x == NULL)\r
+       {\r
+               FreePKey(pkey);\r
+               return false;\r
+       }\r
+\r
+       *k = ZeroMalloc(sizeof(K));\r
+       (*k)->private_key = true;\r
+       (*k)->pkey = pkey;\r
+\r
+       return true;\r
+}\r
+\r
+// P12 をファイルに書き出す\r
+bool P12ToFile(P12 *p12, char *filename)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       bool ret = P12ToFileW(p12, filename_w);\r
+\r
+       return ret;\r
+}\r
+bool P12ToFileW(P12 *p12, wchar_t *filename)\r
+{\r
+       BUF *b;\r
+       // 引数チェック\r
+       if (p12 == NULL || filename == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       b = P12ToBuf(p12);\r
+       if (b == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (DumpBufW(b, filename) == false)\r
+       {\r
+               FreeBuf(b);\r
+               return false;\r
+       }\r
+\r
+       FreeBuf(b);\r
+\r
+       return true;\r
+}\r
+\r
+// ファイルから P12 を読み込む\r
+P12 *FileToP12(char *filename)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       P12 *ret = FileToP12W(filename_w);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+P12 *FileToP12W(wchar_t *filename)\r
+{\r
+       BUF *b;\r
+       P12 *p12;\r
+       // 引数チェック\r
+       if (filename == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = ReadDumpW(filename);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       p12 = BufToP12(b);\r
+       FreeBuf(b);\r
+\r
+       return p12;\r
+}\r
+\r
+// P12 の解放\r
+void FreeP12(P12 *p12)\r
+{\r
+       // 引数チェック\r
+       if (p12 == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       FreePKCS12(p12->pkcs12);\r
+       Free(p12);\r
+}\r
+\r
+// PKCS12 の解放\r
+void FreePKCS12(PKCS12 *pkcs12)\r
+{\r
+       // 引数チェック\r
+       if (pkcs12 == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       PKCS12_free(pkcs12);\r
+}\r
+\r
+// P12 を BUF に変換する\r
+BUF *P12ToBuf(P12 *p12)\r
+{\r
+       BIO *bio;\r
+       BUF *buf;\r
+       // 引数チェック\r
+       if (p12 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = P12ToBio(p12);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       buf = BioToBuf(bio);\r
+       FreeBio(bio);\r
+\r
+       SeekBuf(buf, 0, 0);\r
+\r
+       return buf;\r
+}\r
+\r
+// P12 を BIO に変換する\r
+BIO *P12ToBio(P12 *p12)\r
+{\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (p12 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_PKCS12_bio(bio, p12->pkcs12);\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       return bio;\r
+}\r
+\r
+// BUF から P12 を読み込む\r
+P12 *BufToP12(BUF *b)\r
+{\r
+       P12 *p12;\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = BufToBio(b);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       p12 = BioToP12(bio);\r
+       FreeBio(bio);\r
+\r
+       return p12;\r
+}\r
+\r
+// BIO から P12 を読み込む\r
+P12 *BioToP12(BIO *bio)\r
+{\r
+       PKCS12 *pkcs12;\r
+       // 引数チェック\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       // 変換\r
+       Lock(openssl_lock);\r
+       {\r
+               pkcs12 = d2i_PKCS12_bio(bio, NULL);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (pkcs12 == NULL)\r
+       {\r
+               // 失敗\r
+               return NULL;\r
+       }\r
+\r
+       return PKCS12ToP12(pkcs12);\r
+}\r
+\r
+// PKCS12 から P12 を生成する\r
+P12 *PKCS12ToP12(PKCS12 *pkcs12)\r
+{\r
+       P12 *p12;\r
+       // 引数チェック\r
+       if (pkcs12 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       p12 = ZeroMalloc(sizeof(P12));\r
+       p12->pkcs12 = pkcs12;\r
+\r
+       return p12;\r
+}\r
+\r
+// バイナリを文字列に変換する\r
+char *ByteToStr(BYTE *src, UINT src_size)\r
+{\r
+       UINT size;\r
+       char *dst;\r
+       UINT i;\r
+       // 引数チェック\r
+       if (src == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       size = MAX(src_size * 3, 1);\r
+       dst = Malloc(size);\r
+       dst[size - 1] = 0;\r
+       for (i = 0;i < src_size;i++)\r
+       {\r
+               char tmp[3];\r
+               Format(tmp, sizeof(tmp), "%02x", src[i]);\r
+               dst[i * 3 + 0] = tmp[0];\r
+               dst[i * 3 + 1] = tmp[1];\r
+               dst[i * 3 + 2] = ((i == (src_size - 1) ? 0 : ' '));\r
+       }\r
+\r
+       return dst;\r
+}\r
+\r
+// X_SERIAL の解放\r
+void FreeXSerial(X_SERIAL *serial)\r
+{\r
+       // 引数チェック\r
+       if (serial == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       Free(serial->data);\r
+       Free(serial);\r
+}\r
+\r
+// X_SERIAL の比較\r
+bool CompareXSerial(X_SERIAL *s1, X_SERIAL *s2)\r
+{\r
+       // 引数チェック\r
+       if (s1 == NULL || s2 == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (s1->size != s2->size)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (Cmp(s1->data, s2->data, s1->size) != 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// X_SERIAL のコピー\r
+X_SERIAL *CloneXSerial(X_SERIAL *src)\r
+{\r
+       X_SERIAL *s;\r
+       // 引数チェック\r
+       if (src == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       s = ZeroMalloc(sizeof(X_SERIAL));\r
+       s->data = ZeroMalloc(src->size);\r
+       Copy(s->data, src->data, src->size);\r
+       s->size = src->size;\r
+\r
+       return s;\r
+}\r
+\r
+// X_SERIAL の初期化\r
+X_SERIAL *NewXSerial(void *data, UINT size)\r
+{\r
+       X_SERIAL *serial;\r
+       UCHAR *buf = (UCHAR *)data;\r
+       UINT i;\r
+       // 引数チェック\r
+       if (data == NULL || size == 0)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       for (i = 0;i < size;i++)\r
+       {\r
+               if (buf[i] != 0)\r
+               {\r
+                       break;\r
+               }\r
+       }\r
+       if (i == size)\r
+       {\r
+               i = size - 1;\r
+       }\r
+       buf += i;\r
+\r
+       serial = Malloc(sizeof(X_SERIAL));\r
+       serial->size = size - i;\r
+       serial->data = ZeroMalloc(size + 16);\r
+       Copy(serial->data, buf, size - i);\r
+\r
+       return serial;\r
+}\r
+\r
+// 2038 年 1 月 1 日までの日数を取得する\r
+UINT GetDaysUntil2038()\r
+{\r
+       UINT64 now = SystemTime64();\r
+       UINT64 target;\r
+       SYSTEMTIME st;\r
+\r
+       Zero(&st, sizeof(st));\r
+       st.wYear = 2038;\r
+       st.wMonth = 1;\r
+       st.wDay = 1;\r
+\r
+       target = SystemToUINT64(&st);\r
+\r
+       if (now >= target)\r
+       {\r
+               return 0;\r
+       }\r
+       else\r
+       {\r
+               return (UINT)((target - now) / (UINT64)(1000 * 60 * 60 * 24));\r
+       }\r
+}\r
+\r
+// X509 証明書を発行する\r
+X *NewX(K *pub, K *priv, X *ca, NAME *name, UINT days, X_SERIAL *serial)\r
+{\r
+       X509 *x509;\r
+       X *x;\r
+       // 引数チェック\r
+       if (pub == NULL || priv == NULL || name == NULL || ca == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x509 = NewX509(pub, priv, ca, name, days, serial);\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x = X509ToX(x509);\r
+\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       return x;\r
+}\r
+\r
+// ルート証明書を作成する\r
+X *NewRootX(K *pub, K *priv, NAME *name, UINT days, X_SERIAL *serial)\r
+{\r
+       X509 *x509;\r
+       X *x, *x2;\r
+       // 引数チェック\r
+       if (pub == NULL || priv == NULL || name == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x509 = NewRootX509(pub, priv, name, days, serial);\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x = X509ToX(x509);\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x2 = CloneX(x);\r
