| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188 | /* * Abstraction of the binary packet protocols used in SSH. */#ifndef PUTTY_SSHBPP_H#define PUTTY_SSHBPP_Htypedef struct BinaryPacketProtocolVtable BinaryPacketProtocolVtable;struct BinaryPacketProtocolVtable {    void (*free)(BinaryPacketProtocol *);    void (*handle_input)(BinaryPacketProtocol *);    void (*handle_output)(BinaryPacketProtocol *);    PktOut *(*new_pktout)(int type);    void (*queue_disconnect)(BinaryPacketProtocol *,                             const char *msg, int category);    uint32_t packet_size_limit;};struct BinaryPacketProtocol {    const struct BinaryPacketProtocolVtable *vt;    bufchain *in_raw, *out_raw;    bool input_eof;   /* set this if in_raw will never be added to again */    PktInQueue in_pq;    PktOutQueue out_pq;    PacketLogSettings *pls;    LogContext *logctx;    Ssh *ssh;    /* ic_in_raw is filled in by the BPP (probably by calling     * ssh_bpp_common_setup). The BPP's owner triggers it when data is     * added to in_raw, and also when the BPP is newly created. */    IdempotentCallback ic_in_raw;    /* ic_out_pq is entirely internal to the BPP itself; it's used as     * the callback on out_pq. */    IdempotentCallback ic_out_pq;    /* Information that all packet layers sharing this BPP will     * potentially be interested in. */    int remote_bugs;    bool ext_info_rsa_sha256_ok, ext_info_rsa_sha512_ok;    /* Set this if remote connection closure should not generate an     * error message (either because it's not to be treated as an     * error at all, or because some other error message has already     * been emitted). */    bool expect_close;};static inline void ssh_bpp_handle_input(BinaryPacketProtocol *bpp){ bpp->vt->handle_input(bpp); }static inline void ssh_bpp_handle_output(BinaryPacketProtocol *bpp){ bpp->vt->handle_output(bpp); }static inline PktOut *ssh_bpp_new_pktout(BinaryPacketProtocol *bpp, int type){ return bpp->vt->new_pktout(type); }static inline void ssh_bpp_queue_disconnect(BinaryPacketProtocol *bpp,                                            const char *msg, int category){ bpp->vt->queue_disconnect(bpp, msg, category); }/* ssh_bpp_free is more than just a macro wrapper on the vtable; it * does centralised parts of the freeing too. */void ssh_bpp_free(BinaryPacketProtocol *bpp);BinaryPacketProtocol *ssh1_bpp_new(LogContext *logctx);void ssh1_bpp_new_cipher(BinaryPacketProtocol *bpp,                         const ssh_cipheralg *cipher,                         const void *session_key);/* This is only called from outside the BPP in server mode; in client * mode the BPP detects compression start time automatically by * snooping message types */void ssh1_bpp_start_compression(BinaryPacketProtocol *bpp);/* Helper routine which does common BPP initialisation, e.g. setting * up in_pq and out_pq, and initialising input_consumer. */void ssh_bpp_common_setup(BinaryPacketProtocol *);/* Common helper functions between the SSH-2 full and bare BPPs */void ssh2_bpp_queue_disconnect(BinaryPacketProtocol *bpp,                               const char *msg, int category);bool ssh2_bpp_check_unimplemented(BinaryPacketProtocol *bpp, PktIn *pktin);/* Convenience macro for BPPs to send formatted strings to the Event * Log. Assumes a function parameter called 'bpp' is in scope. */#define bpp_logevent(...) ( \    logevent_and_free((bpp)->logctx, dupprintf(__VA_ARGS__)))/* * Structure that tracks how much data is sent and received, for * purposes of triggering an SSH-2 rekey when either one gets over a * configured limit. In each direction, the flag 'running' indicates * that we haven't hit the limit yet, and 'remaining' tracks how much * longer until we do. The function dts_consume() subtracts a given * amount from the counter in a particular direction, and sets * 'expired' if the limit has been hit. * * The limit is sticky: once 'running' has flipped to false, * 'remaining' is no longer decremented, so it shouldn't dangerously * wrap round. */struct DataTransferStatsDirection {    bool running, expired;    unsigned long remaining;};struct DataTransferStats {    struct DataTransferStatsDirection in, out;};static inline void dts_consume(struct DataTransferStatsDirection *s,                               unsigned long size_consumed){    if (s->running) {        if (s->remaining <= size_consumed) {            s->running = false;            s->expired = true;        } else {            s->remaining -= size_consumed;        }    }}static inline void dts_reset(struct DataTransferStatsDirection *s,                             unsigned long starting_size){    s->expired = false;    s->remaining = starting_size;    /*     * The semantics of setting CONF_ssh_rekey_data to zero are to     * disable data-volume based rekeying completely. So if the     * starting size is actually zero, we don't set 'running' to true     * in the first place, which means we won't ever set the expired     * flag.     */    s->running = (starting_size != 0);}BinaryPacketProtocol *ssh2_bpp_new(    LogContext *logctx, struct DataTransferStats *stats, bool is_server);void ssh2_bpp_new_outgoing_crypto(    BinaryPacketProtocol *bpp,    const ssh_cipheralg *cipher, const void *ckey, const void *iv,    const ssh2_macalg *mac, bool etm_mode, const void *mac_key,    const ssh_compression_alg *compression, bool delayed_compression,    bool reset_sequence_number);void ssh2_bpp_new_incoming_crypto(    BinaryPacketProtocol *bpp,    const ssh_cipheralg *cipher, const void *ckey, const void *iv,    const ssh2_macalg *mac, bool etm_mode, const void *mac_key,    const ssh_compression_alg *compression, bool delayed_compression,    bool reset_sequence_number);/* * A query method specific to the interface between ssh2transport and * ssh2bpp. If true, it indicates that we're potentially in the * race-condition-prone part of delayed compression setup and so * asynchronous outgoing transport-layer packets are currently not * being sent, which means in particular that it would be a bad idea * to start a rekey because then we'd stop responding to anything * _other_ than transport-layer packets and deadlock the protocol. */bool ssh2_bpp_rekey_inadvisable(BinaryPacketProtocol *bpp);BinaryPacketProtocol *ssh2_bare_bpp_new(LogContext *logctx);/* * The initial code to handle the SSH version exchange is also * structured as an implementation of BinaryPacketProtocol, because * that makes it easy to switch from that to the next BPP once it * tells us which one we're using. */struct ssh_version_receiver {    void (*got_ssh_version)(struct ssh_version_receiver *rcv,                            int major_version);};BinaryPacketProtocol *ssh_verstring_new(    Conf *conf, LogContext *logctx, bool bare_connection_mode,    const char *protoversion, struct ssh_version_receiver *rcv,    bool server_mode, const char *impl_name);const char *ssh_verstring_get_remote(BinaryPacketProtocol *);const char *ssh_verstring_get_local(BinaryPacketProtocol *);int ssh_verstring_get_bugs(BinaryPacketProtocol *);#ifdef MPEXTconst ssh_cipher * ssh2_bpp_get_cscipher(BinaryPacketProtocol *bpp);const ssh_cipher * ssh2_bpp_get_sccipher(BinaryPacketProtocol *bpp);const struct ssh_compressor * ssh2_bpp_get_cscomp(BinaryPacketProtocol *bpp);const struct ssh_decompressor * ssh2_bpp_get_sccomp(BinaryPacketProtocol *bpp);#endif#endif /* PUTTY_SSHBPP_H */
 |