diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 14:23:51 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 16:48:11 +0100 |
commit | 0f0841b2d28b7463267d4d91577e72e3340a1d3a (patch) | |
tree | ba55fcd2b6e2cc22b30f5afb561dbb3da4c8b6c7 /packet.h | |
parent | f2a5f5dae656759efb0b76c3d94890b65c197a02 (diff) | |
parent | 8698446b972003b63dfe5dcbdb86acfe986afb85 (diff) |
New upstream release (6.8p1).
Diffstat (limited to 'packet.h')
-rw-r--r-- | packet.h | 284 |
1 files changed, 181 insertions, 103 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: packet.h,v 1.61 2014/05/03 17:20:34 markus Exp $ */ | 1 | /* $OpenBSD: packet.h,v 1.66 2015/01/30 01:13:33 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -18,111 +18,189 @@ | |||
18 | 18 | ||
19 | #include <termios.h> | 19 | #include <termios.h> |
20 | 20 | ||
21 | #include <openssl/bn.h> | 21 | #ifdef WITH_OPENSSL |
22 | #ifdef OPENSSL_HAS_ECC | 22 | # include <openssl/bn.h> |
23 | #include <openssl/ec.h> | 23 | # ifdef OPENSSL_HAS_ECC |
24 | #endif | 24 | # include <openssl/ec.h> |
25 | 25 | # else /* OPENSSL_HAS_ECC */ | |
26 | void packet_set_connection(int, int); | 26 | # define EC_KEY void |
27 | void packet_set_timeout(int, int); | 27 | # define EC_GROUP void |
28 | void packet_set_nonblocking(void); | 28 | # define EC_POINT void |
29 | int packet_get_connection_in(void); | 29 | # endif /* OPENSSL_HAS_ECC */ |
30 | int packet_get_connection_out(void); | 30 | #else /* WITH_OPENSSL */ |
31 | void packet_close(void); | 31 | # define BIGNUM void |
32 | void packet_set_encryption_key(const u_char *, u_int, int); | 32 | # define EC_KEY void |
33 | u_int packet_get_encryption_key(u_char *); | 33 | # define EC_GROUP void |
34 | void packet_set_protocol_flags(u_int); | 34 | # define EC_POINT void |
35 | u_int packet_get_protocol_flags(void); | 35 | #endif /* WITH_OPENSSL */ |
36 | void packet_start_compression(int); | 36 | |
37 | void packet_set_interactive(int, int, int); | 37 | #include <signal.h> |
38 | int packet_is_interactive(void); | 38 | #include "openbsd-compat/sys-queue.h" |
39 | void packet_set_server(void); | 39 | |
40 | void packet_set_authenticated(void); | 40 | struct kex; |
41 | 41 | struct sshkey; | |
42 | void packet_start(u_char); | 42 | struct sshbuf; |
43 | void packet_put_char(int ch); | 43 | struct session_state; /* private session data */ |
44 | void packet_put_int(u_int value); | 44 | |
45 | void packet_put_int64(u_int64_t value); | 45 | #include "dispatch.h" /* typedef, DISPATCH_MAX */ |
46 | void packet_put_bignum(BIGNUM * value); | 46 | |
47 | void packet_put_bignum2(BIGNUM * value); | 47 | struct key_entry { |
48 | #ifdef OPENSSL_HAS_ECC | 48 | TAILQ_ENTRY(key_entry) next; |
49 | void packet_put_ecpoint(const EC_GROUP *, const EC_POINT *); | 49 | struct sshkey *key; |
50 | #endif | 50 | }; |
51 | void packet_put_string(const void *buf, u_int len); | 51 | |
52 | void packet_put_cstring(const char *str); | 52 | struct ssh { |
53 | void packet_put_raw(const void *buf, u_int len); | 53 | /* Session state */ |
54 | void packet_send(void); | 54 | struct session_state *state; |
55 | 55 | ||
56 | int packet_read(void); | 56 | /* Key exchange */ |
57 | void packet_read_expect(int type); | 57 | struct kex *kex; |