+       FreeX(x);\r
+\r
+       return x2;\r
+}\r
+\r
+// X509 証明書を発行する\r
+X509 *NewX509(K *pub, K *priv, X *ca, NAME *name, UINT days, X_SERIAL *serial)\r
+{\r
+       X509 *x509;\r
+       UINT64 notBefore, notAfter;\r
+       ASN1_TIME *t1, *t2;\r
+       X509_NAME *subject_name, *issuer_name;\r
+       // 引数チェック\r
+       if (pub == NULL || name == NULL || ca == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+       if (pub->private_key != false)\r
+       {\r
+               return NULL;\r
+       }\r
+       if (priv->private_key == false)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       notBefore = SystemTime64();\r
+       notAfter = notBefore + (UINT64)days * (UINT64)3600 * (UINT64)24 * (UINT64)1000;\r
+\r
+\r
+       // X509 の作成\r
+       x509 = X509_new();\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       // 有効期限の設定\r
+       t1 = X509_get_notBefore(x509);\r
+       t2 = X509_get_notAfter(x509);\r
+       if (!UINT64ToAsn1Time(t1, notBefore))\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+       if (!UINT64ToAsn1Time(t2, notAfter))\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+\r
+       // 名前の設定\r
+       subject_name = NameToX509Name(name);\r
+       if (subject_name == NULL)\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+       issuer_name = X509_get_subject_name(ca->x509);\r
+       if (issuer_name == NULL)\r
+       {\r
+               FreeX509Name(subject_name);\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+\r
+       X509_set_issuer_name(x509, issuer_name);\r
+       X509_set_subject_name(x509, subject_name);\r
+\r
+       FreeX509Name(subject_name);\r
+\r
+       // シリアル番号の設定\r
+       if (serial == NULL)\r
+       {\r
+               char zero = 0;\r
+               ASN1_INTEGER *s = x509->cert_info->serialNumber;\r
+               OPENSSL_free(s->data);\r
+               s->data = OPENSSL_malloc(sizeof(char));\r
+               Copy(s->data, &zero, sizeof(char));\r
+               s->length = sizeof(char);\r
+       }\r
+       else\r
+       {\r
+               ASN1_INTEGER *s = x509->cert_info->serialNumber;\r
+               OPENSSL_free(s->data);\r
+               s->data = OPENSSL_malloc(serial->size);\r
+               Copy(s->data, serial->data, serial->size);\r
+               s->length = serial->size;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               // 公開鍵の設定\r
+               X509_set_pubkey(x509, pub->pkey);\r
+\r
+               // 署名\r
+               X509_sign(x509, priv->pkey, EVP_sha1());\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       return x509;\r
+}\r
+\r
+// ルート X509 証明書を作成する\r
+X509 *NewRootX509(K *pub, K *priv, NAME *name, UINT days, X_SERIAL *serial)\r
+{\r
+       X509 *x509;\r
+       UINT64 notBefore, notAfter;\r
+       ASN1_TIME *t1, *t2;\r
+       X509_NAME *subject_name, *issuer_name;\r
+       // 引数チェック\r
+       if (pub == NULL || name == NULL || priv == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+       if (days == 0)\r
+       {\r
+               days = 365;\r
+       }\r
+       if (priv->private_key == false)\r
+       {\r
+               return NULL;\r
+       }\r
+       if (pub->private_key != false)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       notBefore = SystemTime64();\r
+       notAfter = notBefore + (UINT64)days * (UINT64)3600 * (UINT64)24 * (UINT64)1000;\r
+\r
+       // X509 の作成\r
+       x509 = X509_new();\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       // 有効期限の設定\r
+       t1 = X509_get_notBefore(x509);\r
+       t2 = X509_get_notAfter(x509);\r
+       if (!UINT64ToAsn1Time(t1, notBefore))\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+       if (!UINT64ToAsn1Time(t2, notAfter))\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+\r
+       // 名前の設定\r
+       subject_name = NameToX509Name(name);\r
+       if (subject_name == NULL)\r
+       {\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+       issuer_name = NameToX509Name(name);\r
+       if (issuer_name == NULL)\r
+       {\r
+               FreeX509Name(subject_name);\r
+               FreeX509(x509);\r
+               return NULL;\r
+       }\r
+\r
+       X509_set_issuer_name(x509, issuer_name);\r
+       X509_set_subject_name(x509, subject_name);\r
+\r
+       FreeX509Name(subject_name);\r
+       FreeX509Name(issuer_name);\r
+\r
+       // シリアル番号の設定\r
+       if (serial == NULL)\r
+       {\r
+               char zero = 0;\r
+               ASN1_INTEGER *s = x509->cert_info->serialNumber;\r
+               OPENSSL_free(s->data);\r
+               s->data = OPENSSL_malloc(sizeof(char));\r
+               Copy(s->data, &zero, sizeof(char));\r
+               s->length = sizeof(char);\r
+       }\r
+       else\r
+       {\r
+               ASN1_INTEGER *s = x509->cert_info->serialNumber;\r
+               OPENSSL_free(s->data);\r
+               s->data = OPENSSL_malloc(serial->size);\r
+               Copy(s->data, serial->data, serial->size);\r
+               s->length = serial->size;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               // 公開鍵の設定\r
+               X509_set_pubkey(x509, pub->pkey);\r
+\r
+               // 署名\r
+               X509_sign(x509, priv->pkey, EVP_sha1());\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       return x509;\r
+}\r
+\r
+// NAME を X509_NAME に変換\r
+void *NameToX509Name(NAME *nm)\r
+{\r
+       X509_NAME *xn;\r
+       // 引数チェック\r
+       if (nm == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       xn = X509_NAME_new();\r
+       if (xn == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       // エントリの追加\r
+       AddX509Name(xn, NID_commonName, nm->CommonName);\r
+       AddX509Name(xn, NID_organizationName, nm->Organization);\r
+       AddX509Name(xn, NID_organizationalUnitName, nm->Unit);\r
+       AddX509Name(xn, NID_countryName, nm->Country);\r
+       AddX509Name(xn, NID_stateOrProvinceName, nm->State);\r
+       AddX509Name(xn, NID_localityName, nm->Local);\r
+\r
+       return xn;\r
+}\r
+\r
+// X509_NAME にエントリを追加する\r
+bool AddX509Name(void *xn, int nid, wchar_t *str)\r
+{\r
+       X509_NAME *x509_name;\r
+       UINT utf8_size;\r
+       BYTE *utf8;\r
+       // 引数チェック\r
+       if (xn == NULL || str == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // UTF-8 に変換\r
+       utf8_size = CalcUniToUtf8(str);\r
+       if (utf8_size == 0)\r
+       {\r
+               return false;\r
+       }\r
+       utf8 = ZeroMalloc(utf8_size + 1);\r
+       UniToUtf8(utf8, utf8_size, str);\r
+       utf8[utf8_size] = 0;\r
+\r
+       // 追加\r
+       x509_name = (X509_NAME *)xn;\r
+       Lock(openssl_lock);\r
+       {\r
+               X509_NAME_add_entry_by_NID(x509_name, nid, MBSTRING_ASC, utf8, utf8_size, -1, 0);\r
+       }\r
+       Unlock(openssl_lock);\r
+       Free(utf8);\r
+\r
+       return true;\r
+}\r
+\r
+// X509_NAME を解放\r
+void FreeX509Name(void *xn)\r
+{\r
+       X509_NAME *x509_name;\r
+       // 引数チェック\r
+       if (xn == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       x509_name = (X509_NAME *)xn;\r
+       X509_NAME_free(x509_name);\r
+}\r
+\r
+// NAME の作成\r
+NAME *NewName(wchar_t *common_name, wchar_t *organization, wchar_t *unit,\r
