djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 1 | /* $OpenBSD: channels.h,v 1.128 2017/09/12 06:32:07 djm Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 3 | /* |
| 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
| 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 6 | * All rights reserved |
| 7 | * |
| 8 | * As far as I am concerned, the code I have written for this software |
| 9 | * can be used freely for any purpose. Any derived versions of this |
| 10 | * software must be clearly marked as such, and if the derived work is |
| 11 | * incompatible with the protocol description in the RFC file, it must be |
| 12 | * called by a name other than "ssh" or "Secure Shell". |
| 13 | */ |
| 14 | /* |
Damien Miller | b51ed39 | 2002-01-22 23:29:03 +1100 | [diff] [blame] | 15 | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 16 | * |
| 17 | * Redistribution and use in source and binary forms, with or without |
| 18 | * modification, are permitted provided that the following conditions |
| 19 | * are met: |
| 20 | * 1. Redistributions of source code must retain the above copyright |
| 21 | * notice, this list of conditions and the following disclaimer. |
| 22 | * 2. Redistributions in binary form must reproduce the above copyright |
| 23 | * notice, this list of conditions and the following disclaimer in the |
| 24 | * documentation and/or other materials provided with the distribution. |
| 25 | * |
| 26 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 27 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 28 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 29 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 30 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 31 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 32 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 33 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 34 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 35 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 36 | */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 37 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 38 | #ifndef CHANNEL_H |
| 39 | #define CHANNEL_H |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 40 | |
| 41 | /* Definitions for channel types. */ |
Damien Miller | 5428f64 | 1999-11-25 11:54:57 +1100 | [diff] [blame] | 42 | #define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 43 | #define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */ |
| 44 | #define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */ |
| 45 | #define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */ |
Damien Miller | 5428f64 | 1999-11-25 11:54:57 +1100 | [diff] [blame] | 46 | #define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 47 | #define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */ |
| 48 | #define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 49 | #define SSH_CHANNEL_LARVAL 10 /* larval session */ |
Damien Miller | 0bc1bd8 | 2000-11-13 22:57:25 +1100 | [diff] [blame] | 50 | #define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */ |
Ben Lindstrom | 7ad9710 | 2000-12-06 01:42:49 +0000 | [diff] [blame] | 51 | #define SSH_CHANNEL_CONNECTING 12 |
Ben Lindstrom | 3bb4f9d | 2001-04-08 18:30:26 +0000 | [diff] [blame] | 52 | #define SSH_CHANNEL_DYNAMIC 13 |
Ben Lindstrom | c0dee1a | 2001-06-05 20:52:50 +0000 | [diff] [blame] | 53 | #define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */ |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 54 | #define SSH_CHANNEL_MUX_LISTENER 15 /* Listener for mux conn. */ |
| 55 | #define SSH_CHANNEL_MUX_CLIENT 16 /* Conn. to mux slave */ |
Damien Miller | 3618709 | 2013-06-10 13:07:11 +1000 | [diff] [blame] | 56 | #define SSH_CHANNEL_ABANDONED 17 /* Abandoned session, eg mux */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 57 | #define SSH_CHANNEL_UNIX_LISTENER 18 /* Listening on a domain socket. */ |
| 58 | #define SSH_CHANNEL_RUNIX_LISTENER 19 /* Listening to a R-style domain socket. */ |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 59 | #define SSH_CHANNEL_MUX_PROXY 20 /* proxy channel for mux-slave */ |
| 60 | #define SSH_CHANNEL_MAX_TYPE 21 |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 61 | |
Damien Miller | ff77364 | 2011-09-22 21:39:48 +1000 | [diff] [blame] | 62 | #define CHANNEL_CANCEL_PORT_STATIC -1 |
| 63 | |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 64 | struct ssh; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 65 | struct Channel; |
| 66 | typedef struct Channel Channel; |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 67 | struct fwd_perm_list; |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 68 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 69 | typedef void channel_open_fn(struct ssh *, int, int, void *); |
