| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376 | /* * General mechanism for wrapping up reading/writing of Windows * HANDLEs into a PuTTY Socket abstraction. */#include <stdio.h>#include <assert.h>#include <limits.h>#define DEFINE_PLUG_METHOD_MACROS#include "tree234.h"#include "putty.h"#include "network.h"typedef struct Socket_handle_tag *Handle_Socket;#ifdef MPEXTextern char *do_select(Plug plug, SOCKET skt, int startup);#endifstruct Socket_handle_tag {    const struct socket_function_table *fn;    /* the above variable absolutely *must* be the first in this structure */    HANDLE send_H, recv_H, stderr_H;    struct handle *send_h, *recv_h, *stderr_h;    /*     * Freezing one of these sockets is a slightly fiddly business,     * because the reads from the handle are happening in a separate     * thread as blocking system calls and so once one is in progress     * it can't sensibly be interrupted. Hence, after the user tries     * to freeze one of these sockets, it's unavoidable that we may     * receive one more load of data before we manage to get     * winhandl.c to stop reading.     */    enum {        UNFROZEN,  /* reading as normal */        FREEZING,  /* have been set to frozen but winhandl is still reading */        FROZEN,    /* really frozen - winhandl has been throttled */        THAWING    /* we're gradually releasing our remaining data */    } frozen;    /* We buffer data here if we receive it from winhandl while frozen. */    bufchain inputdata;    /* Data received from stderr_H, if we have one. */    bufchain stderrdata;    int defer_close, deferred_close;   /* in case of re-entrance */    char *error;    Plug plug;};static int handle_gotdata(struct handle *h, void *data, int len){    Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);    if (len < 0) {	plug_closing(ps->plug, "Read error from handle", 0, 0);	return 0;    } else if (len == 0) {	plug_closing(ps->plug, NULL, 0, 0);	return 0;    } else {        assert(ps->frozen != FROZEN && ps->frozen != THAWING);        if (ps->frozen == FREEZING) {            /*             * If we've received data while this socket is supposed to             * be frozen (because the read winhandl.c started before             * sk_set_frozen was called has now returned) then buffer             * the data for when we unfreeze.             */            bufchain_add(&ps->inputdata, data, len);            ps->frozen = FROZEN;            /*             * And return a very large backlog, to prevent further             * data arriving from winhandl until we unfreeze.             */            return INT_MAX;        } else {            plug_receive(ps->plug, 0, data, len);	    return 0;        }    }}static int handle_stderr(struct handle *h, void *data, int len){    Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);    if (len > 0)    {        log_proxy_stderr(ps->plug, &ps->stderrdata, data, len);    }    return 0;}static void handle_sentdata(struct handle *h, int new_backlog){    Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);    if (new_backlog < 0) {        /* Special case: this is actually reporting an error writing         * to the underlying handle, and our input value is the error         * code itself, negated. */        plug_closing(ps->plug, win_strerror(-new_backlog), -new_backlog, 0);        return;    }    plug_sent(ps->plug, new_backlog);}static Plug sk_handle_plug(Socket s, Plug p){    Handle_Socket ps = (Handle_Socket) s;    Plug ret = ps->plug;    if (p)	ps->plug = p;    return ret;}static void sk_handle_close(Socket s){    Handle_Socket ps = (Handle_Socket) s;    if (ps->defer_close) {        ps->deferred_close = TRUE;        return;    }    #ifdef MPEXT    // WinSCP core uses do_select as signalization of connection up/down    do_select(ps->plug, INVALID_SOCKET, 0);    #endif    handle_free(ps->send_h);    handle_free(ps->recv_h);    CloseHandle(ps->send_H);    if (ps->recv_H != ps->send_H)        CloseHandle(ps->recv_H);#ifdef MPEXT    if (ps->stderr_h)    {        handle_free(ps->stderr_h);    }    if (ps->stderr_H)    {        CloseHandle(ps->stderr_H);    }#endif    bufchain_clear(&ps->inputdata);    bufchain_clear(&ps->stderrdata);    sfree(ps);}static int sk_handle_write(Socket s, const char *data, int len){    Handle_Socket ps = (Handle_Socket) s;    return handle_write(ps->send_h, data, len);}static int sk_handle_write_oob(Socket s, const char *data, int len){    /*     * oob data is treated as inband; nasty, but nothing really     * better we can do     */    return sk_handle_write(s, data, len);}static void sk_handle_write_eof(Socket s){    Handle_Socket ps = (Handle_Socket) s;    handle_write_eof(ps->send_h);}static void sk_handle_flush(Socket s){    /* Handle_Socket ps = (Handle_Socket) s; */    /* do nothing */}static void handle_socket_unfreeze(void *psv){    Handle_Socket ps = (Handle_Socket) psv;    void *data;    int len;    /*     * If we've been put into a state other than THAWING since the     * last callback, then we're done.     */    if (ps->frozen != THAWING)        return;    /*     * Get some of the data we've buffered.     */    bufchain_prefix(&ps->inputdata, &data, &len);    assert(len > 0);    /*     * Hand it off to the plug. Be careful of re-entrance - that might     * have the effect of trying to close this socket.     */    ps->defer_close = TRUE;    plug_receive(ps->plug, 0, data, len);    bufchain_consume(&ps->inputdata, len);    ps->defer_close = FALSE;    if (ps->deferred_close) {        sk_handle_close(ps);        return;    }    if (bufchain_size(&ps->inputdata) > 0) {        /*         * If there's still data in our buffer, stay in THAWING state,         * and reschedule ourself.         */        queue_toplevel_callback(handle_socket_unfreeze, ps);    } else {        /*         * Otherwise, we've successfully thawed!         */        ps->frozen = UNFROZEN;        handle_unthrottle(ps->recv_h, 0);    }}static void sk_handle_set_frozen(Socket s, int is_frozen){    Handle_Socket ps = (Handle_Socket) s;    if (is_frozen) {        switch (ps->frozen) {          case FREEZING:          case FROZEN:            return;                    /* nothing to do */          case THAWING:            /*             * We were in the middle of emptying our bufchain, and got             * frozen again. In that case, winhandl.c is already             * throttled, so just return to FROZEN state. The toplevel             * callback will notice and disable itself.             */            ps->frozen = FROZEN;            break;          case UNFROZEN:            /*             * The normal case. Go to FREEZING, and expect one more             * load of data from winhandl if we're unlucky.             */            ps->frozen = FREEZING;            break;        }    } else {        switch (ps->frozen) {          case UNFROZEN:          case THAWING:            return;                    /* nothing to do */          case FREEZING:            /*             * If winhandl didn't send us any data throughout the time             * we were frozen, then we'll still be in this state and             * can just unfreeze in the trivial way.             */            assert(bufchain_size(&ps->inputdata) == 0);            ps->frozen = UNFROZEN;            break;          case FROZEN:            /*             * If we have buffered data, go to THAWING and start             * releasing it in top-level callbacks.             */            ps->frozen = THAWING;            queue_toplevel_callback(handle_socket_unfreeze, ps);        }    }}static const char *sk_handle_socket_error(Socket s){    Handle_Socket ps = (Handle_Socket) s;    return ps->error;}static char *sk_handle_peer_info(Socket s){    Handle_Socket ps = (Handle_Socket) s;    ULONG pid;    static HMODULE kernel32_module;    DECL_WINDOWS_FUNCTION(static, BOOL, GetNamedPipeClientProcessId,                          (HANDLE, PULONG));    if (!kernel32_module) {        kernel32_module = load_system32_dll("kernel32.dll");#if (defined _MSC_VER && _MSC_VER < 1900) || defined __MINGW32__ || defined COVERITY        /* For older Visual Studio, and MinGW too (at least as of         * Ubuntu 16.04), this function isn't available in the header         * files to type-check. Ditto the toolchain I use for         * Coveritying the Windows code. */        GET_WINDOWS_FUNCTION_NO_TYPECHECK(            kernel32_module, GetNamedPipeClientProcessId);#else        GET_WINDOWS_FUNCTION(            kernel32_module, GetNamedPipeClientProcessId);#endif    }    /*     * Of course, not all handles managed by this module will be     * server ends of named pipes, but if they are, then it's useful     * to log what we can find out about the client end.     */    if (p_GetNamedPipeClientProcessId &&        p_GetNamedPipeClientProcessId(ps->send_H, &pid))        return dupprintf("process id %lu", (unsigned long)pid);    return NULL;}Socket make_handle_socket(HANDLE send_H, HANDLE recv_H, HANDLE stderr_H,                          Plug plug, int overlapped){    static const struct socket_function_table socket_fn_table = {	sk_handle_plug,	sk_handle_close,	sk_handle_write,	sk_handle_write_oob,	sk_handle_write_eof,	sk_handle_flush,	sk_handle_set_frozen,	sk_handle_socket_error,        sk_handle_peer_info,    };    Handle_Socket ret;    int flags = (overlapped ? HANDLE_FLAG_OVERLAPPED : 0);    ret = snew(struct Socket_handle_tag);    ret->fn = &socket_fn_table;    ret->plug = plug;    ret->error = NULL;    ret->frozen = UNFROZEN;    bufchain_init(&ret->inputdata);    bufchain_init(&ret->stderrdata);    ret->recv_H = recv_H;    ret->recv_h = handle_input_new(ret->recv_H, handle_gotdata, ret, flags);    ret->send_H = send_H;    ret->send_h = handle_output_new(ret->send_H, handle_sentdata, ret, flags);    ret->stderr_H = stderr_H;    if (ret->stderr_H)        ret->stderr_h = handle_input_new(ret->stderr_H, handle_stderr,                                         ret, flags);    ret->defer_close = ret->deferred_close = FALSE;    #ifdef MPEXT    // WinSCP core uses do_select as signalization of connection up/down    do_select(plug, INVALID_SOCKET, 1);    #endif    return (Socket) ret;}
 |