+                         wchar_t *country, wchar_t *state, wchar_t *local)\r
+{\r
+       NAME *nm = ZeroMalloc(sizeof(NAME));\r
+\r
+       if (UniIsEmptyStr(common_name) == false)\r
+       {\r
+               nm->CommonName = CopyUniStr(common_name);\r
+       }\r
+\r
+       if (UniIsEmptyStr(organization) == false)\r
+       {\r
+               nm->Organization = CopyUniStr(organization);\r
+       }\r
+\r
+       if (UniIsEmptyStr(unit) == false)\r
+       {\r
+               nm->Unit = CopyUniStr(unit);\r
+       }\r
+\r
+       if (UniIsEmptyStr(country) == false)\r
+       {\r
+               nm->Country = CopyUniStr(country);\r
+       }\r
+\r
+       if (UniIsEmptyStr(state) == false)\r
+       {\r
+               nm->State = CopyUniStr(state);\r
+       }\r
+\r
+       if (UniIsEmptyStr(local) == false)\r
+       {\r
+               nm->Local = CopyUniStr(local);\r
+       }\r
+\r
+       return nm;\r
+}\r
+\r
+// 証明書の有効期限を現在時刻で確認する\r
+bool CheckXDateNow(X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       return CheckXDate(x, SystemTime64());\r
+}\r
+\r
+// 証明書の有効期限を確認する\r
+bool CheckXDate(X *x, UINT64 current_system_time)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (x->notBefore >= current_system_time || x->notAfter <= current_system_time)\r
+       {\r
+               return false;\r
+       }\r
+       return true;\r
+}\r
+\r
+// 証明書の有効期限情報を読み込む\r
+void LoadXDates(X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       x->notBefore = Asn1TimeToUINT64(x->x509->cert_info->validity->notBefore);\r
+       x->notAfter = Asn1TimeToUINT64(x->x509->cert_info->validity->notAfter);\r
+}\r
+\r
+// 64bit システム時刻を ASN1 時刻に変換する\r
+bool UINT64ToAsn1Time(void *asn1_time, UINT64 t)\r
+{\r
+       SYSTEMTIME st;\r
+       // 引数チェック\r
+       if (asn1_time == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       UINT64ToSystem(&st, t);\r
+       return SystemToAsn1Time(asn1_time, &st);\r
+}\r
+\r
+// システム時刻を ASN1 時刻に変換する\r
+bool SystemToAsn1Time(void *asn1_time, SYSTEMTIME *s)\r
+{\r
+       char tmp[20];\r
+       ASN1_TIME *t;\r
+       // 引数チェック\r
+       if (asn1_time == NULL || s == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (SystemToStr(tmp, sizeof(tmp), s) == false)\r
+       {\r
+               return false;\r
+       }\r
+       t = (ASN1_TIME *)asn1_time;\r
+       if (t->data == NULL || t->length < sizeof(tmp))\r
+       {\r
+               t->data = OPENSSL_malloc(sizeof(tmp));\r
+       }\r
+       StrCpy((char *)t->data, t->length, tmp);\r
+       t->length = StrLen(tmp);\r
+       t->type = V_ASN1_UTCTIME;\r
+\r
+       return true;\r
+}\r
+\r
+// システム時刻を文字列に変換する\r
+bool SystemToStr(char *str, UINT size, SYSTEMTIME *s)\r
+{\r
+       // 引数チェック\r
+       if (str == NULL || s == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Format(str, size, "%02u%02u%02u%02u%02u%02uZ",\r
+               s->wYear % 100, s->wMonth, s->wDay,\r
+               s->wHour, s->wMinute, s->wSecond);\r
+\r
+       return true;\r
+}\r
+\r
+// ASN1 時刻を UINT64 時刻に変換する\r
+UINT64 Asn1TimeToUINT64(void *asn1_time)\r
+{\r
+       SYSTEMTIME st;\r
+       // 引数チェック\r
+       if (asn1_time == NULL)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       if (Asn1TimeToSystem(&st, asn1_time) == false)\r
+       {\r
+               return 0;\r
+       }\r
+       return SystemToUINT64(&st);\r
+}\r
+\r
+// ASN1 時刻をシステム時刻に変換する\r
+bool Asn1TimeToSystem(SYSTEMTIME *s, void *asn1_time)\r
+{\r
+       ASN1_TIME *t;\r
+       // 引数チェック\r
+       if (s == NULL || asn1_time == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       t = (ASN1_TIME *)asn1_time;\r
+       if (StrToSystem(s, (char *)t->data) == false)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       if (t->type == V_ASN1_GENERALIZEDTIME)\r
+       {\r
+               LocalToSystem(s, s);\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// 文字列をシステム時刻に変換する\r
+bool StrToSystem(SYSTEMTIME *s, char *str)\r
+{\r
+       // 引数チェック\r
+       if (s == NULL || str == NULL)\r
+       {\r
+               return false;\r
+       }\r
+       if (StrLen(str) != 13)\r
+       {\r
+               return false;\r
+       }\r
+       if (str[12] != 'Z')\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // 変換\r
+       {\r
+               char year[3] = {str[0], str[1], 0},\r
+                       month[3] = {str[2], str[3], 0},\r
+                       day[3] = {str[4], str[5], 0},\r
+                       hour[3] = {str[6], str[7], 0},\r
+                       minute[3] = {str[8], str[9], 0},\r
+                       second[3] = {str[10], str[11], 0};\r
+               Zero(s, sizeof(SYSTEMTIME));\r
+               s->wYear = ToInt(year);\r
+               if (s->wYear >= 60)\r
+               {\r
+                       s->wYear += 1900;\r
+               }\r
+               else\r
+               {\r
+                       s->wYear += 2000;\r
+               }\r
+               s->wMonth = ToInt(month);\r
+               s->wDay = ToInt(day);\r
+               s->wHour = ToInt(hour);\r
+               s->wMinute = ToInt(minute);\r
+               s->wSecond = ToInt(second);\r
+               NormalizeSystem(s);\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 署名の検査\r
+bool RsaVerify(void *data, UINT data_size, void *sign, K *k)\r
+{\r
+       return RsaVerifyEx(data, data_size, sign, k, 0);\r
+}\r
+bool RsaVerifyEx(void *data, UINT data_size, void *sign, K *k, UINT bits)\r
+{\r
+       UCHAR hash_data[SIGN_HASH_SIZE];\r
+       UCHAR decrypt_data[SIGN_HASH_SIZE];\r
+       // 引数チェック\r
+       if (data == NULL || sign == NULL || k == NULL || k->private_key != false)\r
+       {\r
+               return false;\r
+       }\r
+       if (bits == 0)\r
+       {\r
+               bits = 1024;\r
+       }\r
+\r
+       // データをハッシュ\r
+       if (HashForSign(hash_data, sizeof(hash_data), data, data_size) == false)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // 署名を解読\r
+       if (RSA_public_decrypt(bits / 8, sign, decrypt_data, k->pkey->pkey.rsa, RSA_PKCS1_PADDING) <= 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // 比較\r
+       if (Cmp(decrypt_data, hash_data, sizeof(SIGN_HASH_SIZE)) != 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 署名\r
+bool RsaSign(void *dst, void *src, UINT size, K *k)\r
+{\r
+       return RsaSignEx(dst, src, size, k, 0);\r
+}\r
+bool RsaSignEx(void *dst, void *src, UINT size, K *k, UINT bits)\r
+{\r
+       UCHAR hash[SIGN_HASH_SIZE];\r
+       // 引数チェック\r
+       if (dst == NULL || src == NULL || k == NULL || k->pkey->type != EVP_PKEY_RSA)\r
+       {\r
+               return false;\r
+       }\r
+       if (bits == 0)\r
+       {\r
+               bits = 1024;\r
+       }\r
+\r
+       Zero(dst, bits / 8);\r
+\r
+       // ハッシュ\r
+       if (HashForSign(hash, sizeof(hash), src, size) == false)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // 署名\r
+       if (RSA_private_encrypt(sizeof(hash), hash, dst, k->pkey->pkey.rsa, RSA_PKCS1_PADDING) <= 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// SHA-1 による署名データの生成\r
+bool HashForSign(void *dst, UINT dst_size, void *src, UINT src_size)\r
+{\r
+       UCHAR *buf = (UCHAR *)dst;\r
+       UCHAR sign_data[] =\r
+       {\r
+               0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E,\r
