blob: 7ef9a38c7779155e66acd28d0efcdfb1c396b60d [file] [log] [blame]
djm@openbsd.org930e8d22017-04-30 23:28:41 +00001/* $OpenBSD: dispatch.c,v 1.29 2017/04/30 23:28:42 djm Exp $ */
Damien Miller4af51302000-04-16 11:18:38 +10002/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
Damien Miller4af51302000-04-16 11:18:38 +100013 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
Damien Millerd7834352006-08-05 12:39:39 +100025
Damien Miller4af51302000-04-16 11:18:38 +100026#include "includes.h"
Ben Lindstrom226cfa02001-01-22 05:34:40 +000027
Damien Millerd7834352006-08-05 12:39:39 +100028#include <sys/types.h>
29
Damien Millerd8337c52006-07-24 14:14:19 +100030#include <signal.h>
Damien Millerd7834352006-08-05 12:39:39 +100031#include <stdarg.h>
Damien Millerd8337c52006-07-24 14:14:19 +100032
Ben Lindstromef1cf5d2001-01-29 07:55:07 +000033#include "ssh2.h"
Ben Lindstrom226cfa02001-01-22 05:34:40 +000034#include "log.h"
Damien Miller4af51302000-04-16 11:18:38 +100035#include "dispatch.h"
36#include "packet.h"
Ben Lindstromef1cf5d2001-01-29 07:55:07 +000037#include "compat.h"
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000038#include "ssherr.h"
Damien Miller4af51302000-04-16 11:18:38 +100039
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000040int
41dispatch_protocol_error(int type, u_int32_t seq, void *ctx)
Damien Miller4af51302000-04-16 11:18:38 +100042{
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000043 struct ssh *ssh = active_state; /* XXX */
44 int r;
45
Damien Miller996acd22003-04-09 20:59:48 +100046 logit("dispatch_protocol_error: type %d seq %u", type, seq);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000047 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 ||
48 (r = sshpkt_put_u32(ssh, seq)) != 0 ||
djm@openbsd.org4509b5d2015-01-30 01:13:33 +000049 (r = sshpkt_send(ssh)) != 0 ||
50 (r = ssh_packet_write_wait(ssh)) != 0)
51 sshpkt_fatal(ssh, __func__, r);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000052 return 0;
Damien Miller7d053392002-01-22 23:24:13 +110053}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000054
55int
56dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh)
Damien Miller7d053392002-01-22 23:24:13 +110057{
Damien Miller996acd22003-04-09 20:59:48 +100058 logit("dispatch_protocol_ignore: type %d seq %u", type, seq);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000059 return 0;
Damien Miller4af51302000-04-16 11:18:38 +100060}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000061
Damien Miller4af51302000-04-16 11:18:38 +100062void
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000063ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt)
Damien Miller4af51302000-04-16 11:18:38 +100064{
Damien Miller7d053392002-01-22 23:24:13 +110065 u_int i;
Damien Miller4af51302000-04-16 11:18:38 +100066 for (i = 0; i < DISPATCH_MAX; i++)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000067 ssh->dispatch[i] = dflt;
Damien Miller4af51302000-04-16 11:18:38 +100068}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000069
Damien Miller4af51302000-04-16 11:18:38 +100070void
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000071ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn)
Damien Miller7d053392002-01-22 23:24:13 +110072{
73 u_int i;
74
75 for (i = from; i <= to; i++) {
76 if (i >= DISPATCH_MAX)
77 break;
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000078 ssh->dispatch[i] = fn;
Damien Miller7d053392002-01-22 23:24:13 +110079 }
80}
Damien Miller4af51302000-04-16 11:18:38 +100081
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000082void
83ssh_dispatch_set(struct ssh *ssh, int type, dispatch_fn *fn)
84{
85 ssh->dispatch[type] = fn;
86}
87
88int
89ssh_dispatch_run(struct ssh *ssh, int mode, volatile sig_atomic_t *done,
90 void *ctxt)
91{
92 int r;
93 u_char type;
94 u_int32_t seqnr;
95
96 for (;;) {
Damien Miller4af51302000-04-16 11:18:38 +100097 if (mode == DISPATCH_BLOCK) {
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000098 r = ssh_packet_read_seqnr(ssh, &type, &seqnr);
99 if (r != 0)
100 return r;
Damien Miller4af51302000-04-16 11:18:38 +1000101 } else {
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000102 r = ssh_packet_read_poll_seqnr(ssh, &type, &seqnr);
103 if (r != 0)
104 return r;
Damien Miller4af51302000-04-16 11:18:38 +1000105 if (type == SSH_MSG_NONE)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000106 return 0;
Damien Miller4af51302000-04-16 11:18:38 +1000107 }
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000108 if (type > 0 && type < DISPATCH_MAX &&
109 ssh->dispatch[type] != NULL) {
110 if (ssh->dispatch_skip_packets) {
111 debug2("skipped packet (type %u)", type);
112 ssh->dispatch_skip_packets--;
113 continue;
114 }
115 /* XXX 'ssh' will replace 'ctxt' later */
116 r = (*ssh->dispatch[type])(type, seqnr, ctxt);
117 if (r != 0)
118 return r;
119 } else {
120 r = sshpkt_disconnect(ssh,
121 "protocol error: rcvd type %d", type);
122 if (r != 0)
123 return r;
124 return SSH_ERR_DISCONNECTED;
125 }
Damien Miller4af51302000-04-16 11:18:38 +1000126 if (done != NULL && *done)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000127 return 0;
Damien Miller4af51302000-04-16 11:18:38 +1000128 }
129}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000130
131void
132ssh_dispatch_run_fatal(struct ssh *ssh, int mode, volatile sig_atomic_t *done,
133 void *ctxt)
134{
135 int r;
136
djm@openbsd.org639d6bc2015-05-01 07:10:01 +0000137 if ((r = ssh_dispatch_run(ssh, mode, done, ctxt)) != 0)
138 sshpkt_fatal(ssh, __func__, r);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000139}