| 70 | typedef void channel_callback_fn(struct ssh *, int, void *); |
| 71 | typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int); |
| 72 | typedef void channel_filter_cleanup_fn(struct ssh *, int, void *); |
| 73 | typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *, |
| 74 | u_char **, size_t *); |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 75 | |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 76 | /* Channel success/failure callbacks */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 77 | typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *); |
| 78 | typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *); |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 79 | struct channel_confirm { |
| 80 | TAILQ_ENTRY(channel_confirm) entry; |
| 81 | channel_confirm_cb *cb; |
| 82 | channel_confirm_abandon_cb *abandon_cb; |
| 83 | void *ctx; |
| 84 | }; |
| 85 | TAILQ_HEAD(channel_confirms, channel_confirm); |
| 86 | |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 87 | /* Context for non-blocking connects */ |
| 88 | struct channel_connect { |
| 89 | char *host; |
| 90 | int port; |
| 91 | struct addrinfo *ai, *aitop; |
| 92 | }; |
| 93 | |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 94 | /* Callbacks for mux channels back into client-specific code */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 95 | typedef int mux_callback_fn(struct ssh *, struct Channel *); |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 96 | |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 97 | struct Channel { |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 98 | int type; /* channel type/state */ |
| 99 | int self; /* my own channel identifier */ |
| 100 | int remote_id; /* channel identifier for remote peer */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 101 | /* XXX should be uint32_t */ |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 102 | u_int istate; /* input from channel (state of receive half) */ |
| 103 | u_int ostate; /* output to channel (state of transmit half) */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 104 | int flags; /* close sent/rcvd */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 105 | int rfd; /* read fd */ |
| 106 | int wfd; /* write fd */ |
| 107 | int efd; /* extended fd */ |
| 108 | int sock; /* sock fd */ |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 109 | int ctl_chan; /* control channel (multiplexed connections) */ |
Damien Miller | 79438cc | 2001-02-16 12:34:57 +1100 | [diff] [blame] | 110 | int isatty; /* rfd is a tty */ |
Damien Miller | c192a4c | 2013-08-01 14:29:20 +1000 | [diff] [blame] | 111 | #ifdef _AIX |
Ben Lindstrom | beb5f33 | 2002-07-22 15:28:53 +0000 | [diff] [blame] | 112 | int wfd_isatty; /* wfd is a tty */ |
Damien Miller | c192a4c | 2013-08-01 14:29:20 +1000 | [diff] [blame] | 113 | #endif |
Darren Tucker | 5d78de6 | 2004-11-05 20:35:44 +1100 | [diff] [blame] | 114 | int client_tty; /* (client) TTY has been requested */ |
Damien Miller | 4623a75 | 2001-10-10 15:03:58 +1000 | [diff] [blame] | 115 | int force_drain; /* force close on iEOF */ |
Damien Miller | a650875 | 2012-04-22 11:21:10 +1000 | [diff] [blame] | 116 | time_t notbefore; /* Pause IO until deadline (time_t) */ |
Darren Tucker | 876045b | 2010-01-08 17:08:00 +1100 | [diff] [blame] | 117 | int delayed; /* post-select handlers for newly created |
| 118 | * channels are delayed until the first call |
djm@openbsd.org | c28a343 | 2015-05-08 06:45:13 +0000 | [diff] [blame] | 119 | * to a matching pre-select handler. |
Darren Tucker | 876045b | 2010-01-08 17:08:00 +1100 | [diff] [blame] | 120 | * this way post-select handlers are not |
Darren Tucker | 5d12b8f | 2013-06-06 08:09:10 +1000 | [diff] [blame] | 121 | * accidentally called if a FD gets reused */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 122 | struct sshbuf *input; /* data read from socket, to be sent over |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 123 | * encrypted connection */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 124 | struct sshbuf *output; /* data received over encrypted connection for |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 125 | * send on socket */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 126 | struct sshbuf *extended; |
| 127 | |
Damien Miller | a1c1b6c | 2009-01-28 16:29:49 +1100 | [diff] [blame] | 128 | char *path; |
Ben Lindstrom | 99c73b3 | 2001-05-05 04:09:47 +0000 | [diff] [blame] | 129 | /* path for unix domain sockets, or host name for forwards */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 130 | int listening_port; /* port being listened for forwards */ |