+               0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14,\r
+       };\r
+       // 引数チェック\r
+       if (dst == NULL || src == NULL || src_size == 0 || MIN_SIGN_HASH_SIZE > dst_size)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // ヘッダ部分\r
+       Copy(buf, sign_data, sizeof(sign_data));\r
+\r
+       // ハッシュ\r
+       HashSha1(HASHED_DATA(buf), src, src_size);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 公開鍵による復号化\r
+bool RsaPublicDecrypt(void *dst, void *src, UINT size, K *k)\r
+{\r
+       void *tmp;\r
+       int ret;\r
+       // 引数チェック\r
+       if (src == NULL || size == 0 || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       tmp = ZeroMalloc(size);\r
+       Lock(openssl_lock);\r
+       {\r
+               ret = RSA_public_decrypt(size, src, tmp, k->pkey->pkey.rsa, RSA_NO_PADDING);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (ret <= 0)\r
+       {\r
+/*             Debug("RSA Error: 0x%x\n",\r
+                       ERR_get_error());\r
+*/             Free(tmp);\r
+               return false;\r
+       }\r
+\r
+       Copy(dst, tmp, size);\r
+       Free(tmp);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 秘密鍵による暗号化\r
+bool RsaPrivateEncrypt(void *dst, void *src, UINT size, K *k)\r
+{\r
+       void *tmp;\r
+       int ret;\r
+       // 引数チェック\r
+       if (src == NULL || size == 0 || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       tmp = ZeroMalloc(size);\r
+       Lock(openssl_lock);\r
+       {\r
+               ret = RSA_private_encrypt(size, src, tmp, k->pkey->pkey.rsa, RSA_NO_PADDING);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (ret <= 0)\r
+       {\r
+/*             Debug("RSA Error: %u\n",\r
+                       ERR_GET_REASON(ERR_get_error()));\r
+*/             Free(tmp);\r
+               return false;\r
+       }\r
+\r
+       Copy(dst, tmp, size);\r
+       Free(tmp);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 秘密鍵による復号化\r
+bool RsaPrivateDecrypt(void *dst, void *src, UINT size, K *k)\r
+{\r
+       void *tmp;\r
+       int ret;\r
+       // 引数チェック\r
+       if (src == NULL || size == 0 || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       tmp = ZeroMalloc(size);\r
+       Lock(openssl_lock);\r
+       {\r
+               ret = RSA_private_decrypt(size, src, tmp, k->pkey->pkey.rsa, RSA_NO_PADDING);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (ret <= 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Copy(dst, tmp, size);\r
+       Free(tmp);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 公開鍵による暗号化\r
+bool RsaPublicEncrypt(void *dst, void *src, UINT size, K *k)\r
+{\r
+       void *tmp;\r
+       int ret;\r
+       // 引数チェック\r
+       if (src == NULL || size == 0 || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       tmp = ZeroMalloc(size);\r
+       Lock(openssl_lock);\r
+       {\r
+               ret = RSA_public_encrypt(size, src, tmp, k->pkey->pkey.rsa, RSA_NO_PADDING);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (ret <= 0)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Copy(dst, tmp, size);\r
+       Free(tmp);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 動作環境チェック\r
+bool RsaCheckEx()\r
+{\r
+       UINT num = 20;\r
+       UINT i;\r
+\r
+       for (i = 0;i < num;i++)\r
+       {\r
+               if (RsaCheck())\r
+               {\r
+                       return true;\r
+               }\r
+\r
+               SleepThread(100);\r
+       }\r
+\r
+       return false;\r
+}\r
+bool RsaCheck()\r
+{\r
+       RSA *rsa;\r
+       K *priv_key, *pub_key;\r
+       BIO *bio;\r
+       char errbuf[MAX_SIZE];\r
+       UINT size = 0;\r
+       UINT bit = 32;\r
+       // 引数チェック\r
+\r
+       // 鍵生成\r
+       Lock(openssl_lock);\r
+       {\r
+               rsa = RSA_generate_key(bit, RSA_F4, NULL, NULL);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (rsa == NULL)\r
+       {\r
+               Debug("RSA_generate_key: err=%s\n", ERR_error_string(ERR_get_error(), errbuf));\r
+               return false;\r
+       }\r
+\r
+       // 秘密鍵\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_RSAPrivateKey_bio(bio, rsa);\r
+       }\r
+       Unlock(openssl_lock);\r
+       BIO_seek(bio, 0);\r
+       priv_key = BioToK(bio, true, false, NULL);\r
+       FreeBio(bio);\r
+\r
+       // 公開鍵\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_RSA_PUBKEY_bio(bio, rsa);\r
+       }\r
+       Unlock(openssl_lock);\r
+       BIO_seek(bio, 0);\r
+       pub_key = BioToK(bio, false, false, NULL);\r
+       FreeBio(bio);\r
+\r
+       RSA_free(rsa);\r
+\r
+       size = RsaPublicSize(pub_key);\r
+\r
+       if (size != ((bit + 7) / 8))\r
+       {\r
+               FreeK(priv_key);\r
+               FreeK(pub_key);\r
+\r
+               return false;\r
+       }\r
+\r
+       FreeK(priv_key);\r
+       FreeK(pub_key);\r
+\r
+       return true;\r
+}\r
+\r
+// RSA 鍵の生成\r
+bool RsaGen(K **priv, K **pub, UINT bit)\r
+{\r
+       RSA *rsa;\r
+       K *priv_key, *pub_key;\r
+       BIO *bio;\r
+       char errbuf[MAX_SIZE];\r
+       UINT size = 0;\r
+       // 引数チェック\r
+       if (priv == NULL || pub == NULL)\r
+       {\r
+               return false;\r
+       }\r
+       if (bit == 0)\r
+       {\r
+               bit = 1024;\r
+       }\r
+\r
+       // 鍵生成\r
+       Lock(openssl_lock);\r
+       {\r
+               rsa = RSA_generate_key(bit, RSA_F4, NULL, NULL);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (rsa == NULL)\r
+       {\r
+               Debug("RSA_generate_key: err=%s\n", ERR_error_string(ERR_get_error(), errbuf));\r
+               return false;\r
+       }\r
+\r
+       // 秘密鍵\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_RSAPrivateKey_bio(bio, rsa);\r
+       }\r
+       Unlock(openssl_lock);\r
+       BIO_seek(bio, 0);\r
+       priv_key = BioToK(bio, true, false, NULL);\r
+       FreeBio(bio);\r
+\r
+       // 公開鍵\r
+       bio = NewBio();\r
+       Lock(openssl_lock);\r
+       {\r
+               i2d_RSA_PUBKEY_bio(bio, rsa);\r
+       }\r
+       Unlock(openssl_lock);\r
+       BIO_seek(bio, 0);\r
+       pub_key = BioToK(bio, false, false, NULL);\r
+       FreeBio(bio);\r
+\r
+       *priv = priv_key;\r
+       *pub = pub_key;\r
+\r
+       RSA_free(rsa);\r
+\r
+       size = RsaPublicSize(*pub);\r
+\r
+       if (size != ((bit + 7) / 8))\r
+       {\r
+               FreeK(*priv);\r
+               FreeK(*pub);\r
+\r
+               return RsaGen(priv, pub, bit);\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// 証明書 X が証明書 x_issuer の発行者によって署名されているかどうか確認する\r
+bool CheckX(X *x, X *x_issuer)\r
+{\r
+       K *k;\r
+       bool ret;\r
+       // 引数チェック\r
+       if (x == NULL || x_issuer == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       k = GetKFromX(x_issuer);\r
+       if (k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       ret = CheckSignature(x, k);\r
+       FreeK(k);\r
+\r
+       return ret;\r
+}\r
+\r
+// 証明書 X の署名を公開鍵 K で確認する\r
+bool CheckSignature(X *x, K *k)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               if (X509_verify(x->x509, k->pkey) == 0)\r
+               {\r
+                       Unlock(openssl_lock);\r
+                       return false;\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+       return true;\r
+}\r
+\r
