djm@openbsd.org | f1dd179 | 2018-10-04 00:10:11 +0000 | [diff] [blame] | 1 | /* $OpenBSD: channels.h,v 1.132 2018/10/04 00:10:11 djm Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 3 | /* |
| 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
| 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 6 | * All rights reserved |
| 7 | * |
| 8 | * As far as I am concerned, the code I have written for this software |
| 9 | * can be used freely for any purpose. Any derived versions of this |
| 10 | * software must be clearly marked as such, and if the derived work is |
| 11 | * incompatible with the protocol description in the RFC file, it must be |
| 12 | * called by a name other than "ssh" or "Secure Shell". |
| 13 | */ |
| 14 | /* |
Damien Miller | b51ed39 | 2002-01-22 23:29:03 +1100 | [diff] [blame] | 15 | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 16 | * |
| 17 | * Redistribution and use in source and binary forms, with or without |
| 18 | * modification, are permitted provided that the following conditions |
| 19 | * are met: |
| 20 | * 1. Redistributions of source code must retain the above copyright |
| 21 | * notice, this list of conditions and the following disclaimer. |
| 22 | * 2. Redistributions in binary form must reproduce the above copyright |
| 23 | * notice, this list of conditions and the following disclaimer in the |
| 24 | * documentation and/or other materials provided with the distribution. |
| 25 | * |
| 26 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 27 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 28 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 29 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 30 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 31 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 32 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 33 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 34 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 35 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 36 | */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 37 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 38 | #ifndef CHANNEL_H |
| 39 | #define CHANNEL_H |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 40 | |
| 41 | /* Definitions for channel types. */ |
Damien Miller | 5428f64 | 1999-11-25 11:54:57 +1100 | [diff] [blame] | 42 | #define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 43 | #define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */ |
| 44 | #define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */ |
| 45 | #define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */ |
Damien Miller | 5428f64 | 1999-11-25 11:54:57 +1100 | [diff] [blame] | 46 | #define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 47 | #define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */ |
| 48 | #define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 49 | #define SSH_CHANNEL_LARVAL 10 /* larval session */ |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 50 | #define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */ |
Ben Lindstrom | 7ad9710 | 2000-12-06 01:42:49 +0000 | [diff] [blame] | 51 | #define SSH_CHANNEL_CONNECTING 12 |
Ben Lindstrom | 3bb4f9d | 2001-04-08 18:30:26 +0000 | [diff] [blame] | 52 | #define SSH_CHANNEL_DYNAMIC 13 |
Ben Lindstrom | c0dee1a | 2001-06-05 20:52:50 +0000 | [diff] [blame] | 53 | #define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */ |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 54 | #define SSH_CHANNEL_MUX_LISTENER 15 /* Listener for mux conn. */ |
| 55 | #define SSH_CHANNEL_MUX_CLIENT 16 /* Conn. to mux slave */ |
Damien Miller | 3618709 | 2013-06-10 13:07:11 +1000 | [diff] [blame] | 56 | #define SSH_CHANNEL_ABANDONED 17 /* Abandoned session, eg mux */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 57 | #define SSH_CHANNEL_UNIX_LISTENER 18 /* Listening on a domain socket. */ |
| 58 | #define SSH_CHANNEL_RUNIX_LISTENER 19 /* Listening to a R-style domain socket. */ |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 59 | #define SSH_CHANNEL_MUX_PROXY 20 /* proxy channel for mux-slave */ |
markus@openbsd.org | 609d7a6 | 2017-09-21 19:16:53 +0000 | [diff] [blame] | 60 | #define SSH_CHANNEL_RDYNAMIC_OPEN 21 /* reverse SOCKS, parsing request */ |
| 61 | #define SSH_CHANNEL_RDYNAMIC_FINISH 22 /* reverse SOCKS, finishing connect */ |
| 62 | #define SSH_CHANNEL_MAX_TYPE 23 |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 63 | |
Damien Miller | ff77364 | 2011-09-22 21:39:48 +1000 | [diff] [blame] | 64 | #define CHANNEL_CANCEL_PORT_STATIC -1 |
| 65 | |
djm@openbsd.org | 115063a | 2018-06-06 18:22:41 +0000 | [diff] [blame] | 66 | /* TCP forwarding */ |
| 67 | #define FORWARD_DENY 0 |
| 68 | #define FORWARD_REMOTE (1) |
| 69 | #define FORWARD_LOCAL (1<<1) |