Damien Miller | f6dff7c | 2011-09-22 21:38:52 +1000 | [diff] [blame] | 131 | char *listening_addr; /* addr being listened for forwards */ |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 132 | int host_port; /* remote port to connect for forwards */ |
| 133 | char *remote_name; /* remote hostname */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 134 | |
Ben Lindstrom | 4fed2be | 2002-06-25 23:17:36 +0000 | [diff] [blame] | 135 | u_int remote_window; |
| 136 | u_int remote_maxpacket; |
| 137 | u_int local_window; |
| 138 | u_int local_window_max; |
| 139 | u_int local_consumed; |
| 140 | u_int local_maxpacket; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 141 | int extended_usage; |
Damien Miller | e737856 | 2001-12-21 14:58:35 +1100 | [diff] [blame] | 142 | int single_connection; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 143 | |
| 144 | char *ctype; /* type */ |
| 145 | |
Damien Miller | e247cc4 | 2000-05-07 12:03:14 +1000 | [diff] [blame] | 146 | /* callback */ |
Damien Miller | d530f5f | 2010-05-21 14:57:10 +1000 | [diff] [blame] | 147 | channel_open_fn *open_confirm; |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 148 | void *open_confirm_ctx; |
Damien Miller | 39eda6e | 2005-11-05 14:52:50 +1100 | [diff] [blame] | 149 | channel_callback_fn *detach_user; |
| 150 | int detach_close; |
Damien Miller | b84886b | 2008-05-19 15:05:07 +1000 | [diff] [blame] | 151 | struct channel_confirms status_confirms; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 152 | |
| 153 | /* filter */ |
Damien Miller | 077b238 | 2005-12-31 16:22:32 +1100 | [diff] [blame] | 154 | channel_infilter_fn *input_filter; |
| 155 | channel_outfilter_fn *output_filter; |
Darren Tucker | 2fb66ca | 2008-06-13 04:49:33 +1000 | [diff] [blame] | 156 | void *filter_ctx; |
Darren Tucker | 84c56f5 | 2008-06-13 04:55:46 +1000 | [diff] [blame] | 157 | channel_filter_cleanup_fn *filter_cleanup; |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 158 | |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 159 | /* keep boundaries */ |
| 160 | int datagram; |
| 161 | |
| 162 | /* non-blocking connect */ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 163 | /* XXX make this a pointer so the structure can be opaque */ |
Damien Miller | bd74025 | 2008-05-19 15:37:09 +1000 | [diff] [blame] | 164 | struct channel_connect connect_ctx; |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 165 | |
| 166 | /* multiplexing protocol hook, called for each packet received */ |
| 167 | mux_callback_fn *mux_rcb; |
| 168 | void *mux_ctx; |
Damien Miller | d530f5f | 2010-05-21 14:57:10 +1000 | [diff] [blame] | 169 | int mux_pause; |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 170 | int mux_downstream_id; |
Damien Miller | ad833b3 | 2000-08-23 10:46:23 +1000 | [diff] [blame] | 171 | }; |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 172 | |
| 173 | #define CHAN_EXTENDED_IGNORE 0 |
| 174 | #define CHAN_EXTENDED_READ 1 |
| 175 | #define CHAN_EXTENDED_WRITE 2 |
| 176 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 177 | /* default window/packet sizes for tcp/x11-fwd-channel */ |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 178 | #define CHAN_SES_PACKET_DEFAULT (32*1024) |
Darren Tucker | 395ecc2 | 2007-06-12 23:38:53 +1000 | [diff] [blame] | 179 | #define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT) |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 180 | #define CHAN_TCP_PACKET_DEFAULT (32*1024) |
Darren Tucker | 395ecc2 | 2007-06-12 23:38:53 +1000 | [diff] [blame] | 181 | #define CHAN_TCP_WINDOW_DEFAULT (64*CHAN_TCP_PACKET_DEFAULT) |
Damien Miller | 19a5945 | 2002-02-19 15:20:57 +1100 | [diff] [blame] | 182 | #define CHAN_X11_PACKET_DEFAULT (16*1024) |
| 183 | #define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT) |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 184 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 185 | /* possible input states */ |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 186 | #define CHAN_INPUT_OPEN 0 |
| 187 | #define CHAN_INPUT_WAIT_DRAIN 1 |
| 188 | #define CHAN_INPUT_WAIT_OCLOSE 2 |
| 189 | #define CHAN_INPUT_CLOSED 3 |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 190 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 191 | /* possible output states */ |
Damien Miller | abea8ee | 2002-01-22 23:27:11 +1100 | [diff] [blame] | 192 | #define CHAN_OUTPUT_OPEN 0 |
| 193 | #define CHAN_OUTPUT_WAIT_DRAIN 1 |
| 194 | #define CHAN_OUTPUT_WAIT_IEOF 2 |
| 195 | #define CHAN_OUTPUT_CLOSED 3 |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 196 | |
| 197 | #define CHAN_CLOSE_SENT 0x01 |