+// 証明書から公開鍵を取得する\r
+K *GetKFromX(X *x)\r
+{\r
+       EVP_PKEY *pkey;\r
+       K *k;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               pkey = X509_get_pubkey(x->x509);\r
+       }\r
+       Unlock(openssl_lock);\r
+       if (pkey == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       k = ZeroMalloc(sizeof(K));\r
+       k->pkey = pkey;\r
+\r
+       return k;\r
+}\r
+\r
+// 名前の比較\r
+bool CompareName(NAME *n1, NAME *n2)\r
+{\r
+       // 引数チェック\r
+       if (n1 == NULL || n2 == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       // 名前比較\r
+       if (UniStrCmpi(n1->CommonName, n2->CommonName) == 0 &&\r
+               UniStrCmpi(n1->Organization, n2->Organization) == 0 &&\r
+               UniStrCmpi(n1->Unit, n2->Unit) == 0 &&\r
+               UniStrCmpi(n1->Country, n2->Country) == 0 &&\r
+               UniStrCmpi(n1->State, n2->State) == 0 &&\r
+               UniStrCmpi(n1->Local, n2->Local) == 0)\r
+       {\r
+               return true;\r
+       }\r
+\r
+       return false;\r
+}\r
+\r
+// X の名前の解放\r
+void FreeXNames(X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       FreeName(x->issuer_name);\r
+       x->issuer_name = NULL;\r
+\r
+       FreeName(x->subject_name);\r
+       x->subject_name = NULL;\r
+}\r
+\r
+// 名前の解放\r
+void FreeName(NAME *n)\r
+{\r
+       // 引数チェック\r
+       if (n == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       // 文字列を解放\r
+       Free(n->CommonName);\r
+       Free(n->Organization);\r
+       Free(n->Unit);\r
+       Free(n->Country);\r
+       Free(n->State);\r
+       Free(n->Local);\r
+\r
+       // オブジェクトを解放\r
+       Free(n);\r
+\r
+       return;\r
+}\r
+\r
+// 証明書の名前を取得する\r
+void LoadXNames(X *x)\r
+{\r
+       X509 *x509;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       x509 = x->x509;\r
+       x->issuer_name = X509NameToName(X509_get_issuer_name(x509));\r
+       x->subject_name = X509NameToName(X509_get_subject_name(x509));\r
+}\r
+\r
+// X509_NAME 構造体を NAME 構造体に変換\r
+NAME *X509NameToName(void *xn)\r
+{\r
+       NAME *n;\r
+       // 引数チェック\r
+       if (xn == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       n = ZeroMalloc(sizeof(NAME));\r
+\r
+       // 文字列を順番に取得する\r
+       n->CommonName = GetUniStrFromX509Name(xn, NID_commonName);\r
+       n->Organization = GetUniStrFromX509Name(xn, NID_organizationName);\r
+       n->Unit = GetUniStrFromX509Name(xn, NID_organizationalUnitName);\r
+       n->Country = GetUniStrFromX509Name(xn, NID_countryName);\r
+       n->State = GetUniStrFromX509Name(xn, NID_stateOrProvinceName);\r
+       n->Local = GetUniStrFromX509Name(xn, NID_localityName);\r
+\r
+       return n;\r
+}\r
+\r
+// X509_NAME 構造体の中から Unicode 文字列を読み込む\r
+wchar_t *GetUniStrFromX509Name(void *xn, int nid)\r
+{\r
+       UCHAR txt[1024];\r
+       bool b = false;\r
+       UINT i, size;\r
+       int index;\r
+       bool unicode = false;\r
+       bool is_utf_8 = false;\r
+       ASN1_OBJECT *obj;\r
+       ASN1_STRING *data;\r
+       // 引数チェック\r
+       if (xn == NULL || nid == 0)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       Zero(txt, sizeof(txt));\r
+       if (X509_NAME_get_text_by_NID(xn, nid, (char *)txt, sizeof(txt) - 2) <= 0)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       obj = OBJ_nid2obj(nid);\r
+       if (obj == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+       index = X509_NAME_get_index_by_OBJ(xn, obj, -1);\r
+       if (index < 0)\r
+       {\r
+               return NULL;\r
+       }\r
+       data = X509_NAME_ENTRY_get_data(X509_NAME_get_entry(xn, index));\r
+       if (data == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+       if (data->type == V_ASN1_BMPSTRING)\r
+       {\r
+               unicode = true;\r
+       }\r
+       if (data->type == V_ASN1_UTF8STRING || data->type == V_ASN1_T61STRING)\r
+       {\r
+               is_utf_8 = true;\r
+       }\r
+\r
+       size = UniStrLen((wchar_t *)txt) * 4 + 8;\r
+       for (i = 0;i < size;i++)\r
+       {\r
+               if (txt[i] >= 0x80)\r
+               {\r
+                       unicode = true;\r
+                       break;\r
+               }\r
+       }\r
+\r
+       if (is_utf_8)\r
+       {\r
+               wchar_t *ret;\r
+               UINT ret_size;\r
+\r
+               ret_size = CalcUtf8ToUni(txt, StrLen(txt));\r
+               ret = ZeroMalloc(ret_size + 8);\r
+               Utf8ToUni(ret, ret_size, txt, StrLen(txt));\r
+\r
+               return ret;\r
+       }\r
+       else if (unicode == false)\r
+       {\r
+               wchar_t tmp[1024];\r
+               StrToUni(tmp, sizeof(tmp), (char *)txt);\r
+               return CopyUniStr(tmp);\r
+       }\r
+       else\r
+       {\r
+               EndianUnicode((wchar_t *)txt);\r
+               return CopyUniStr((wchar_t *)txt);\r
+       }\r
+}\r
+\r
+// 証明書 x1 と x2 が等しいかどうかチェックする\r
+bool CompareX(X *x1, X *x2)\r
+{\r
+       // 引数チェック\r
+       if (x1 == NULL || x2 == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       if (X509_cmp(x1->x509, x2->x509) == 0)\r
+       {\r
+               Unlock(openssl_lock);\r
+               return true;\r
+       }\r
+       else\r
+       {\r
+               Unlock(openssl_lock);\r
+               return false;\r
+       }\r
+}\r
+\r
+// K が X の秘密鍵かどうかチェックする\r
+bool CheckXandK(X *x, K *k)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL || k == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       if (X509_check_private_key(x->x509, k->pkey) != 0)\r
+       {\r
+               Unlock(openssl_lock);\r
+               return true;\r
+       }\r
+       else\r
+       {\r
+               Unlock(openssl_lock);\r
+               return false;\r
+       }\r
+}\r
+\r
+// ファイルから X を読み込む\r
+X *FileToX(char *filename)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       X *ret = FileToXW(filename_w);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+X *FileToXW(wchar_t *filename)\r
+{\r
+       bool text;\r
+       BUF *b;\r
+       X *x;\r
+       // 引数チェック\r
+       if (filename == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = ReadDumpW(filename);\r
+       text = IsBase64(b);\r
+\r
+       x = BufToX(b, text);\r
+       FreeBuf(b);\r
+\r
+       return x;\r
+}\r
+\r
+// X をファイルに書き出す\r
+bool XToFile(X *x, char *filename, bool text)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       bool ret = XToFileW(x, filename_w, text);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+bool XToFileW(X *x, wchar_t *filename, bool text)\r
+{\r
+       BUF *b;\r
+       bool ret;\r
+       // 引数チェック\r
+       if (x == NULL || filename == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       b = XToBuf(x, text);\r
+       if (b == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       ret = DumpBufW(b, filename);\r
+       FreeBuf(b);\r
+\r
+       return ret;\r
+}\r
+\r
+// ファイルから K を読み込む\r
+K *FileToK(char *filename, bool private_key, char *password)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       K *ret;\r
+\r
+       ret = FileToKW(filename_w, private_key, password);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+K *FileToKW(wchar_t *filename, bool private_key, char *password)\r
+{\r
+       bool text;\r
+       BUF *b;\r
+       K *k;\r
+       // 引数チェック\r