| 70 | #define FORWARD_ALLOW (FORWARD_REMOTE|FORWARD_LOCAL) |
| 71 | |
| 72 | #define FORWARD_ADM 0x100 |
| 73 | #define FORWARD_USER 0x101 |
| 74 | |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 75 | struct ssh; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 76 | struct Channel; |
| 77 | typedef struct Channel Channel; |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 78 | struct fwd_perm_list; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 79 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 80 | typedef void channel_open_fn(struct ssh *, int, int, void *); |
| 81 | typedef void channel_callback_fn(struct ssh *, int, void *); |
| 82 | typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int); |
| 83 | typedef void channel_filter_cleanup_fn(struct ssh *, int, void *); |
| 84 | typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *, |
| 85 | u_char **, size_t *); |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 86 | |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 87 | /* Channel success/failure callbacks */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 88 | typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *); |
| 89 | typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *); |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 90 | struct channel_confirm { |
| 91 | TAILQ_ENTRY(channel_confirm) entry; |
| 92 | channel_confirm_cb *cb; |
| 93 | channel_confirm_abandon_cb *abandon_cb; |
| 94 | void *ctx; |
| 95 | }; |
| 96 | TAILQ_HEAD(channel_confirms, channel_confirm); |
| 97 | |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 98 | /* Context for non-blocking connects */ |
| 99 | struct channel_connect { |
| 100 | char *host; |
| 101 | int port; |
| 102 | struct addrinfo *ai, *aitop; |
| 103 | }; |
| 104 | |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 105 | /* Callbacks for mux channels back into client-specific code */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 106 | typedef int mux_callback_fn(struct ssh *, struct Channel *); |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 107 | |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 108 | struct Channel { |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 109 | int type; /* channel type/state */ |
| 110 | int self; /* my own channel identifier */ |
djm@openbsd.org | 9f53229 | 2017-09-12 06:35:31 +0000 | [diff] [blame] | 111 | uint32_t remote_id; /* channel identifier for remote peer */ |
| 112 | int have_remote_id; /* non-zero if remote_id is valid */ |
| 113 | |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 114 | u_int istate; /* input from channel (state of receive half) */ |
| 115 | u_int ostate; /* output to channel (state of transmit half) */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 116 | int flags; /* close sent/rcvd */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 117 | int rfd; /* read fd */ |
| 118 | int wfd; /* write fd */ |
| 119 | int efd; /* extended fd */ |
| 120 | int sock; /* sock fd */ |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 121 | int ctl_chan; /* control channel (multiplexed connections) */ |
Damien Miller | 79438cc | 2001-02-16 12:34:57 +1100 | [diff] [blame] | 122 | int isatty; /* rfd is a tty */ |
Damien Miller | c192a4c | 2013-08-01 14:29:20 +1000 | [diff] [blame] | 123 | #ifdef _AIX |
Ben Lindstrom | beb5f33 | 2002-07-22 15:28:53 +0000 | [diff] [blame] | 124 | int wfd_isatty; /* wfd is a tty */ |
Damien Miller | c192a4c | 2013-08-01 14:29:20 +1000 | [diff] [blame] | 125 | #endif |
Darren Tucker | 5d78de6 | 2004-11-05 20:35:44 +1100 | [diff] [blame] | 126 | int client_tty; /* (client) TTY has been requested */ |
Damien Miller | 4623a75 | 2001-10-10 15:03:58 +1000 | [diff] [blame] | 127 | int force_drain; /* force close on iEOF */ |
Damien Miller | a650875 | 2012-04-22 11:21:10 +1000 | [diff] [blame] | 128 | time_t notbefore; /* Pause IO until deadline (time_t) */ |
Darren Tucker | 876045b | 2010-01-08 17:08:00 +1100 | [diff] [blame] | 129 | int delayed; /* post-select handlers for newly created |
| 130 | * channels are delayed until the first call |
djm@openbsd.org | c28a343 | 2015-05-08 06:45:13 +0000 | [diff] [blame] | 131 | * to a matching pre-select handler. |
Darren Tucker | 876045b | 2010-01-08 17:08:00 +1100 | [diff] [blame] | 132 | * this way post-select handlers are not |
Darren Tucker | 5d12b8f | 2013-06-06 08:09:10 +1000 | [diff] [blame] | 133 | * accidentally called if a FD gets reused */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 134 | struct sshbuf *input; /* data read from socket, to be sent over |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 135 | * encrypted connection */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 136 | struct sshbuf *output; /* data received over encrypted connection for |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 137 | * send on socket */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 138 | struct sshbuf *extended; |