58 | void packet_process_incoming(const char *buf, u_int len); | 58 | |
59 | int packet_read_seqnr(u_int32_t *seqnr_p); | 59 | /* cached remote ip address and port*/ |
60 | int packet_read_poll_seqnr(u_int32_t *seqnr_p); | 60 | char *remote_ipaddr; |
61 | 61 | int remote_port; | |
62 | u_int packet_get_char(void); | 62 | |
63 | u_int packet_get_int(void); | 63 | /* Dispatcher table */ |
64 | u_int64_t packet_get_int64(void); | 64 | dispatch_fn *dispatch[DISPATCH_MAX]; |
65 | void packet_get_bignum(BIGNUM * value); | 65 | /* number of packets to ignore in the dispatcher */ |
66 | void packet_get_bignum2(BIGNUM * value); | 66 | int dispatch_skip_packets; |
67 | #ifdef OPENSSL_HAS_ECC | 67 | |
68 | void packet_get_ecpoint(const EC_GROUP *, EC_POINT *); | 68 | /* datafellows */ |
69 | #endif | 69 | int compat; |
70 | void *packet_get_raw(u_int *length_ptr); | 70 | |
71 | void *packet_get_string(u_int *length_ptr); | 71 | /* Lists for private and public keys */ |
72 | char *packet_get_cstring(u_int *length_ptr); | 72 | TAILQ_HEAD(, key_entry) private_keys; |
73 | const void *packet_get_string_ptr(u_int *length_ptr); | 73 | TAILQ_HEAD(, key_entry) public_keys; |
74 | void packet_disconnect(const char *fmt,...) __attribute__((noreturn)) __attribute__((format(printf, 1, 2))); | 74 | |
75 | void packet_send_debug(const char *fmt,...) __attribute__((format(printf, 1, 2))); | 75 | /* APP data */ |
76 | 76 | void *app_data; | |
77 | void set_newkeys(int mode); | 77 | }; |
78 | int packet_get_keyiv_len(int); | 78 | |
79 | void packet_get_keyiv(int, u_char *, u_int); | 79 | struct ssh *ssh_alloc_session_state(void); |
80 | int packet_get_keycontext(int, u_char *); | 80 | struct ssh *ssh_packet_set_connection(struct ssh *, int, int); |
81 | void packet_set_keycontext(int, u_char *); | 81 | void ssh_packet_set_timeout(struct ssh *, int, int); |
82 | void packet_get_state(int, u_int32_t *, u_int64_t *, u_int32_t *, u_int64_t *); | 82 | int ssh_packet_stop_discard(struct ssh *); |
83 | void packet_set_state(int, u_int32_t, u_int64_t, u_int32_t, u_int64_t); | 83 | int ssh_packet_connection_af(struct ssh *); |
84 | int packet_get_ssh1_cipher(void); | 84 | void ssh_packet_set_nonblocking(struct ssh *); |
85 | void packet_set_iv(int, u_char *); | 85 | int ssh_packet_get_connection_in(struct ssh *); |
86 | void *packet_get_newkeys(int); | 86 | int ssh_packet_get_connection_out(struct ssh *); |
87 | 87 | void ssh_packet_close(struct ssh *); | |
88 | void packet_write_poll(void); | 88 | void ssh_packet_set_encryption_key(struct ssh *, const u_char *, u_int, int); |
89 | void packet_write_wait(void); | 89 | void ssh_packet_set_protocol_flags(struct ssh *, u_int); |
90 | int packet_have_data_to_write(void); | 90 | u_int ssh_packet_get_protocol_flags(struct ssh *); |
91 | int packet_not_very_much_data_to_write(void); | 91 | int ssh_packet_start_compression(struct ssh *, int); |
92 | 92 | void ssh_packet_set_tos(struct ssh *, int); | |
93 | int packet_connection_is_on_socket(void); | 93 | void ssh_packet_set_interactive(struct ssh *, int, int, int); |
94 | int packet_remaining(void); | 94 | int ssh_packet_is_interactive(struct ssh *); |
95 | void packet_send_ignore(int); | 95 | void ssh_packet_set_server(struct ssh *); |
