blob: c8ae0d90464a6eea36fa950c05fadd5ab57f5cdc [file] [log] [blame]
djm@openbsd.org065064f2020-01-25 22:49:38 +00001/* $OpenBSD: channels.h,v 1.133 2020/01/25 22:49:38 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millere4340be2000-09-16 13:29:08 +11003/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
5 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
7 *
8 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
13 */
14/*
Damien Millerb51ed392002-01-22 23:29:03 +110015 * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved.
Damien Millere4340be2000-09-16 13:29:08 +110016 *
17 * Redistribution and use in source and binary forms, with or without
18 * modification, are permitted provided that the following conditions
19 * are met:
20 * 1. Redistributions of source code must retain the above copyright
21 * notice, this list of conditions and the following disclaimer.
22 * 2. Redistributions in binary form must reproduce the above copyright
23 * notice, this list of conditions and the following disclaimer in the
24 * documentation and/or other materials provided with the distribution.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100037
Ben Lindstrome9c99912001-06-09 00:41:05 +000038#ifndef CHANNEL_H
39#define CHANNEL_H
Damien Millerd4a8b7e1999-10-27 13:42:43 +100040
41/* Definitions for channel types. */
Damien Miller5428f641999-11-25 11:54:57 +110042#define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */
Damien Miller95def091999-11-25 00:26:21 +110043#define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */
44#define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */
45#define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */
Damien Miller5428f641999-11-25 11:54:57 +110046#define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */
Damien Millerb38eff82000-04-01 11:09:21 +100047#define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */
48#define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */
Damien Millerb38eff82000-04-01 11:09:21 +100049#define SSH_CHANNEL_LARVAL 10 /* larval session */
Damien Miller0bc1bd82000-11-13 22:57:25 +110050#define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */
Ben Lindstrom7ad97102000-12-06 01:42:49 +000051#define SSH_CHANNEL_CONNECTING 12
Ben Lindstrom3bb4f9d2001-04-08 18:30:26 +000052#define SSH_CHANNEL_DYNAMIC 13
Ben Lindstromc0dee1a2001-06-05 20:52:50 +000053#define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */
Damien Millere1537f92010-01-26 13:26:22 +110054#define SSH_CHANNEL_MUX_LISTENER 15 /* Listener for mux conn. */
55#define SSH_CHANNEL_MUX_CLIENT 16 /* Conn. to mux slave */
Damien Miller36187092013-06-10 13:07:11 +100056#define SSH_CHANNEL_ABANDONED 17 /* Abandoned session, eg mux */
Damien Miller7acefbb2014-07-18 14:11:24 +100057#define SSH_CHANNEL_UNIX_LISTENER 18 /* Listening on a domain socket. */
58#define SSH_CHANNEL_RUNIX_LISTENER 19 /* Listening to a R-style domain socket. */
markus@openbsd.org8d057842016-09-30 09:19:13 +000059#define SSH_CHANNEL_MUX_PROXY 20 /* proxy channel for mux-slave */
markus@openbsd.org609d7a62017-09-21 19:16:53 +000060#define SSH_CHANNEL_RDYNAMIC_OPEN 21 /* reverse SOCKS, parsing request */
61#define SSH_CHANNEL_RDYNAMIC_FINISH 22 /* reverse SOCKS, finishing connect */
62#define SSH_CHANNEL_MAX_TYPE 23
Damien Millerd4a8b7e1999-10-27 13:42:43 +100063
Damien Millerff773642011-09-22 21:39:48 +100064#define CHANNEL_CANCEL_PORT_STATIC -1
65
djm@openbsd.org115063a2018-06-06 18:22:41 +000066/* TCP forwarding */
67#define FORWARD_DENY 0
68#define FORWARD_REMOTE (1)
69#define FORWARD_LOCAL (1<<1)
70#define FORWARD_ALLOW (FORWARD_REMOTE|FORWARD_LOCAL)
71
72#define FORWARD_ADM 0x100
73#define FORWARD_USER 0x101
74
markus@openbsd.org2ae666a2017-05-30 14:23:52 +000075struct ssh;
