|
@@ -17,7 +17,6 @@ struct ssh_verstring_state {
|
|
|
int crState;
|
|
|
|
|
|
Conf *conf;
|
|
|
- Frontend *frontend;
|
|
|
ptrlen prefix_wanted;
|
|
|
char *our_protoversion;
|
|
|
struct ssh_version_receiver *receiver;
|
|
@@ -88,7 +87,7 @@ BinaryPacketProtocol *ssh_verstring_new(
|
|
|
assert(s->prefix_wanted.len <= PREFIX_MAXLEN);
|
|
|
|
|
|
s->conf = conf_copy(conf);
|
|
|
- s->frontend = frontend;
|
|
|
+ s->bpp.frontend = frontend;
|
|
|
s->bpp.frontend = frontend;
|
|
|
s->our_protoversion = dupstr(protoversion);
|
|
|
s->receiver = rcv;
|
|
@@ -147,8 +146,8 @@ static int ssh_version_includes_v2(const char *ver)
|
|
|
return ssh_versioncmp(ver, "1.99") >= 0;
|
|
|
}
|
|
|
|
|
|
-#define vs_logevent(printf_args) \
|
|
|
- logevent_and_free(s->frontend, dupprintf printf_args)
|
|
|
+#define bpp_logevent(printf_args) \
|
|
|
+ logevent_and_free(s->bpp.frontend, dupprintf printf_args)
|
|
|
|
|
|
static void ssh_verstring_send(struct ssh_verstring_state *s)
|
|
|
{
|
|
@@ -199,7 +198,7 @@ static void ssh_verstring_send(struct ssh_verstring_state *s)
|
|
|
bufchain_add(s->bpp.out_raw, "\015", 1);
|
|
|
bufchain_add(s->bpp.out_raw, "\012", 1);
|
|
|
|
|
|
- vs_logevent(("We claim version: %s", s->our_vstring));
|
|
|
+ bpp_logevent(("We claim version: %s", s->our_vstring));
|
|
|
}
|
|
|
|
|
|
#define BPP_WAITFOR(minlen) do \
|
|
@@ -309,7 +308,7 @@ void ssh_verstring_handle_input(BinaryPacketProtocol *bpp)
|
|
|
s->vslen--;
|
|
|
s->vstring[s->vslen] = '\0';
|
|
|
|
|
|
- vs_logevent(("Remote version: %s", s->vstring));
|
|
|
+ bpp_logevent(("Remote version: %s", s->vstring));
|
|
|
|
|
|
/*
|
|
|
* Pick out the protocol version and software version. The former
|
|
@@ -375,7 +374,7 @@ void ssh_verstring_handle_input(BinaryPacketProtocol *bpp)
|
|
|
crStopV;
|
|
|
}
|
|
|
|
|
|
- vs_logevent(("Using SSH protocol version %d", s->major_protoversion));
|
|
|
+ bpp_logevent(("Using SSH protocol version %d", s->major_protoversion));
|
|
|
|
|
|
if (!s->send_early) {
|
|
|
/*
|
|
@@ -444,7 +443,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* sniffing.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_CHOKES_ON_SSH1_IGNORE;
|
|
|
- vs_logevent(("We believe remote version has SSH-1 ignore bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-1 ignore bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_plainpw1) == FORCE_ON ||
|
|
@@ -456,8 +455,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* the password.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_NEEDS_SSH1_PLAIN_PASSWORD;
|
|
|
- vs_logevent(("We believe remote version needs a "
|
|
|
- "plain SSH-1 password"));
|
|
|
+ bpp_logevent(("We believe remote version needs a "
|
|
|
+ "plain SSH-1 password"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_rsa1) == FORCE_ON ||
|
|
@@ -469,8 +468,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* an AUTH_RSA message.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_CHOKES_ON_RSA;
|
|
|
- vs_logevent(("We believe remote version can't handle SSH-1 "
|
|
|
- "RSA authentication"));
|
|
|
+ bpp_logevent(("We believe remote version can't handle SSH-1 "
|
|
|
+ "RSA authentication"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_hmac2) == FORCE_ON ||
|
|
@@ -483,7 +482,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* These versions have the HMAC bug.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_HMAC;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 HMAC bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 HMAC bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_derivekey2) == FORCE_ON ||
|
|
@@ -496,8 +495,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* generate the keys).
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_DERIVEKEY;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 "
|
|
|
- "key-derivation bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 "
|
|
|
+ "key-derivation bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_rsapad2) == FORCE_ON ||
|
|
@@ -510,7 +509,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* These versions have the SSH-2 RSA padding bug.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_RSA_PADDING;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 RSA padding bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 RSA padding bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_pksessid2) == FORCE_ON ||
|
|
@@ -521,8 +520,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* public-key authentication.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_PK_SESSIONID;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 "
|
|
|
- "public-key-session-ID bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 "
|
|
|
+ "public-key-session-ID bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_rekey2) == FORCE_ON ||
|
|
@@ -538,7 +537,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* These versions have the SSH-2 rekey bug.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_REKEY;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 rekey bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 rekey bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_maxpkt2) == FORCE_ON ||
|
|
@@ -549,8 +548,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* This version ignores our makpkt and needs to be throttled.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_MAXPKT;
|
|
|
- vs_logevent(("We believe remote version ignores SSH-2 "
|
|
|
- "maximum packet size"));
|
|
|
+ bpp_logevent(("We believe remote version ignores SSH-2 "
|
|
|
+ "maximum packet size"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_ignore2) == FORCE_ON) {
|
|
@@ -559,7 +558,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* none detected automatically.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_CHOKES_ON_SSH2_IGNORE;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 ignore bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 ignore bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_oldgex2) == FORCE_ON ||
|
|
@@ -571,7 +570,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* we use the newer version.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SSH2_OLDGEX;
|
|
|
- vs_logevent(("We believe remote version has outdated SSH-2 GEX"));
|
|
|
+ bpp_logevent(("We believe remote version has outdated SSH-2 GEX"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_winadj) == FORCE_ON) {
|
|
@@ -580,7 +579,7 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* reason or another. Currently, none detected automatically.
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_CHOKES_ON_WINADJ;
|
|
|
- vs_logevent(("We believe remote version has winadj bug"));
|
|
|
+ bpp_logevent(("We believe remote version has winadj bug"));
|
|
|
}
|
|
|
|
|
|
if (conf_get_int(s->conf, CONF_sshbug_chanreq) == FORCE_ON ||
|
|
@@ -597,8 +596,8 @@ static void ssh_detect_bugs(struct ssh_verstring_state *s)
|
|
|
* https://secure.ucc.asn.au/hg/dropbear/rev/cd02449b709c
|
|
|
*/
|
|
|
s->remote_bugs |= BUG_SENDS_LATE_REQUEST_REPLY;
|
|
|
- vs_logevent(("We believe remote version has SSH-2 "
|
|
|
- "channel request bug"));
|
|
|
+ bpp_logevent(("We believe remote version has SSH-2 "
|
|
|
+ "channel request bug"));
|
|
|
}
|
|
|
}
|
|
|
|