| 198 | #define CHAN_CLOSE_RCVD 0x02 |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 199 | #define CHAN_EOF_SENT 0x04 |
| 200 | #define CHAN_EOF_RCVD 0x08 |
Damien Miller | e1537f9 | 2010-01-26 13:26:22 +1100 | [diff] [blame] | 201 | #define CHAN_LOCAL 0x10 |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 202 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 203 | /* Read buffer size */ |
| 204 | #define CHAN_RBUF (16*1024) |
| 205 | |
| 206 | /* Hard limit on number of channels */ |
| 207 | #define CHANNELS_MAX_CHANNELS (16*1024) |
Damien Miller | 077b238 | 2005-12-31 16:22:32 +1100 | [diff] [blame] | 208 | |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 209 | /* check whether 'efd' is still in use */ |
| 210 | #define CHANNEL_EFD_INPUT_ACTIVE(c) \ |
djm@openbsd.org | 97f4d30 | 2017-04-30 23:13:25 +0000 | [diff] [blame] | 211 | (c->extended_usage == CHAN_EXTENDED_READ && \ |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 212 | (c->efd != -1 || \ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 213 | sshbuf_len(c->extended) > 0)) |
Ben Lindstrom | cf15944 | 2002-03-26 03:26:24 +0000 | [diff] [blame] | 214 | #define CHANNEL_EFD_OUTPUT_ACTIVE(c) \ |
djm@openbsd.org | 97f4d30 | 2017-04-30 23:13:25 +0000 | [diff] [blame] | 215 | (c->extended_usage == CHAN_EXTENDED_WRITE && \ |
Darren Tucker | ce377c3 | 2005-07-14 17:05:51 +1000 | [diff] [blame] | 216 | c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \ |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 217 | sshbuf_len(c->extended) > 0)) |
| 218 | |
| 219 | /* Add channel management structures to SSH transport instance */ |
| 220 | void channel_init_channels(struct ssh *ssh); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 221 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 222 | /* channel management */ |
| 223 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 224 | Channel *channel_by_id(struct ssh *, int); |
| 225 | Channel *channel_by_remote_id(struct ssh *, int); |
| 226 | Channel *channel_lookup(struct ssh *, int); |
| 227 | Channel *channel_new(struct ssh *, char *, int, int, int, int, |
| 228 | u_int, u_int, int, char *, int); |
| 229 | void channel_set_fds(struct ssh *, int, int, int, int, int, |
| 230 | int, int, u_int); |
| 231 | void channel_free(struct ssh *, Channel *); |
| 232 | void channel_free_all(struct ssh *); |
| 233 | void channel_stop_listening(struct ssh *); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 234 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 235 | void channel_send_open(struct ssh *, int); |
| 236 | void channel_request_start(struct ssh *, int, char *, int); |
| 237 | void channel_register_cleanup(struct ssh *, int, |
| 238 | channel_callback_fn *, int); |
| 239 | void channel_register_open_confirm(struct ssh *, int, |
| 240 | channel_open_fn *, void *); |
| 241 | void channel_register_filter(struct ssh *, int, channel_infilter_fn *, |
| 242 | channel_outfilter_fn *, channel_filter_cleanup_fn *, void *); |
| 243 | void channel_register_status_confirm(struct ssh *, int, |
| 244 | channel_confirm_cb *, channel_confirm_abandon_cb *, void *); |
| 245 | void channel_cancel_cleanup(struct ssh *, int); |
| 246 | int channel_close_fd(struct ssh *, int *); |
| 247 | void channel_send_window_changes(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 248 | |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 249 | /* mux proxy support */ |
| 250 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 251 | int channel_proxy_downstream(struct ssh *, Channel *mc); |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 252 | int channel_proxy_upstream(Channel *, int, u_int32_t, struct ssh *); |
markus@openbsd.org | 8d05784 | 2016-09-30 09:19:13 +0000 | [diff] [blame] | 253 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 254 | /* protocol handler */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 255 | |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 256 | int channel_input_data(int, u_int32_t, struct ssh *); |
| 257 | int channel_input_extended_data(int, u_int32_t, struct ssh *); |
| 258 | int channel_input_ieof(int, u_int32_t, struct ssh *); |
| 259 | int channel_input_oclose(int, u_int32_t, struct ssh *); |
| 260 | int channel_input_open_confirmation(int, u_int32_t, struct ssh *); |
| 261 | int channel_input_open_failure(int, u_int32_t, struct ssh *); |
| 262 | int channel_input_port_open(int, u_int32_t, struct ssh *); |
| 263 | int channel_input_window_adjust(int, u_int32_t, struct ssh *); |
| 264 | int channel_input_status_confirm(int, u_int32_t, struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 265 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 266 | /* file descriptor handling (read/write) */ |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 267 | |
