123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182 |
- /*
- * Abstraction of the binary packet protocols used in SSH.
- */
- #ifndef PUTTY_SSHBPP_H
- #define PUTTY_SSHBPP_H
- typedef struct BinaryPacketProtocolVtable BinaryPacketProtocolVtable;
- struct BinaryPacketProtocolVtable {
- void (*free)(BinaryPacketProtocol *);
- void (*handle_input)(BinaryPacketProtocol *);
- void (*handle_output)(BinaryPacketProtocol *);
- PktOut *(*new_pktout)(int type);
- void (*queue_disconnect)(BinaryPacketProtocol *,
- const char *msg, int category);
- uint32_t packet_size_limit;
- };
- struct BinaryPacketProtocol {
- const struct BinaryPacketProtocolVtable *vt;
- bufchain *in_raw, *out_raw;
- bool input_eof; /* set this if in_raw will never be added to again */
- PktInQueue in_pq;
- PktOutQueue out_pq;
- PacketLogSettings *pls;
- LogContext *logctx;
- Ssh *ssh;
- /* ic_in_raw is filled in by the BPP (probably by calling
- * ssh_bpp_common_setup). The BPP's owner triggers it when data is
- * added to in_raw, and also when the BPP is newly created. */
- IdempotentCallback ic_in_raw;
- /* ic_out_pq is entirely internal to the BPP itself; it's used as
- * the callback on out_pq. */
- IdempotentCallback ic_out_pq;
- /* Information that all packet layers sharing this BPP will
- * potentially be interested in. */
- int remote_bugs;
- bool ext_info_rsa_sha256_ok, ext_info_rsa_sha512_ok;
- /* Set this if remote connection closure should not generate an
- * error message (either because it's not to be treated as an
- * error at all, or because some other error message has already
- * been emitted). */
- bool expect_close;
- };
- static inline void ssh_bpp_handle_input(BinaryPacketProtocol *bpp)
- { bpp->vt->handle_input(bpp); }
- static inline void ssh_bpp_handle_output(BinaryPacketProtocol *bpp)
- { bpp->vt->handle_output(bpp); }
- static inline PktOut *ssh_bpp_new_pktout(BinaryPacketProtocol *bpp, int type)
- { return bpp->vt->new_pktout(type); }
- static inline void ssh_bpp_queue_disconnect(BinaryPacketProtocol *bpp,
- const char *msg, int category)
- { bpp->vt->queue_disconnect(bpp, msg, category); }
- /* ssh_bpp_free is more than just a macro wrapper on the vtable; it
- * does centralised parts of the freeing too. */
- void ssh_bpp_free(BinaryPacketProtocol *bpp);
- BinaryPacketProtocol *ssh1_bpp_new(LogContext *logctx);
- void ssh1_bpp_new_cipher(BinaryPacketProtocol *bpp,
- const ssh_cipheralg *cipher,
- const void *session_key);
- /* This is only called from outside the BPP in server mode; in client
- * mode the BPP detects compression start time automatically by
- * snooping message types */
- void ssh1_bpp_start_compression(BinaryPacketProtocol *bpp);
- /* Helper routine which does common BPP initialisation, e.g. setting
- * up in_pq and out_pq, and initialising input_consumer. */
- void ssh_bpp_common_setup(BinaryPacketProtocol *);
- /* Common helper functions between the SSH-2 full and bare BPPs */
- void ssh2_bpp_queue_disconnect(BinaryPacketProtocol *bpp,
- const char *msg, int category);
- bool ssh2_bpp_check_unimplemented(BinaryPacketProtocol *bpp, PktIn *pktin);
- /* Convenience macro for BPPs to send formatted strings to the Event
- * Log. Assumes a function parameter called 'bpp' is in scope. */
- #define bpp_logevent(...) ( \
- logevent_and_free((bpp)->logctx, dupprintf(__VA_ARGS__)))
- /*
- * Structure that tracks how much data is sent and received, for
- * purposes of triggering an SSH-2 rekey when either one gets over a
- * configured limit. In each direction, the flag 'running' indicates
- * that we haven't hit the limit yet, and 'remaining' tracks how much
- * longer until we do. The function dts_consume() subtracts a given
- * amount from the counter in a particular direction, and sets
- * 'expired' if the limit has been hit.
- *
- * The limit is sticky: once 'running' has flipped to false,
- * 'remaining' is no longer decremented, so it shouldn't dangerously
- * wrap round.
- */
- struct DataTransferStatsDirection {
- bool running, expired;
- unsigned long remaining;
- };
- struct DataTransferStats {
- struct DataTransferStatsDirection in, out;
- };
- static inline void dts_consume(struct DataTransferStatsDirection *s,
- unsigned long size_consumed)
- {
- if (s->running) {
- if (s->remaining <= size_consumed) {
- s->running = false;
- s->expired = true;
- } else {
- s->remaining -= size_consumed;
- }
- }
- }
- static inline void dts_reset(struct DataTransferStatsDirection *s,
- unsigned long starting_size)
- {
- s->expired = false;
- s->remaining = starting_size;
- /*
- * The semantics of setting CONF_ssh_rekey_data to zero are to
- * disable data-volume based rekeying completely. So if the
- * starting size is actually zero, we don't set 'running' to true
- * in the first place, which means we won't ever set the expired
- * flag.
- */
- s->running = (starting_size != 0);
- }
- BinaryPacketProtocol *ssh2_bpp_new(
- LogContext *logctx, struct DataTransferStats *stats, bool is_server);
- void ssh2_bpp_new_outgoing_crypto(
- BinaryPacketProtocol *bpp,
- const ssh_cipheralg *cipher, const void *ckey, const void *iv,
- const ssh2_macalg *mac, bool etm_mode, const void *mac_key,
- const ssh_compression_alg *compression, bool delayed_compression,
- bool reset_sequence_number);
- void ssh2_bpp_new_incoming_crypto(
- BinaryPacketProtocol *bpp,
- const ssh_cipheralg *cipher, const void *ckey, const void *iv,
- const ssh2_macalg *mac, bool etm_mode, const void *mac_key,
- const ssh_compression_alg *compression, bool delayed_compression,
- bool reset_sequence_number);
- /*
- * A query method specific to the interface between ssh2transport and
- * ssh2bpp. If true, it indicates that we're potentially in the
- * race-condition-prone part of delayed compression setup and so
- * asynchronous outgoing transport-layer packets are currently not
- * being sent, which means in particular that it would be a bad idea
- * to start a rekey because then we'd stop responding to anything
- * _other_ than transport-layer packets and deadlock the protocol.
- */
- bool ssh2_bpp_rekey_inadvisable(BinaryPacketProtocol *bpp);
- BinaryPacketProtocol *ssh2_bare_bpp_new(LogContext *logctx);
- /*
- * The initial code to handle the SSH version exchange is also
- * structured as an implementation of BinaryPacketProtocol, because
- * that makes it easy to switch from that to the next BPP once it
- * tells us which one we're using.
- */
- struct ssh_version_receiver {
- void (*got_ssh_version)(struct ssh_version_receiver *rcv,
- int major_version);
- };
- BinaryPacketProtocol *ssh_verstring_new(
- Conf *conf, LogContext *logctx, bool bare_connection_mode,
- const char *protoversion, struct ssh_version_receiver *rcv,
- bool server_mode, const char *impl_name);
- const char *ssh_verstring_get_remote(BinaryPacketProtocol *);
- const char *ssh_verstring_get_local(BinaryPacketProtocol *);
- int ssh_verstring_get_bugs(BinaryPacketProtocol *);
- #endif /* PUTTY_SSHBPP_H */
|