Damien Millerad833b32000-08-23 10:46:23 +100076struct Channel;
77typedef struct Channel Channel;
djm@openbsd.orgdbee4112017-09-12 06:32:07 +000078struct fwd_perm_list;
Damien Millerd4a8b7e1999-10-27 13:42:43 +100079
djm@openbsd.orgdbee4112017-09-12 06:32:07 +000080typedef void channel_open_fn(struct ssh *, int, int, void *);
81typedef void channel_callback_fn(struct ssh *, int, void *);
82typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int);
83typedef void channel_filter_cleanup_fn(struct ssh *, int, void *);
84typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *,
85 u_char **, size_t *);
Damien Millerad833b32000-08-23 10:46:23 +100086
Damien Millerb84886b2008-05-19 15:05:07 +100087/* Channel success/failure callbacks */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +000088typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *);
89typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *);
Damien Millerb84886b2008-05-19 15:05:07 +100090struct channel_confirm {
91 TAILQ_ENTRY(channel_confirm) entry;
92 channel_confirm_cb *cb;
93 channel_confirm_abandon_cb *abandon_cb;
94 void *ctx;
95};
96TAILQ_HEAD(channel_confirms, channel_confirm);
97
Damien Millerbd740252008-05-19 15:37:09 +100098/* Context for non-blocking connects */
99struct channel_connect {
100 char *host;
101 int port;
102 struct addrinfo *ai, *aitop;
103};
104
Damien Millere1537f92010-01-26 13:26:22 +1100105/* Callbacks for mux channels back into client-specific code */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000106typedef int mux_callback_fn(struct ssh *, struct Channel *);
Damien Millere1537f92010-01-26 13:26:22 +1100107
djm@openbsd.org065064f2020-01-25 22:49:38 +0000108/*
109 * NB. channel IDs on the wire and in c->remote_id are uint32, but local
110 * channel IDs (e.g. c->self) only ever use the int32 subset of this range,
111 * because we use local channel ID -1 for housekeeping. Remote channels have
112 * a dedicated "have_remote_id" flag to indicate their validity.
113 */
114
Damien Millerad833b32000-08-23 10:46:23 +1000115struct Channel {
Damien Miller95def091999-11-25 00:26:21 +1100116 int type; /* channel type/state */
djm@openbsd.org065064f2020-01-25 22:49:38 +0000117
Damien Miller95def091999-11-25 00:26:21 +1100118 int self; /* my own channel identifier */
djm@openbsd.org9f532292017-09-12 06:35:31 +0000119 uint32_t remote_id; /* channel identifier for remote peer */
120 int have_remote_id; /* non-zero if remote_id is valid */
121
Damien Millerabea8ee2002-01-22 23:27:11 +1100122 u_int istate; /* input from channel (state of receive half) */
123 u_int ostate; /* output to channel (state of transmit half) */
Damien Miller33b13562000-04-04 14:38:59 +1000124 int flags; /* close sent/rcvd */
Damien Millerb38eff82000-04-01 11:09:21 +1000125 int rfd; /* read fd */
126 int wfd; /* write fd */
127 int efd; /* extended fd */
128 int sock; /* sock fd */
Damien Millere1537f92010-01-26 13:26:22 +1100129 int ctl_chan; /* control channel (multiplexed connections) */
Damien Miller79438cc2001-02-16 12:34:57 +1100130 int isatty; /* rfd is a tty */
Damien Millerc192a4c2013-08-01 14:29:20 +1000131#ifdef _AIX
Ben Lindstrombeb5f332002-07-22 15:28:53 +0000132 int wfd_isatty; /* wfd is a tty */
Damien Millerc192a4c2013-08-01 14:29:20 +1000133#endif
Darren Tucker5d78de62004-11-05 20:35:44 +1100134 int client_tty; /* (client) TTY has been requested */
Damien Miller4623a752001-10-10 15:03:58 +1000135 int force_drain; /* force close on iEOF */
Damien Millera6508752012-04-22 11:21:10 +1000136 time_t notbefore; /* Pause IO until deadline (time_t) */
Darren Tucker876045b2010-01-08 17:08:00 +1100137 int delayed; /* post-select handlers for newly created
138 * channels are delayed until the first call
djm@openbsd.orgc28a3432015-05-08 06:45:13 +0000139 * to a matching pre-select handler.