+       if (filename == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = ReadDumpW(filename);\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       text = IsBase64(b);\r
+       if (text == false)\r
+       {\r
+               k = BufToK(b, private_key, false, NULL);\r
+       }\r
+       else\r
+       {\r
+               k = BufToK(b, private_key, true, NULL);\r
+               if (k == NULL)\r
+               {\r
+                       k = BufToK(b, private_key, true, password);\r
+               }\r
+       }\r
+\r
+       FreeBuf(b);\r
+\r
+       return k;\r
+}\r
+\r
+// K をファイルに保存する\r
+bool KToFile(K *k, char *filename, bool text, char *password)\r
+{\r
+       wchar_t *filename_w = CopyStrToUni(filename);\r
+       bool ret = KToFileW(k, filename_w, text, password);\r
+\r
+       Free(filename_w);\r
+\r
+       return ret;\r
+}\r
+bool KToFileW(K *k, wchar_t *filename, bool text, char *password)\r
+{\r
+       BUF *b;\r
+       bool ret;\r
+       // 引数チェック\r
+       if (k == NULL || filename == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       b = KToBuf(k, text, password);\r
+       if (b == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       ret = DumpBufW(b, filename);\r
+       FreeBuf(b);\r
+\r
+       return ret;\r
+}\r
+\r
+// K を BUF に変換する\r
+BUF *KToBuf(K *k, bool text, char *password)\r
+{\r
+       BUF *buf;\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (k == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = KToBio(k, text, password);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       buf = BioToBuf(bio);\r
+       FreeBio(bio);\r
+\r
+       SeekBuf(buf, 0, 0);\r
+\r
+       return buf;\r
+}\r
+\r
+// K を BIO に変換する\r
+BIO *KToBio(K *k, bool text, char *password)\r
+{\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (k == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = NewBio();\r
+\r
+       if (k->private_key)\r
+       {\r
+               // 秘密鍵\r
+               if (text == false)\r
+               {\r
+                       // バイナリ形式\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               i2d_PrivateKey_bio(bio, k->pkey);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+               }\r
+               else\r
+               {\r
+                       // テキスト形式\r
+                       if (password == 0 || StrLen(password) == 0)\r
+                       {\r
+                               // 暗号化無し\r
+                               Lock(openssl_lock);\r
+                               {\r
+                                       PEM_write_bio_PrivateKey(bio, k->pkey, NULL, NULL, 0, NULL, NULL);\r
+                               }\r
+                               Unlock(openssl_lock);\r
+                       }\r
+                       else\r
+                       {\r
+                               // 暗号化する\r
+                               CB_PARAM cb;\r
+                               cb.password = password;\r
+                               Lock(openssl_lock);\r
+                               {\r
+                                       PEM_write_bio_PrivateKey(bio, k->pkey, EVP_des_ede3_cbc(),\r
+                                               NULL, 0, (pem_password_cb *)PKeyPasswordCallbackFunction, &cb);\r
+                               }\r
+                               Unlock(openssl_lock);\r
+                       }\r
+               }\r
+       }\r
+       else\r
+       {\r
+               // 公開鍵\r
+               if (text == false)\r
+               {\r
+                       // バイナリ形式\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               i2d_PUBKEY_bio(bio, k->pkey);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+               }\r
+               else\r
+               {\r
+                       // テキスト形式\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               PEM_write_bio_PUBKEY(bio, k->pkey);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+               }\r
+       }\r
+\r
+       return bio;\r
+}\r
+\r
+// BUF が Base64 エンコードされているかどうか調べる\r
+bool IsBase64(BUF *b)\r
+{\r
+       UINT i;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       for (i = 0;i < b->Size;i++)\r
+       {\r
+               char c = ((char *)b->Buf)[i];\r
+               bool b = false;\r
+               if ('a' <= c && c <= 'z')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if ('A' <= c && c <= 'Z')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if ('0' <= c && c <= '9')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if (c == ':' || c == '.' || c == ';' || c == ',')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if (c == '!' || c == '&' || c == '#' || c == '(' || c == ')')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if (c == '-' || c == ' ')\r
+               {\r
+                       b = true;\r
+               }\r
+               else if (c == 13 || c == 10 || c == EOF)\r
+               {\r
+                       b = true;\r
+               }\r
+               else if (c == '\t' || c == '=' || c == '+' || c == '/')\r
+               {\r
+                       b = true;\r
+               }\r
+               if (b == false)\r
+               {\r
+                       return false;\r
+               }\r
+       }\r
+       return true;\r
+}\r
+\r
+// BUF に含まれている K が暗号化されているかどうか調べる\r
+bool IsEncryptedK(BUF *b, bool private_key)\r
+{\r
+       K *k;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return false;\r
+       }\r
+       if (IsBase64(b) == false)\r
+       {\r
+               return false;\r
+       }\r
+\r
+       k = BufToK(b, private_key, true, NULL);\r
+       if (k != NULL)\r
+       {\r
+               FreeK(k);\r
+               return false;\r
+       }\r
+\r
+       return true;\r
+}\r
+\r
+// BUF を K に変換\r
+K *BufToK(BUF *b, bool private_key, bool text, char *password)\r
+{\r
+       BIO *bio;\r
+       K *k;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = BufToBio(b);\r
+       k = BioToK(bio, private_key, text, password);\r
+       FreeBio(bio);\r
+\r
+       return k;\r
+}\r
+\r
+// K を解放\r
+void FreeK(K *k)\r
+{\r
+       // 引数チェック\r
+       if (k == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       FreePKey(k->pkey);\r
+       Free(k);\r
+}\r
+\r
+// 秘密鍵を解放\r
+void FreePKey(EVP_PKEY *pkey)\r
+{\r
+       // 引数チェック\r
+       if (pkey == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       EVP_PKEY_free(pkey);\r
+}\r
+\r
+// BIO を K に変換する\r
+K *BioToK(BIO *bio, bool private_key, bool text, char *password)\r
+{\r
+       EVP_PKEY *pkey;\r
+       K *k;\r
+       // 引数チェック\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       if (password != NULL && StrLen(password) == 0)\r
+       {\r
+               password = NULL;\r
+       }\r
+\r
+       if (private_key == false)\r
+       {\r
+               // 公開鍵\r
+               if (text == false)\r
+               {\r
+                       // バイナリ形式\r
+                       pkey = d2i_PUBKEY_bio(bio, NULL);\r
+                       if (pkey == NULL)\r
+                       {\r
+                               return NULL;\r
+                       }\r
+               }\r
+               else\r
+               {\r
+                       // テキスト形式\r
+                       CB_PARAM cb;\r
