Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/mRemoteNG/PuTTYNG.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/ssh/bpp.h
diff options
context:
space:
mode:
Diffstat (limited to 'ssh/bpp.h')
-rw-r--r--ssh/bpp.h179
1 files changed, 179 insertions, 0 deletions
diff --git a/ssh/bpp.h b/ssh/bpp.h
new file mode 100644
index 00000000..87e7d7e7
--- /dev/null
+++ b/ssh/bpp.h
@@ -0,0 +1,179 @@
+/*
+ * Abstraction of the binary packet protocols used in SSH.
+ */
+
+#ifndef PUTTY_SSHBPP_H
+#define PUTTY_SSHBPP_H
+
+typedef struct BinaryPacketProtocolVtable BinaryPacketProtocolVtable;
+
+struct BinaryPacketProtocolVtable {
+ void (*free)(BinaryPacketProtocol *);
+ void (*handle_input)(BinaryPacketProtocol *);
+ void (*handle_output)(BinaryPacketProtocol *);
+ PktOut *(*new_pktout)(int type);
+ void (*queue_disconnect)(BinaryPacketProtocol *,
+ const char *msg, int category);
+ uint32_t packet_size_limit;
+};
+
+struct BinaryPacketProtocol {
+ const struct BinaryPacketProtocolVtable *vt;
+ bufchain *in_raw, *out_raw;
+ bool input_eof; /* set this if in_raw will never be added to again */
+ PktInQueue in_pq;
+ PktOutQueue out_pq;
+ PacketLogSettings *pls;
+ LogContext *logctx;
+ Ssh *ssh;
+
+ /* ic_in_raw is filled in by the BPP (probably by calling
+ * ssh_bpp_common_setup). The BPP's owner triggers it when data is
+ * added to in_raw, and also when the BPP is newly created. */
+ IdempotentCallback ic_in_raw;
+
+ /* ic_out_pq is entirely internal to the BPP itself; it's used as
+ * the callback on out_pq. */
+ IdempotentCallback ic_out_pq;
+
+ /* Information that all packet layers sharing this BPP will
+ * potentially be interested in. */
+ int remote_bugs;
+ bool ext_info_rsa_sha256_ok, ext_info_rsa_sha512_ok;
+
+ /* Set this if remote connection closure should not generate an
+ * error message (either because it's not to be treated as an
+ * error at all, or because some other error message has already
+ * been emitted). */
+ bool expect_close;
+};
+
+static inline void ssh_bpp_handle_input(BinaryPacketProtocol *bpp)
+{ bpp->vt->handle_input(bpp); }
+static inline void ssh_bpp_handle_output(BinaryPacketProtocol *bpp)
+{ bpp->vt->handle_output(bpp); }
+static inline PktOut *ssh_bpp_new_pktout(BinaryPacketProtocol *bpp, int type)
+{ return bpp->vt->new_pktout(type); }
+static inline void ssh_bpp_queue_disconnect(BinaryPacketProtocol *bpp,
+ const char *msg, int category)
+{ bpp->vt->queue_disconnect(bpp, msg, category); }
+
+/* ssh_bpp_free is more than just a macro wrapper on the vtable; it
+ * does centralised parts of the freeing too. */
+void ssh_bpp_free(BinaryPacketProtocol *bpp);
+
+BinaryPacketProtocol *ssh1_bpp_new(LogContext *logctx);
+void ssh1_bpp_new_cipher(BinaryPacketProtocol *bpp,
+ const ssh_cipheralg *cipher,
+ const void *session_key);
+/* This is only called from outside the BPP in server mode; in client
+ * mode the BPP detects compression start time automatically by
+ * snooping message types */
+void ssh1_bpp_start_compression(BinaryPacketProtocol *bpp);
+
+/* Helper routine which does common BPP initialisation, e.g. setting
+ * up in_pq and out_pq, and initialising input_consumer. */
+void ssh_bpp_common_setup(BinaryPacketProtocol *);
+
+/* Common helper functions between the SSH-2 full and bare BPPs */
+void ssh2_bpp_queue_disconnect(BinaryPacketProtocol *bpp,
+ const char *msg, int category);
+bool ssh2_bpp_check_unimplemented(BinaryPacketProtocol *bpp, PktIn *pktin);
+
+/* Convenience macro for BPPs to send formatted strings to the Event
+ * Log. Assumes a function parameter called 'bpp' is in scope. */
+#define bpp_logevent(...) ( \
+ logevent_and_free((bpp)->logctx, dupprintf(__VA_ARGS__)))
+
+/*
+ * Structure that tracks how much data is sent and received, for
+ * purposes of triggering an SSH-2 rekey when either one gets over a
+ * configured limit. In each direction, the flag 'running' indicates
+ * that we haven't hit the limit yet, and 'remaining' tracks how much
+ * longer until we do. The function dts_consume() subtracts a given
+ * amount from the counter in a particular direction, and sets
+ * 'expired' if the limit has been hit.