96 | void packet_add_padding(u_char); | 96 | void ssh_packet_set_authenticated(struct ssh *); |
97 | |||
98 | int ssh_packet_send1(struct ssh *); | ||
99 | int ssh_packet_send2_wrapped(struct ssh *); | ||
100 | int ssh_packet_send2(struct ssh *); | ||
101 | |||
102 | int ssh_packet_read(struct ssh *); | ||
103 | int ssh_packet_read_expect(struct ssh *, u_int type); | ||
104 | int ssh_packet_read_poll(struct ssh *); | ||
105 | int ssh_packet_read_poll1(struct ssh *, u_char *); | ||
106 | int ssh_packet_read_poll2(struct ssh *, u_char *, u_int32_t *seqnr_p); | ||
107 | int ssh_packet_process_incoming(struct ssh *, const char *buf, u_int len); | ||
108 | int ssh_packet_read_seqnr(struct ssh *, u_char *, u_int32_t *seqnr_p); | ||
109 | int ssh_packet_read_poll_seqnr(struct ssh *, u_char *, u_int32_t *seqnr_p); | ||
110 | |||
111 | const void *ssh_packet_get_string_ptr(struct ssh *, u_int *length_ptr); | ||
112 | void ssh_packet_disconnect(struct ssh *, const char *fmt, ...) | ||
113 | __attribute__((format(printf, 2, 3))) | ||
114 | __attribute__((noreturn)); | ||
115 | void ssh_packet_send_debug(struct ssh *, const char *fmt, ...) __attribute__((format(printf, 2, 3))); | ||
116 | |||
117 | int ssh_set_newkeys(struct ssh *, int mode); | ||
118 | void ssh_packet_get_bytes(struct ssh *, u_int64_t *, u_int64_t *); | ||
119 | |||
120 | typedef void *(ssh_packet_comp_alloc_func)(void *, u_int, u_int); | ||
121 | typedef void (ssh_packet_comp_free_func)(void *, void *); | ||
122 | void ssh_packet_set_compress_hooks(struct ssh *, void *, | ||
123 | ssh_packet_comp_alloc_func *, ssh_packet_comp_free_func *); | ||
124 | |||
125 | int ssh_packet_write_poll(struct ssh *); | ||
126 | int ssh_packet_write_wait(struct ssh *); | ||
127 | int ssh_packet_have_data_to_write(struct ssh *); | ||
128 | int ssh_packet_not_very_much_data_to_write(struct ssh *); | ||
129 | |||
130 | int ssh_packet_connection_is_on_socket(struct ssh *); | ||
131 | int ssh_packet_remaining(struct ssh *); | ||
132 | void ssh_packet_send_ignore(struct ssh *, int); | ||
97 | 133 | ||
98 | void tty_make_modes(int, struct termios *); | 134 | void tty_make_modes(int, struct termios *); |
99 | void tty_parse_modes(int, int *); | 135 | void tty_parse_modes(int, int *); |
100 | 136 | ||
101 | void packet_set_alive_timeouts(int); | 137 | void ssh_packet_set_alive_timeouts(struct ssh *, int); |
102 | int packet_inc_alive_timeouts(void); | 138 | int ssh_packet_inc_alive_timeouts(struct ssh *); |
103 | int packet_set_maxsize(u_int); | 139 | int ssh_packet_set_maxsize(struct ssh *, u_int); |
104 | u_int packet_get_maxsize(void); | 140 | u_int ssh_packet_get_maxsize(struct ssh *); |
105 | 141 | ||
106 | /* don't allow remaining bytes after the end of the message */ | 142 | int ssh_packet_get_state(struct ssh *, struct sshbuf *); |
107 | #define packet_check_eom() \ | 143 | int ssh_packet_set_state(struct ssh *, struct sshbuf *); |
108 | do { \ | 144 | |
109 | int _len = packet_remaining(); \ | 145 | const char *ssh_remote_ipaddr(struct ssh *); |
110 | if (_len > 0) { \ | 146 | |
111 | logit("Packet integrity error (%d bytes remaining) at %s:%d", \ | 147 | int ssh_packet_need_rekeying(struct ssh *); |
112 | _len ,__FILE__, __LINE__); \ | 148 | void ssh_packet_set_rekey_limits(struct ssh *, u_int32_t, time_t); |