| 139 | |
Damien Miller | a1c1b6c | 2009-01-28 16:29:49 +1100 | [diff] [blame] | 140 | char *path; |
Ben Lindstrom | 99c73b3 | 2001-05-05 04:09:47 +0000 | [diff] [blame] | 141 | /* path for unix domain sockets, or host name for forwards */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 142 | int listening_port; /* port being listened for forwards */ |
Damien Miller | f6dff7c | 2011-09-22 21:38:52 +1000 | [diff] [blame] | 143 | char *listening_addr; /* addr being listened for forwards */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 144 | int host_port; /* remote port to connect for forwards */ |
| 145 | char *remote_name; /* remote hostname */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 146 | |
Ben Lindstrom | 4fed2be | 2002-06-25 23:17:36 +0000 | [diff] [blame] | 147 | u_int remote_window; |
| 148 | u_int remote_maxpacket; |
| 149 | u_int local_window; |
| 150 | u_int local_window_max; |
| 151 | u_int local_consumed; |
| 152 | u_int local_maxpacket; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 153 | int extended_usage; |
Damien Miller | e737856 | 2001-12-21 14:58:35 +1100 | [diff] [blame] | 154 | int single_connection; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 155 | |
| 156 | char *ctype; /* type */ |
| 157 | |
Damien Miller | e247cc4 | 2000-05-07 12:03:14 +1000 | [diff] [blame] | 158 | /* callback */ |
Damien Miller | d530f5f | 2010-05-21 14:57:10 +1000 | [diff] [blame] | 159 | channel_open_fn *open_confirm; |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 160 | void *open_confirm_ctx; |
Damien Miller | 39eda6e | 2005-11-05 14:52:50 +1100 | [diff] [blame] | 161 | channel_callback_fn *detach_user; |
| 162 | int detach_close; |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 163 | struct channel_confirms status_confirms; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 164 | |
| 165 | /* filter */ |
Damien Miller | 077b238 | 2005-12-31 16:22:32 +1100 | [diff] [blame] | 166 | channel_infilter_fn *input_filter; |
| 167 | channel_outfilter_fn *output_filter; |
Darren Tucker | 2fb66ca | 2008-06-13 04:49:33 +1000 | [diff] [blame] | 168 | void *filter_ctx; |
Darren Tucker | 84c56f5 | 2008-06-13 04:55:46 +1000 | [diff] [blame] | 169 | channel_filter_cleanup_fn *filter_cleanup; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 170 | |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 171 | /* keep boundaries */ |
| 172 | int datagram; |
| 173 | |
| 174 | /* non-blocking connect */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 175 | /* XXX make this a pointer so the structure can be opaque */ |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 176 | struct channel_connect connect_ctx; |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 177 | |
| 178 | /* multiplexing protocol hook, called for each packet received */ |
| 179 | mux_callback_fn *mux_rcb; |
| 180 | void *mux_ctx; |
Damien Miller | d530f5f | 2010-05-21 14:57:10 +1000 | [diff] [blame] | 181 | int mux_pause; |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 182 | int mux_downstream_id; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 183 | }; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 184 | |
| 185 | #define CHAN_EXTENDED_IGNORE 0 |
| 186 | #define CHAN_EXTENDED_READ 1 |
| 187 | #define CHAN_EXTENDED_WRITE 2 |
| 188 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 189 | /* default window/packet sizes for tcp/x11-fwd-channel */ |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 190 | #define CHAN_SES_PACKET_DEFAULT (32*1024) |
Darren Tucker | 395ecc2 | 2007-06-12 23:38:53 +1000 | [diff] [blame] | 191 | #define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT) |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 192 | #define CHAN_TCP_PACKET_DEFAULT (32*1024) |
Darren Tucker | 395ecc2 | 2007-06-12 23:38:53 +1000 | [diff] [blame] | 193 | #define CHAN_TCP_WINDOW_DEFAULT (64*CHAN_TCP_PACKET_DEFAULT) |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 194 | #define CHAN_X11_PACKET_DEFAULT (16*1024) |
| 195 | #define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT) |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 196 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 197 | /* possible input states */ |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 198 | #define CHAN_INPUT_OPEN 0 |
| 199 | #define CHAN_INPUT_WAIT_DRAIN 1 |
| 200 | #define CHAN_INPUT_WAIT_OCLOSE 2 |
| 201 | #define CHAN_INPUT_CLOSED 3 |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 202 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 203 | /* possible output states */ |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 204 | #define CHAN_OUTPUT_OPEN 0 |