+                       cb.password = password;\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               pkey = PEM_read_bio_PUBKEY(bio, NULL, (pem_password_cb *)PKeyPasswordCallbackFunction, &cb);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+                       if (pkey == NULL)\r
+                       {\r
+                               return NULL;\r
+                       }\r
+               }\r
+       }\r
+       else\r
+       {\r
+               if (text == false)\r
+               {\r
+                       // バイナリ形式\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               pkey = d2i_PrivateKey_bio(bio, NULL);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+                       if (pkey == NULL)\r
+                       {\r
+                               return NULL;\r
+                       }\r
+               }\r
+               else\r
+               {\r
+                       // テキスト形式\r
+                       CB_PARAM cb;\r
+                       cb.password = password;\r
+                       Lock(openssl_lock);\r
+                       {\r
+                               pkey = PEM_read_bio_PrivateKey(bio, NULL, (pem_password_cb *)PKeyPasswordCallbackFunction, &cb);\r
+                       }\r
+                       Unlock(openssl_lock);\r
+                       if (pkey == NULL)\r
+                       {\r
+                               return NULL;\r
+                       }\r
+               }\r
+       }\r
+\r
+       k = ZeroMalloc(sizeof(K));\r
+       k->pkey = pkey;\r
+       k->private_key = private_key;\r
+\r
+       return k;\r
+}\r
+\r
+// パスワードコールバック関数\r
+int PKeyPasswordCallbackFunction(char *buf, int bufsize, int verify, void *param)\r
+{\r
+       CB_PARAM *cb;\r
+       // 引数チェック\r
+       if (buf == NULL || param == NULL || bufsize == 0)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       cb = (CB_PARAM *)param;\r
+       if (cb->password == NULL)\r
+       {\r
+               return 0;\r
+       }\r
+\r
+       return StrCpy(buf, bufsize, cb->password);\r
+}\r
+\r
+// X を BUF に変換する\r
+BUF *XToBuf(X *x, bool text)\r
+{\r
+       BIO *bio;\r
+       BUF *b;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = XToBio(x, text);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       b = BioToBuf(bio);\r
+       FreeBio(bio);\r
+\r
+       SeekBuf(b, 0, 0);\r
+\r
+       return b;\r
+}\r
+\r
+// X を BIO に変換する\r
+BIO *XToBio(X *x, bool text)\r
+{\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = NewBio();\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               if (text == false)\r
+               {\r
+                       // バイナリ形式\r
+                       i2d_X509_bio(bio, x->x509);\r
+               }\r
+               else\r
+               {\r
+                       // テキスト形式\r
+                       PEM_write_bio_X509(bio, x->x509);\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       return bio;\r
+}\r
+\r
+// X の解放\r
+void FreeX(X *x)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       // 名前解放\r
+       FreeXNames(x);\r
+\r
+\r
+       // シリアル解放\r
+       FreeXSerial(x->serial);\r
+\r
+       if (x->do_not_free == false)\r
+       {\r
+               FreeX509(x->x509);\r
+       }\r
+       Free(x);\r
+}\r
+\r
+// X509 の解放\r
+void FreeX509(X509 *x509)\r
+{\r
+       // 引数チェック\r
+       if (x509 == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               X509_free(x509);\r
+       }\r
+       Unlock(openssl_lock);\r
+}\r
+\r
+// BUF を X に変換する\r
+X *BufToX(BUF *b, bool text)\r
+{\r
+       X *x;\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       bio = BufToBio(b);\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x = BioToX(bio, text);\r
+\r
+       FreeBio(bio);\r
+\r
+       return x;\r
+}\r
+\r
+// X のダイジェストを取得する\r
+void GetXDigest(X *x, UCHAR *buf, bool sha1)\r
+{\r
+       // 引数チェック\r
+       if (x == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       if (sha1 == false)\r
+       {\r
+               UINT size = MD5_SIZE;\r
+               X509_digest(x->x509, EVP_md5(), buf, (unsigned int *)&size);\r
+       }\r
+       else\r
+       {\r
+               UINT size = SHA1_SIZE;\r
+               X509_digest(x->x509, EVP_sha1(), buf, (unsigned int *)&size);\r
+       }\r
+}\r
+\r
+// BIO を X に変換する\r
+X *BioToX(BIO *bio, bool text)\r
+{\r
+       X *x;\r
+       X509 *x509;\r
+       // 引数チェック\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               // x509 の読み込み\r
+               if (text == false)\r
+               {\r
+                       // バイナリモード\r
+                       x509 = d2i_X509_bio(bio, NULL);\r
+               }\r
+               else\r
+               {\r
+                       // テキストモード\r
+                       x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL);\r
+               }\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x = X509ToX(x509);\r
+\r
+       if (x == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       return x;\r
+}\r
+\r
+// X509 を X に変換する\r
+X *X509ToX(X509 *x509)\r
+{\r
+       X *x;\r
+       K *k;\r
+       BUF *b;\r
+       UINT size;\r
+       UINT type;\r
+       // 引数チェック\r
+       if (x509 == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       x = ZeroMalloc(sizeof(X));\r
+       x->x509 = x509;\r
+\r
+       // 名前\r
+       LoadXNames(x);\r
+\r
+       // 有効期限\r
+       LoadXDates(x);\r
+\r
+       // ルート証明書かどうかチェックする\r
+       if (CompareName(x->issuer_name, x->subject_name))\r
+       {\r
+               K *pubkey = GetKFromX(x);\r
+               if (pubkey != NULL)\r
+               {\r
+                       if (CheckXandK(x, pubkey))\r
+                       {\r
+                               x->root_cert = true;\r
+                       }\r
+                       FreeK(pubkey);\r
+               }\r
+       }\r
+\r
+       // シリアル番号の取得\r
+       x->serial = NewXSerial(x509->cert_info->serialNumber->data,\r
+               x509->cert_info->serialNumber->length);\r
+       if (x->serial == NULL)\r
+       {\r
+               char zero = 0;\r
+               x->serial = NewXSerial(&zero, sizeof(char));\r
+       }\r
+\r
+       k = GetKFromX(x);\r
+       if (k == NULL)\r
+       {\r
+               FreeX(x);\r
+               return NULL;\r
+       }\r
+\r
+       b = KToBuf(k, false, NULL);\r
+\r
+       size = b->Size;\r
+       type = k->pkey->type;\r
+\r
+       FreeBuf(b);\r
+\r
+       FreeK(k);\r
+\r
+       if (type == EVP_PKEY_RSA)\r
+       {\r
+               x->is_compatible_bit = true;\r
+\r
+               switch (size)\r
+               {\r
+               case 162:\r
+                       x->bits = 1024;\r
+                       break;\r
+\r
+               case 226:\r
+                       x->bits = 1536;\r
+                       break;\r
+\r
+               case 294:\r
+                       x->bits = 2048;\r
+                       break;\r
+\r
+               case 442:\r
+                       x->bits = 3072;\r
+                       break;\r
+\r
+               case 550:\r
+                       x->bits = 4096;\r
+                       break;\r
+\r
+               default:\r
+                       x->is_compatible_bit = false;\r
+                       break;\r