113 | packet_disconnect("Packet integrity error."); \ | 149 | time_t ssh_packet_get_rekey_timeout(struct ssh *); |
114 | } \ | 150 | |
115 | } while (0) | 151 | /* XXX FIXME */ |
116 | 152 | void ssh_packet_backup_state(struct ssh *, struct ssh *); | |
117 | int packet_need_rekeying(void); | 153 | void ssh_packet_restore_state(struct ssh *, struct ssh *); |
118 | void packet_set_rekey_limits(u_int32_t, time_t); | 154 | |
119 | time_t packet_get_rekey_timeout(void); | 155 | void *ssh_packet_get_input(struct ssh *); |
120 | 156 | void *ssh_packet_get_output(struct ssh *); | |
121 | void packet_backup_state(void); | 157 | |
122 | void packet_restore_state(void); | 158 | /* new API */ |
123 | void packet_set_postauth(void); | 159 | int sshpkt_start(struct ssh *ssh, u_char type); |
124 | 160 | int sshpkt_send(struct ssh *ssh); | |
125 | void *packet_get_input(void); | 161 | int sshpkt_disconnect(struct ssh *, const char *fmt, ...) |
126 | void *packet_get_output(void); | 162 | __attribute__((format(printf, 2, 3))); |
163 | int sshpkt_add_padding(struct ssh *, u_char); | ||
164 | void sshpkt_fatal(struct ssh *ssh, const char *tag, int r); | ||
165 | |||
166 | int sshpkt_put(struct ssh *ssh, const void *v, size_t len); | ||
167 | int sshpkt_putb(struct ssh *ssh, const struct sshbuf *b); | ||
168 | int sshpkt_put_u8(struct ssh *ssh, u_char val); | ||
169 | int sshpkt_put_u32(struct ssh *ssh, u_int32_t val); | ||
170 | int sshpkt_put_u64(struct ssh *ssh, u_int64_t val); | ||
171 | int sshpkt_put_string(struct ssh *ssh, const void *v, size_t len); | ||
172 | int sshpkt_put_cstring(struct ssh *ssh, const void *v); | ||
173 | int sshpkt_put_stringb(struct ssh *ssh, const struct sshbuf *v); | ||
174 | int sshpkt_put_ec(struct ssh *ssh, const EC_POINT *v, const EC_GROUP *g); | ||
175 | int sshpkt_put_bignum1(struct ssh *ssh, const BIGNUM *v); | ||
176 | int sshpkt_put_bignum2(struct ssh *ssh, const BIGNUM *v); | ||
177 | |||
178 | int sshpkt_get(struct ssh *ssh, void *valp, size_t len); | ||
179 | int sshpkt_get_u8(struct ssh *ssh, u_char *valp); | ||
180 | int sshpkt_get_u32(struct ssh *ssh, u_int32_t *valp); | ||
181 | int sshpkt_get_u64(struct ssh *ssh, u_int64_t *valp); | ||
182 | int sshpkt_get_string(struct ssh *ssh, u_char **valp, size_t *lenp); | ||
183 | int sshpkt_get_string_direct(struct ssh *ssh, const u_char **valp, size_t *lenp); | ||
184 | int sshpkt_get_cstring(struct ssh *ssh, char **valp, size_t *lenp); | ||
185 | int sshpkt_get_ec(struct ssh *ssh, EC_POINT *v, const EC_GROUP *g); | ||
186 | int sshpkt_get_bignum1(struct ssh *ssh, BIGNUM *v); | ||
187 | int sshpkt_get_bignum2(struct ssh *ssh, BIGNUM *v); | ||
188 | int sshpkt_get_end(struct ssh *ssh); | ||
189 | const u_char *sshpkt_ptr(struct ssh *, size_t *lenp); | ||
190 | |||
191 | /* OLD API */ | ||
192 | extern struct ssh *active_state; | ||
193 | #include "opacket.h" | ||
194 | |||
195 | #if !defined(WITH_OPENSSL) | ||
196 | # undef BIGNUM | ||
197 | # undef EC_KEY | ||
198 | # undef EC_GROUP | ||
199 | # undef EC_POINT | ||
200 | #elif !defined(OPENSSL_HAS_ECC) | ||
201 | # undef EC_KEY | ||
202 | # undef EC_GROUP | ||
203 | # undef EC_POINT | ||
204 | #endif | ||
127 | 205 | ||
128 | #endif /* PACKET_H */ | 206 | #endif /* PACKET_H */ |