| 205 | #define CHAN_OUTPUT_WAIT_DRAIN 1 |
| 206 | #define CHAN_OUTPUT_WAIT_IEOF 2 |
| 207 | #define CHAN_OUTPUT_CLOSED 3 |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 208 | |
| 209 | #define CHAN_CLOSE_SENT 0x01 |
| 210 | #define CHAN_CLOSE_RCVD 0x02 |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 211 | #define CHAN_EOF_SENT 0x04 |
| 212 | #define CHAN_EOF_RCVD 0x08 |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 213 | #define CHAN_LOCAL 0x10 |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 214 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 215 | /* Read buffer size */ |
| 216 | #define CHAN_RBUF (16*1024) |
| 217 | |
| 218 | /* Hard limit on number of channels */ |
| 219 | #define CHANNELS_MAX_CHANNELS (16*1024) |
Damien Miller | 077b238 | 2005-12-31 16:22:32 +1100 | [diff] [blame] | 220 | |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 221 | /* check whether 'efd' is still in use */ |
| 222 | #define CHANNEL_EFD_INPUT_ACTIVE(c) \ |
djm@openbsd.org | 97f4d30 | 2017-04-30 23:13:25 +0000 | [diff] [blame] | 223 | (c->extended_usage == CHAN_EXTENDED_READ && \ |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 224 | (c->efd != -1 || \ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 225 | sshbuf_len(c->extended) > 0)) |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 226 | #define CHANNEL_EFD_OUTPUT_ACTIVE(c) \ |
djm@openbsd.org | 97f4d30 | 2017-04-30 23:13:25 +0000 | [diff] [blame] | 227 | (c->extended_usage == CHAN_EXTENDED_WRITE && \ |
Darren Tucker | ce377c3 | 2005-07-14 17:05:51 +1000 | [diff] [blame] | 228 | c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 229 | sshbuf_len(c->extended) > 0)) |
| 230 | |
| 231 | /* Add channel management structures to SSH transport instance */ |
| 232 | void channel_init_channels(struct ssh *ssh); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 233 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 234 | /* channel management */ |
| 235 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 236 | Channel *channel_by_id(struct ssh *, int); |
djm@openbsd.org | 9f53229 | 2017-09-12 06:35:31 +0000 | [diff] [blame] | 237 | Channel *channel_by_remote_id(struct ssh *, u_int); |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 238 | Channel *channel_lookup(struct ssh *, int); |
| 239 | Channel *channel_new(struct ssh *, char *, int, int, int, int, |
| 240 | u_int, u_int, int, char *, int); |
| 241 | void channel_set_fds(struct ssh *, int, int, int, int, int, |
| 242 | int, int, u_int); |
| 243 | void channel_free(struct ssh *, Channel *); |
| 244 | void channel_free_all(struct ssh *); |
| 245 | void channel_stop_listening(struct ssh *); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 246 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 247 | void channel_send_open(struct ssh *, int); |
| 248 | void channel_request_start(struct ssh *, int, char *, int); |
| 249 | void channel_register_cleanup(struct ssh *, int, |
| 250 | channel_callback_fn *, int); |
| 251 | void channel_register_open_confirm(struct ssh *, int, |
| 252 | channel_open_fn *, void *); |
| 253 | void channel_register_filter(struct ssh *, int, channel_infilter_fn *, |
| 254 | channel_outfilter_fn *, channel_filter_cleanup_fn *, void *); |
| 255 | void channel_register_status_confirm(struct ssh *, int, |
| 256 | channel_confirm_cb *, channel_confirm_abandon_cb *, void *); |
| 257 | void channel_cancel_cleanup(struct ssh *, int); |
| 258 | int channel_close_fd(struct ssh *, int *); |
| 259 | void channel_send_window_changes(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 260 | |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 261 | /* mux proxy support */ |
| 262 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 263 | int channel_proxy_downstream(struct ssh *, Channel *mc); |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 264 | int channel_proxy_upstream(Channel *, int, u_int32_t, struct ssh *); |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 265 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 266 | /* protocol handler */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 267 | |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 268 | int channel_input_data(int, u_int32_t, struct ssh *); |
| 269 | int channel_input_extended_data(int, u_int32_t, struct ssh *); |
| 270 | int channel_input_ieof(int, u_int32_t, struct ssh *); |
| 271 | int channel_input_oclose(int, u_int32_t, struct ssh *); |
| 272 | int channel_input_open_confirmation(int, u_int32_t, struct ssh *); |
| 273 | int channel_input_open_failure(int, u_int32_t, struct ssh *); |
| 274 | int channel_input_port_open(int, u_int32_t, struct ssh *); |
| 275 | int channel_input_window_adjust(int, u_int32_t, struct ssh *); |