Darren Tucker876045b2010-01-08 17:08:00 +1100140 * this way post-select handlers are not
Darren Tucker5d12b8f2013-06-06 08:09:10 +1000141 * accidentally called if a FD gets reused */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000142 struct sshbuf *input; /* data read from socket, to be sent over
Damien Miller95def091999-11-25 00:26:21 +1100143 * encrypted connection */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000144 struct sshbuf *output; /* data received over encrypted connection for
Damien Miller95def091999-11-25 00:26:21 +1100145 * send on socket */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000146 struct sshbuf *extended;
147
Damien Millera1c1b6c2009-01-28 16:29:49 +1100148 char *path;
Ben Lindstrom99c73b32001-05-05 04:09:47 +0000149 /* path for unix domain sockets, or host name for forwards */
Damien Miller95def091999-11-25 00:26:21 +1100150 int listening_port; /* port being listened for forwards */
Damien Millerf6dff7c2011-09-22 21:38:52 +1000151 char *listening_addr; /* addr being listened for forwards */
Damien Miller95def091999-11-25 00:26:21 +1100152 int host_port; /* remote port to connect for forwards */
153 char *remote_name; /* remote hostname */
Damien Millerb38eff82000-04-01 11:09:21 +1000154
Ben Lindstrom4fed2be2002-06-25 23:17:36 +0000155 u_int remote_window;
156 u_int remote_maxpacket;
157 u_int local_window;
158 u_int local_window_max;
159 u_int local_consumed;
160 u_int local_maxpacket;
Damien Millerb38eff82000-04-01 11:09:21 +1000161 int extended_usage;
Damien Millere7378562001-12-21 14:58:35 +1100162 int single_connection;
Damien Millerb38eff82000-04-01 11:09:21 +1000163
164 char *ctype; /* type */
165
Damien Millere247cc42000-05-07 12:03:14 +1000166 /* callback */
Damien Millerd530f5f2010-05-21 14:57:10 +1000167 channel_open_fn *open_confirm;
Damien Millerb84886b2008-05-19 15:05:07 +1000168 void *open_confirm_ctx;
Damien Miller39eda6e2005-11-05 14:52:50 +1100169 channel_callback_fn *detach_user;
170 int detach_close;
Damien Millerb84886b2008-05-19 15:05:07 +1000171 struct channel_confirms status_confirms;
Damien Millerad833b32000-08-23 10:46:23 +1000172
173 /* filter */
Damien Miller077b2382005-12-31 16:22:32 +1100174 channel_infilter_fn *input_filter;
175 channel_outfilter_fn *output_filter;
Darren Tucker2fb66ca2008-06-13 04:49:33 +1000176 void *filter_ctx;
Darren Tucker84c56f52008-06-13 04:55:46 +1000177 channel_filter_cleanup_fn *filter_cleanup;
Damien Millerd27b9472005-12-13 19:29:02 +1100178
Damien Millerbd740252008-05-19 15:37:09 +1000179 /* keep boundaries */
180 int datagram;
181
182 /* non-blocking connect */
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000183 /* XXX make this a pointer so the structure can be opaque */
Damien Millerbd740252008-05-19 15:37:09 +1000184 struct channel_connect connect_ctx;
Damien Millere1537f92010-01-26 13:26:22 +1100185
186 /* multiplexing protocol hook, called for each packet received */
187 mux_callback_fn *mux_rcb;
188 void *mux_ctx;
Damien Millerd530f5f2010-05-21 14:57:10 +1000189 int mux_pause;
markus@openbsd.org8d057842016-09-30 09:19:13 +0000190 int mux_downstream_id;
Damien Millerad833b32000-08-23 10:46:23 +1000191};
Damien Millerb38eff82000-04-01 11:09:21 +1000192
193#define CHAN_EXTENDED_IGNORE 0