+ *
+ * The limit is sticky: once 'running' has flipped to false,
+ * 'remaining' is no longer decremented, so it shouldn't dangerously
+ * wrap round.
+ */
+struct DataTransferStatsDirection {
+ bool running, expired;
+ unsigned long remaining;
+};
+struct DataTransferStats {
+ struct DataTransferStatsDirection in, out;
+};
+static inline void dts_consume(struct DataTransferStatsDirection *s,
+ unsigned long size_consumed)
+{
+ if (s->running) {
+ if (s->remaining <= size_consumed) {
+ s->running = false;
+ s->expired = true;
+ } else {
+ s->remaining -= size_consumed;
+ }
+ }
+}
+static inline void dts_reset(struct DataTransferStatsDirection *s,
+ unsigned long starting_size)
+{
+ s->expired = false;
+ s->remaining = starting_size;
+ /*
+ * The semantics of setting CONF_ssh_rekey_data to zero are to
+ * disable data-volume based rekeying completely. So if the
+ * starting size is actually zero, we don't set 'running' to true
+ * in the first place, which means we won't ever set the expired
+ * flag.
+ */
+ s->running = (starting_size != 0);
+}
+
+BinaryPacketProtocol *ssh2_bpp_new(
+ LogContext *logctx, struct DataTransferStats *stats, bool is_server);
+void ssh2_bpp_new_outgoing_crypto(
+ BinaryPacketProtocol *bpp,
+ const ssh_cipheralg *cipher, const void *ckey, const void *iv,
+ const ssh2_macalg *mac, bool etm_mode, const void *mac_key,
+ const ssh_compression_alg *compression, bool delayed_compression);
+void ssh2_bpp_new_incoming_crypto(
+ BinaryPacketProtocol *bpp,
+ const ssh_cipheralg *cipher, const void *ckey, const void *iv,
+ const ssh2_macalg *mac, bool etm_mode, const void *mac_key,
+ const ssh_compression_alg *compression, bool delayed_compression);
+
+/*
+ * A query method specific to the interface between ssh2transport and
+ * ssh2bpp. If true, it indicates that we're potentially in the
+ * race-condition-prone part of delayed compression setup and so
+ * asynchronous outgoing transport-layer packets are currently not
+ * being sent, which means in particular that it would be a bad idea
+ * to start a rekey because then we'd stop responding to anything
+ * _other_ than transport-layer packets and deadlock the protocol.
+ */
+bool ssh2_bpp_rekey_inadvisable(BinaryPacketProtocol *bpp);
+
+BinaryPacketProtocol *ssh2_bare_bpp_new(LogContext *logctx);
+
+/*
+ * The initial code to handle the SSH version exchange is also
+ * structured as an implementation of BinaryPacketProtocol, because
+ * that makes it easy to switch from that to the next BPP once it
+ * tells us which one we're using.
+ */
+struct ssh_version_receiver {
+ void (*got_ssh_version)(struct ssh_version_receiver *rcv,
+ int major_version);
+};
+BinaryPacketProtocol *ssh_verstring_new(
+ Conf *conf, LogContext *logctx, bool bare_connection_mode,
+ const char *protoversion, struct ssh_version_receiver *rcv,
+ bool server_mode, const char *impl_name);
+const char *ssh_verstring_get_remote(BinaryPacketProtocol *);
+const char *ssh_verstring_get_local(BinaryPacketProtocol *);
+int ssh_verstring_get_bugs(BinaryPacketProtocol *);
+
+#endif /* PUTTY_SSHBPP_H */