+               }\r
+       }\r
+\r
+       return x;\r
+}\r
+\r
+// BIO を作成する\r
+BIO *NewBio()\r
+{\r
+       return BIO_new(BIO_s_mem());\r
+}\r
+\r
+// BIO を解放する\r
+void FreeBio(BIO *bio)\r
+{\r
+       // 引数チェック\r
+       if (bio == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       BIO_free(bio);\r
+}\r
+\r
+// BIO を BUF に変換する\r
+BUF *BioToBuf(BIO *bio)\r
+{\r
+       BUF *b;\r
+       UINT size;\r
+       void *tmp;\r
+       // 引数チェック\r
+       if (bio == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       BIO_seek(bio, 0);\r
+       size = bio->num_write;\r
+       tmp = Malloc(size);\r
+       BIO_read(bio, tmp, size);\r
+\r
+       b = NewBuf();\r
+       WriteBuf(b, tmp, size);\r
+       Free(tmp);\r
+\r
+       return b;\r
+}\r
+\r
+// BUF を BIO に変換する\r
+BIO *BufToBio(BUF *b)\r
+{\r
+       BIO *bio;\r
+       // 引数チェック\r
+       if (b == NULL)\r
+       {\r
+               return NULL;\r
+       }\r
+\r
+       Lock(openssl_lock);\r
+       {\r
+               bio = BIO_new(BIO_s_mem());\r
+               if (bio == NULL)\r
+               {\r
+                       Unlock(openssl_lock);\r
+                       return NULL;\r
+               }\r
+               BIO_write(bio, b->Buf, b->Size);\r
+               BIO_seek(bio, 0);\r
+       }\r
+       Unlock(openssl_lock);\r
+\r
+       return bio;\r
+}\r
+\r
+// 128bit 乱数生成\r
+void Rand128(void *buf)\r
+{\r
+       Rand(buf, 16);\r
+}\r
+\r
+// 64bit 乱数生成\r
+UINT64 Rand64()\r
+{\r
+       UINT64 i;\r
+       Rand(&i, sizeof(i));\r
+       return i;\r
+}\r
+\r
+// 32bit 乱数生成\r
+UINT Rand32()\r
+{\r
+       UINT i;\r
+       Rand(&i, sizeof(i));\r
+       return i;\r
+}\r
+\r
+// 16bit 乱数生成\r
+USHORT Rand16()\r
+{\r
+       USHORT i;\r
+       Rand(&i, sizeof(i));\r
+       return i;\r
+}\r
+\r
+// 8bit 乱数生成\r
+UCHAR Rand8()\r
+{\r
+       UCHAR i;\r
+       Rand(&i, sizeof(i));\r
+       return i;\r
+}\r
+\r
+// 1bit 乱数生成\r
+bool Rand1()\r
+{\r
+       return (Rand32() % 2) == 0 ? false : true;\r
+}\r
+\r
+// 乱数生成\r
+void Rand(void *buf, UINT size)\r
+{\r
+       // 引数チェック\r
+       if (buf == NULL || size == 0)\r
+       {\r
+               return;\r
+       }\r
+       RAND_bytes(buf, size);\r
+}\r
+\r
+// OpenSSL が確保しているスレッド固有情報を削除する\r
+void FreeOpenSSLThreadState()\r
+{\r
+       ERR_remove_state(0);\r
+}\r
+\r
+// 暗号化ライブラリの解放\r
+void FreeCryptLibrary()\r
+{\r
+       openssl_inited = false;\r
+\r
+       DeleteLock(openssl_lock);\r
+       openssl_lock = NULL;\r
+//     RAND_Free_For_SoftEther();\r
+       OpenSSL_FreeLock();\r
+}\r
+\r
+// 暗号化ライブラリの初期化\r
+void InitCryptLibrary()\r
+{\r
+       char tmp[16];\r
+//     RAND_Init_For_SoftEther()\r
+       openssl_lock = NewLock();\r
+       SSL_library_init();\r
+       //OpenSSL_add_all_algorithms();\r
+       OpenSSL_add_all_ciphers();\r
+       SSLeay_add_all_digests();\r
+       ERR_load_crypto_strings();\r
+       SSL_load_error_strings();\r
+\r
+#ifdef OS_UNIX\r
+       {\r
+               char *name1 = "/dev/random";\r
+               char *name2 = "/dev/urandom";\r
+               IO *o;\r
+               o = FileOpen(name1, false);\r
+               if (o == NULL)\r
+               {\r
+                       o = FileOpen(name2, false);\r
+                       if (o == NULL)\r
+                       {\r
+                               UINT64 now = SystemTime64();\r
+                               BUF *b;\r
+                               UINT i;\r
+                               b = NewBuf();\r
+                               for (i = 0;i < 4096;i++)\r
+                               {\r
+                                       UCHAR c = rand() % 256;\r
+                                       WriteBuf(b, &c, 1);\r
+                               }\r
+                               WriteBuf(b, &now, sizeof(now));\r
+                               RAND_seed(b->Buf, b->Size);\r
+                               FreeBuf(b);\r
+                       }\r
+                       else\r
+                       {\r
+                               FileClose(o);\r
+                       }\r
+               }\r
+               else\r
+               {\r
+                       FileClose(o);\r
+               }\r
+       }\r
+#endif // OS_UNIX\r
+\r
+       RAND_poll();\r
+\r
+#ifdef OS_WIN32\r
+//     RAND_screen();\r
+#endif\r
+       Rand(tmp, sizeof(tmp));\r
+       OpenSSL_InitLock();\r
+\r
+       openssl_inited = true;\r
+}\r
+\r
+// 内部ハッシュ関数\r
+void InternalHash(void *dst, void *src, UINT size, bool sha1)\r
+{\r
+       // 引数チェック\r
+       if (dst == NULL || (src == NULL && size != 0))\r
+       {\r
+               return;\r
+       }\r
+\r
+       if (sha1 == false)\r
+       {\r
+               // MD5 ハッシュ\r
+               MD5(src, size, dst);\r
+       }\r
+       else\r
+       {\r
+               // SHA ハッシュ\r
+               SHA(src, size, dst);\r
+       }\r
+}\r
+\r
+// SHA-1 専用ハッシュ関数\r
+void HashSha1(void *dst, void *src, UINT size)\r
+{\r
+       SHA1(src, size, dst);\r
+}\r
+\r
+// ハッシュ関数\r
+void Hash(void *dst, void *src, UINT size, bool sha1)\r
+{\r
+       InternalHash(dst, src, size, sha1);\r
+}\r
+\r
+// 新しい CRYPT オブジェクトの作成\r
+CRYPT *NewCrypt(void *key, UINT size)\r
+{\r
+       CRYPT *c = ZeroMalloc(sizeof(CRYPT));\r
+\r
+       SetKey(c, key, size);\r
+\r
+       return c;\r
+}\r
+\r
+// CRYPT オブジェクトの解放\r
+void FreeCrypt(CRYPT *c)\r
+{\r
+       // 引数チェック\r
+       if (c == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       // メモリ解放\r
+       Free(c);\r
+}\r
+\r
+// 暗号化と解読\r
+void InternalEncrypt(CRYPT *c, void *dst, void *src, UINT size)\r
+{\r
+       UINT x, y, sx, sy;\r
+       UINT *state;\r
+       UCHAR *endsrc;\r
+       UCHAR *s = (UCHAR *)src;\r
+       UCHAR *d = (UCHAR *)dst;\r
+       // 引数チェック\r
+       if (c == NULL || dst == NULL || src == NULL || size == 0)\r
+       {\r
+               return;\r
+       }\r
+\r
+       state = (UINT *)c->state;\r
+       x = c->x;\r
+       y = c->y;\r
+\r
+       for (endsrc = s + size;s != endsrc;s++, d++)\r
+       {\r
+               x = (x + 1) & 0xff;\r
+               sx = state[x];\r
+               y = (sx + y) & 0xff;\r
+               state[x] = sy = state[y];\r
+               state[y] = sx;\r
+               *d = *s ^ state[(sx + sy) & 0xff];\r
+       }\r
+       c->x = x;\r
+       c->y = y;\r
+}\r
+void Encrypt(CRYPT *c, void *dst, void *src, UINT size)\r
+{\r
+       InternalEncrypt(c, dst, src, size);\r
+}\r
+\r
+// 鍵の更新\r
+void SetKey(CRYPT *c, void *key, UINT size)\r
+{\r
+       UINT i, t, u, ki, si;\r
+       UINT *state;\r
+       UCHAR *k = (UCHAR *)key;\r
+       // 引数チェック\r
+       if (c == NULL || key == NULL)\r
+       {\r
+               return;\r
+       }\r
+\r
+       // 鍵のセット\r
+       state = (UINT *)c->state;\r
+       c->x = c->y = 0;\r
+       for (i = 0;i < 256;i++)\r
+       {\r
+               state[i] = i;\r
+       }\r
+       ki = si = 0;\r
+\r
+       for (i = 0;i < 256;i++)\r
+       {\r
+               t = state[i];\r
+               si = (si + k[ki] + t) & 0xff;\r
+               u = state[si];\r
+               state[si] = t;\r
+               state[i] = u;\r
+               if (++ki >= size)\r
+               {\r
+                       ki = 0;\r
+               }\r
+       }\r
+}\r
+\r