| 276 | int channel_input_status_confirm(int, u_int32_t, struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 277 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 278 | /* file descriptor handling (read/write) */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 279 | |
djm@openbsd.org | 71e5a53 | 2017-08-30 03:59:08 +0000 | [diff] [blame] | 280 | void channel_prepare_select(struct ssh *, fd_set **, fd_set **, int *, |
| 281 | u_int*, time_t*); |
| 282 | void channel_after_select(struct ssh *, fd_set *, fd_set *); |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 283 | void channel_output_poll(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 284 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 285 | int channel_not_very_much_buffered_data(struct ssh *); |
| 286 | void channel_close_all(struct ssh *); |
| 287 | int channel_still_open(struct ssh *); |
djm@openbsd.org | f1dd179 | 2018-10-04 00:10:11 +0000 | [diff] [blame] | 288 | const char *channel_format_extended_usage(const Channel *); |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 289 | char *channel_open_message(struct ssh *); |
| 290 | int channel_find_open(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 291 | |
Ben Lindstrom | 908afed | 2001-10-03 17:34:59 +0000 | [diff] [blame] | 292 | /* tcp forwarding */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 293 | struct Forward; |
| 294 | struct ForwardOptions; |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 295 | void channel_set_af(struct ssh *, int af); |
djm@openbsd.org | 115063a | 2018-06-06 18:22:41 +0000 | [diff] [blame] | 296 | void channel_permit_all(struct ssh *, int); |
| 297 | void channel_add_permission(struct ssh *, int, int, char *, int); |
| 298 | void channel_clear_permission(struct ssh *, int, int); |
| 299 | void channel_disable_admin(struct ssh *, int); |
| 300 | void channel_update_permission(struct ssh *, int, int); |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 301 | Channel *channel_connect_to_port(struct ssh *, const char *, u_short, |
| 302 | char *, char *, int *, const char **); |
| 303 | Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *); |
| 304 | Channel *channel_connect_stdio_fwd(struct ssh *, const char*, |
| 305 | u_short, int, int); |
| 306 | Channel *channel_connect_by_listen_address(struct ssh *, const char *, |
| 307 | u_short, char *, char *); |
| 308 | Channel *channel_connect_by_listen_path(struct ssh *, const char *, |
| 309 | char *, char *); |
| 310 | int channel_request_remote_forwarding(struct ssh *, struct Forward *); |
| 311 | int channel_setup_local_fwd_listener(struct ssh *, struct Forward *, |
| 312 | struct ForwardOptions *); |
| 313 | int channel_request_rforward_cancel(struct ssh *, struct Forward *); |
| 314 | int channel_setup_remote_fwd_listener(struct ssh *, struct Forward *, |
| 315 | int *, struct ForwardOptions *); |
| 316 | int channel_cancel_rport_listener(struct ssh *, struct Forward *); |
| 317 | int channel_cancel_lport_listener(struct ssh *, struct Forward *, |
| 318 | int, struct ForwardOptions *); |
Darren Tucker | 1338b9e | 2011-10-02 18:57:35 +1100 | [diff] [blame] | 319 | int permitopen_port(const char *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 320 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 321 | /* x11 forwarding */ |
| 322 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 323 | void channel_set_x11_refuse_time(struct ssh *, u_int); |
| 324 | int x11_connect_display(struct ssh *); |
| 325 | int x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **); |
| 326 | void x11_request_forwarding_with_spoofing(struct ssh *, int, |
| 327 | const char *, const char *, const char *, int); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 328 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 329 | /* channel close */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 330 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 331 | int chan_is_dead(struct ssh *, Channel *, int); |
| 332 | void chan_mark_dead(struct ssh *, Channel *); |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 333 | |
Damien Miller | 5144df9 | 2002-01-22 23:28:45 +1100 | [diff] [blame] | 334 | /* channel events */ |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 335 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame] | 336 | void chan_rcvd_oclose(struct ssh *, Channel *); |
| 337 | void chan_rcvd_eow(struct ssh *, Channel *); |
| 338 | void chan_read_failed(struct ssh *, Channel *); |
| 339 | void chan_ibuf_empty(struct ssh *, Channel *); |
| 340 | void chan_rcvd_ieof(struct ssh *, Channel *); |
| 341 | void chan_write_failed(struct ssh *, Channel *); |
| 342 | void chan_obuf_empty(struct ssh *, Channel *); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 343 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 344 | #endif |