blob: aac933e0a5014d4c9698557a153175f949d55289 [file] [log] [blame]
djm@openbsd.org639d6bc2015-05-01 07:10:01 +00001/* $OpenBSD: dispatch.c,v 1.27 2015/05/01 07:10:01 djm Exp $ */
Damien Miller4af51302000-04-16 11:18:38 +10002/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
Damien Miller4af51302000-04-16 11:18:38 +100013 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
Damien Millerd7834352006-08-05 12:39:39 +100025
Damien Miller4af51302000-04-16 11:18:38 +100026#include "includes.h"
Ben Lindstrom226cfa02001-01-22 05:34:40 +000027
Damien Millerd7834352006-08-05 12:39:39 +100028#include <sys/types.h>
29
Damien Millerd8337c52006-07-24 14:14:19 +100030#include <signal.h>
Damien Millerd7834352006-08-05 12:39:39 +100031#include <stdarg.h>
Damien Millerd8337c52006-07-24 14:14:19 +100032
Ben Lindstrom226cfa02001-01-22 05:34:40 +000033#include "ssh1.h"
Ben Lindstromef1cf5d2001-01-29 07:55:07 +000034#include "ssh2.h"
Ben Lindstrom226cfa02001-01-22 05:34:40 +000035#include "log.h"
Damien Miller4af51302000-04-16 11:18:38 +100036#include "dispatch.h"
37#include "packet.h"
Ben Lindstromef1cf5d2001-01-29 07:55:07 +000038#include "compat.h"
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000039#include "ssherr.h"
Damien Miller4af51302000-04-16 11:18:38 +100040
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000041int
42dispatch_protocol_error(int type, u_int32_t seq, void *ctx)
Damien Miller4af51302000-04-16 11:18:38 +100043{
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000044 struct ssh *ssh = active_state; /* XXX */
45 int r;
46
Damien Miller996acd22003-04-09 20:59:48 +100047 logit("dispatch_protocol_error: type %d seq %u", type, seq);
Damien Miller7d053392002-01-22 23:24:13 +110048 if (!compat20)
49 fatal("protocol error");
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000050 if ((r = sshpkt_start(ssh, SSH2_MSG_UNIMPLEMENTED)) != 0 ||
51 (r = sshpkt_put_u32(ssh, seq)) != 0 ||
djm@openbsd.org4509b5d2015-01-30 01:13:33 +000052 (r = sshpkt_send(ssh)) != 0 ||
53 (r = ssh_packet_write_wait(ssh)) != 0)
54 sshpkt_fatal(ssh, __func__, r);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000055 return 0;
Damien Miller7d053392002-01-22 23:24:13 +110056}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000057
58int
59dispatch_protocol_ignore(int type, u_int32_t seq, void *ssh)
Damien Miller7d053392002-01-22 23:24:13 +110060{
Damien Miller996acd22003-04-09 20:59:48 +100061 logit("dispatch_protocol_ignore: type %d seq %u", type, seq);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000062 return 0;
Damien Miller4af51302000-04-16 11:18:38 +100063}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000064
Damien Miller4af51302000-04-16 11:18:38 +100065void
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000066ssh_dispatch_init(struct ssh *ssh, dispatch_fn *dflt)
Damien Miller4af51302000-04-16 11:18:38 +100067{
Damien Miller7d053392002-01-22 23:24:13 +110068 u_int i;
Damien Miller4af51302000-04-16 11:18:38 +100069 for (i = 0; i < DISPATCH_MAX; i++)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000070 ssh->dispatch[i] = dflt;
Damien Miller4af51302000-04-16 11:18:38 +100071}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000072
Damien Miller4af51302000-04-16 11:18:38 +100073void
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000074ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn)
Damien Miller7d053392002-01-22 23:24:13 +110075{
76 u_int i;
77
78 for (i = from; i <= to; i++) {
79 if (i >= DISPATCH_MAX)
80 break;
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000081 ssh->dispatch[i] = fn;
Damien Miller7d053392002-01-22 23:24:13 +110082 }
83}
Damien Miller4af51302000-04-16 11:18:38 +100084
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +000085void
86ssh_dispatch_set(struct ssh *ssh, int type, dispatch_fn *fn)
87{
88 ssh->dispatch[type] = fn;
89}
90
91int
92ssh_dispatch_run(struct ssh *ssh, int mode, volatile sig_atomic_t *done,
93 void *ctxt)
94{
95 int r;
96 u_char type;
97 u_int32_t seqnr;
98
99 for (;;) {
Damien Miller4af51302000-04-16 11:18:38 +1000100 if (mode == DISPATCH_BLOCK) {
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000101 r = ssh_packet_read_seqnr(ssh, &type, &seqnr);
102 if (r != 0)
103 return r;
Damien Miller4af51302000-04-16 11:18:38 +1000104 } else {
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000105 r = ssh_packet_read_poll_seqnr(ssh, &type, &seqnr);
106 if (r != 0)
107 return r;
Damien Miller4af51302000-04-16 11:18:38 +1000108 if (type == SSH_MSG_NONE)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000109 return 0;
Damien Miller4af51302000-04-16 11:18:38 +1000110 }
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000111 if (type > 0 && type < DISPATCH_MAX &&
112 ssh->dispatch[type] != NULL) {
113 if (ssh->dispatch_skip_packets) {
114 debug2("skipped packet (type %u)", type);
115 ssh->dispatch_skip_packets--;
116 continue;
117 }
118 /* XXX 'ssh' will replace 'ctxt' later */
119 r = (*ssh->dispatch[type])(type, seqnr, ctxt);
120 if (r != 0)
121 return r;
122 } else {
123 r = sshpkt_disconnect(ssh,
124 "protocol error: rcvd type %d", type);
125 if (r != 0)
126 return r;
127 return SSH_ERR_DISCONNECTED;
128 }
Damien Miller4af51302000-04-16 11:18:38 +1000129 if (done != NULL && *done)
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000130 return 0;
Damien Miller4af51302000-04-16 11:18:38 +1000131 }
132}
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000133
134void
135ssh_dispatch_run_fatal(struct ssh *ssh, int mode, volatile sig_atomic_t *done,
136 void *ctxt)
137{
138 int r;
139
djm@openbsd.org639d6bc2015-05-01 07:10:01 +0000140 if ((r = ssh_dispatch_run(ssh, mode, done, ctxt)) != 0)
141 sshpkt_fatal(ssh, __func__, r);
markus@openbsd.org3fdc88a2015-01-19 20:07:45 +0000142}