djm@openbsd.org | 71e5a53 | 2017-08-30 03:59:08 +0000 | [diff] [blame] | 268 | void channel_prepare_select(struct ssh *, fd_set **, fd_set **, int *, |
| 269 | u_int*, time_t*); |
| 270 | void channel_after_select(struct ssh *, fd_set *, fd_set *); |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 271 | void channel_output_poll(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 272 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 273 | int channel_not_very_much_buffered_data(struct ssh *); |
| 274 | void channel_close_all(struct ssh *); |
| 275 | int channel_still_open(struct ssh *); |
| 276 | char *channel_open_message(struct ssh *); |
| 277 | int channel_find_open(struct ssh *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 278 | |
Ben Lindstrom | 908afed | 2001-10-03 17:34:59 +0000 | [diff] [blame] | 279 | /* tcp forwarding */ |
Damien Miller | 7acefbb | 2014-07-18 14:11:24 +1000 | [diff] [blame] | 280 | struct Forward; |
| 281 | struct ForwardOptions; |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 282 | void channel_set_af(struct ssh *, int af); |
| 283 | void channel_permit_all_opens(struct ssh *); |
| 284 | void channel_add_permitted_opens(struct ssh *, char *, int); |
| 285 | int channel_add_adm_permitted_opens(struct ssh *, char *, int); |
| 286 | void channel_copy_adm_permitted_opens(struct ssh *, |
| 287 | const struct fwd_perm_list *); |
| 288 | void channel_disable_adm_local_opens(struct ssh *); |
| 289 | void channel_update_permitted_opens(struct ssh *, int, int); |
| 290 | void channel_clear_permitted_opens(struct ssh *); |
| 291 | void channel_clear_adm_permitted_opens(struct ssh *); |
| 292 | void channel_print_adm_permitted_opens(struct ssh *); |
| 293 | Channel *channel_connect_to_port(struct ssh *, const char *, u_short, |
| 294 | char *, char *, int *, const char **); |
| 295 | Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *); |
| 296 | Channel *channel_connect_stdio_fwd(struct ssh *, const char*, |
| 297 | u_short, int, int); |
| 298 | Channel *channel_connect_by_listen_address(struct ssh *, const char *, |
| 299 | u_short, char *, char *); |
| 300 | Channel *channel_connect_by_listen_path(struct ssh *, const char *, |
| 301 | char *, char *); |
| 302 | int channel_request_remote_forwarding(struct ssh *, struct Forward *); |
| 303 | int channel_setup_local_fwd_listener(struct ssh *, struct Forward *, |
| 304 | struct ForwardOptions *); |
| 305 | int channel_request_rforward_cancel(struct ssh *, struct Forward *); |
| 306 | int channel_setup_remote_fwd_listener(struct ssh *, struct Forward *, |
| 307 | int *, struct ForwardOptions *); |
| 308 | int channel_cancel_rport_listener(struct ssh *, struct Forward *); |
| 309 | int channel_cancel_lport_listener(struct ssh *, struct Forward *, |
| 310 | int, struct ForwardOptions *); |
Darren Tucker | 1338b9e | 2011-10-02 18:57:35 +1100 | [diff] [blame] | 311 | int permitopen_port(const char *); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 312 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 313 | /* x11 forwarding */ |
| 314 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 315 | void channel_set_x11_refuse_time(struct ssh *, u_int); |
| 316 | int x11_connect_display(struct ssh *); |
| 317 | int x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **); |
| 318 | void x11_request_forwarding_with_spoofing(struct ssh *, int, |
| 319 | const char *, const char *, const char *, int); |
Damien Miller | b38eff8 | 2000-04-01 11:09:21 +1000 | [diff] [blame] | 320 | |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 321 | /* channel close */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 322 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 323 | int chan_is_dead(struct ssh *, Channel *, int); |
| 324 | void chan_mark_dead(struct ssh *, Channel *); |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 325 | |
Damien Miller | 5144df9 | 2002-01-22 23:28:45 +1100 | [diff] [blame] | 326 | /* channel events */ |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 327 | |
djm@openbsd.org | dbee411 | 2017-09-12 06:32:07 +0000 | [diff] [blame^] | 328 | void chan_rcvd_oclose(struct ssh *, Channel *); |
| 329 | void chan_rcvd_eow(struct ssh *, Channel *); |
| 330 | void chan_read_failed(struct ssh *, Channel *); |
| 331 | void chan_ibuf_empty(struct ssh *, Channel *); |
| 332 | void chan_rcvd_ieof(struct ssh *, Channel *); |
| 333 | void chan_write_failed(struct ssh *, Channel *); |
| 334 | void chan_obuf_empty(struct ssh *, Channel *); |
Ben Lindstrom | e9c9991 | 2001-06-09 00:41:05 +0000 | [diff] [blame] | 335 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 336 | #endif |