blob: eeb6e2ef1268446ccf8fd22d1fac176249cc868c [file] [log] [blame]
Damien Miller5428f641999-11-25 11:54:57 +11001/*
Damien Millere4340be2000-09-16 13:29:08 +11002 * Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
Damien Miller5428f641999-11-25 11:54:57 +11003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
Damien Miller5428f641999-11-25 11:54:57 +110012 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
24
Damien Millerd4a8b7e1999-10-27 13:42:43 +100025#include "includes.h"
Damien Millere4340be2000-09-16 13:29:08 +110026RCSID("$OpenBSD: compat.c,v 1.23 2000/09/07 21:13:37 markus Exp $");
Damien Millerd4a8b7e1999-10-27 13:42:43 +100027
28#include "ssh.h"
Damien Miller33b13562000-04-04 14:38:59 +100029#include "packet.h"
Damien Miller78928792000-04-12 20:17:38 +100030#include "xmalloc.h"
31#include "compat.h"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100032
Damien Miller95def091999-11-25 00:26:21 +110033int compat13 = 0;
Damien Miller33b13562000-04-04 14:38:59 +100034int compat20 = 0;
35int datafellows = 0;
Damien Miller95def091999-11-25 00:26:21 +110036
Damien Miller4af51302000-04-16 11:18:38 +100037void
Damien Miller33b13562000-04-04 14:38:59 +100038enable_compat20(void)
39{
Damien Miller1383bd82000-04-06 12:32:37 +100040 verbose("Enabling compatibility mode for protocol 2.0");
41 compat20 = 1;
Damien Miller33b13562000-04-04 14:38:59 +100042}
Damien Miller4af51302000-04-16 11:18:38 +100043void
Damien Miller95def091999-11-25 00:26:21 +110044enable_compat13(void)
45{
46 verbose("Enabling compatibility mode for protocol 1.3");
47 compat13 = 1;
Damien Millerd4a8b7e1999-10-27 13:42:43 +100048}
Damien Miller33b13562000-04-04 14:38:59 +100049/* datafellows bug compatibility */
50void
51compat_datafellows(const char *version)
52{
53 int i;
54 size_t len;
Damien Miller30c3d422000-05-09 11:02:59 +100055 struct {
56 char *version;
57 int bugs;
58 } check[] = {
59 {"2.1.0", SSH_BUG_SIGBLOB|SSH_BUG_HMAC},
60 {"2.0.1", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|SSH_BUG_PUBKEYAUTH|SSH_BUG_X11FWD},
Damien Millercaf6dd62000-08-29 11:33:50 +110061 {"2.", SSH_BUG_HMAC|SSH_COMPAT_SESSIONID_ENCODING},
Damien Miller30c3d422000-05-09 11:02:59 +100062 {NULL, 0}
Damien Miller33b13562000-04-04 14:38:59 +100063 };
Damien Millercaf6dd62000-08-29 11:33:50 +110064 /* process table, return first match */
Damien Miller30c3d422000-05-09 11:02:59 +100065 for (i = 0; check[i].version; i++) {
66 len = strlen(check[i].version);
Damien Miller33b13562000-04-04 14:38:59 +100067 if (strlen(version) >= len &&
Damien Miller30c3d422000-05-09 11:02:59 +100068 (strncmp(version, check[i].version, len) == 0)) {
Damien Miller78928792000-04-12 20:17:38 +100069 verbose("datafellows: %.200s", version);
Damien Miller30c3d422000-05-09 11:02:59 +100070 datafellows = check[i].bugs;
Damien Miller33b13562000-04-04 14:38:59 +100071 return;
72 }
73 }
74}
Damien Miller78928792000-04-12 20:17:38 +100075
76#define SEP ","
77int
78proto_spec(const char *spec)
79{
Damien Miller37023962000-07-11 17:31:38 +100080 char *s, *p, *q;
Damien Miller78928792000-04-12 20:17:38 +100081 int ret = SSH_PROTO_UNKNOWN;
82
Damien Millerb1715dc2000-05-30 13:44:51 +100083 if (spec == NULL)
84 return ret;
Damien Miller37023962000-07-11 17:31:38 +100085 q = s = xstrdup(spec);
86 for ((p = strsep(&q, SEP)); p && *p != '\0'; (p = strsep(&q, SEP))) {
Damien Miller78928792000-04-12 20:17:38 +100087 switch(atoi(p)) {
88 case 1:
89 if (ret == SSH_PROTO_UNKNOWN)
90 ret |= SSH_PROTO_1_PREFERRED;
91 ret |= SSH_PROTO_1;
92 break;
93 case 2:
94 ret |= SSH_PROTO_2;
95 break;
96 default:
97 log("ignoring bad proto spec: '%s'.", p);
98 break;
99 }
100 }
101 xfree(s);
102 return ret;
103}