194#define CHAN_EXTENDED_READ 1
195#define CHAN_EXTENDED_WRITE 2
196
Damien Millere4340be2000-09-16 13:29:08 +1100197/* default window/packet sizes for tcp/x11-fwd-channel */
Damien Miller19a59452002-02-19 15:20:57 +1100198#define CHAN_SES_PACKET_DEFAULT (32*1024)
Darren Tucker395ecc22007-06-12 23:38:53 +1000199#define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT)
Damien Miller19a59452002-02-19 15:20:57 +1100200#define CHAN_TCP_PACKET_DEFAULT (32*1024)
Darren Tucker395ecc22007-06-12 23:38:53 +1000201#define CHAN_TCP_WINDOW_DEFAULT (64*CHAN_TCP_PACKET_DEFAULT)
Damien Miller19a59452002-02-19 15:20:57 +1100202#define CHAN_X11_PACKET_DEFAULT (16*1024)
203#define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT)
Damien Millere4340be2000-09-16 13:29:08 +1100204
Ben Lindstrome9c99912001-06-09 00:41:05 +0000205/* possible input states */
Damien Millerabea8ee2002-01-22 23:27:11 +1100206#define CHAN_INPUT_OPEN 0
207#define CHAN_INPUT_WAIT_DRAIN 1
208#define CHAN_INPUT_WAIT_OCLOSE 2
209#define CHAN_INPUT_CLOSED 3
Damien Millere4340be2000-09-16 13:29:08 +1100210
Ben Lindstrome9c99912001-06-09 00:41:05 +0000211/* possible output states */
Damien Millerabea8ee2002-01-22 23:27:11 +1100212#define CHAN_OUTPUT_OPEN 0
213#define CHAN_OUTPUT_WAIT_DRAIN 1
214#define CHAN_OUTPUT_WAIT_IEOF 2
215#define CHAN_OUTPUT_CLOSED 3
Ben Lindstrome9c99912001-06-09 00:41:05 +0000216
217#define CHAN_CLOSE_SENT 0x01
218#define CHAN_CLOSE_RCVD 0x02
Ben Lindstromcf159442002-03-26 03:26:24 +0000219#define CHAN_EOF_SENT 0x04
220#define CHAN_EOF_RCVD 0x08
Damien Millere1537f92010-01-26 13:26:22 +1100221#define CHAN_LOCAL 0x10
Ben Lindstromcf159442002-03-26 03:26:24 +0000222
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000223/* Read buffer size */
224#define CHAN_RBUF (16*1024)
225
226/* Hard limit on number of channels */
227#define CHANNELS_MAX_CHANNELS (16*1024)
Damien Miller077b2382005-12-31 16:22:32 +1100228
Ben Lindstromcf159442002-03-26 03:26:24 +0000229/* check whether 'efd' is still in use */
230#define CHANNEL_EFD_INPUT_ACTIVE(c) \
djm@openbsd.org97f4d302017-04-30 23:13:25 +0000231 (c->extended_usage == CHAN_EXTENDED_READ && \
Ben Lindstromcf159442002-03-26 03:26:24 +0000232 (c->efd != -1 || \
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000233 sshbuf_len(c->extended) > 0))
Ben Lindstromcf159442002-03-26 03:26:24 +0000234#define CHANNEL_EFD_OUTPUT_ACTIVE(c) \
djm@openbsd.org97f4d302017-04-30 23:13:25 +0000235 (c->extended_usage == CHAN_EXTENDED_WRITE && \
Darren Tuckerce377c32005-07-14 17:05:51 +1000236 c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000237 sshbuf_len(c->extended) > 0))
238
239/* Add channel management structures to SSH transport instance */
240void channel_init_channels(struct ssh *ssh);
Ben Lindstrome9c99912001-06-09 00:41:05 +0000241
Ben Lindstrome9c99912001-06-09 00:41:05 +0000242/* channel management */
243
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000244Channel *channel_by_id(struct ssh *, int);
djm@openbsd.org9f532292017-09-12 06:35:31 +0000245Channel *channel_by_remote_id(struct ssh *, u_int);
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000246Channel *channel_lookup(struct ssh *, int);
247Channel *channel_new(struct ssh *, char *, int, int, int, int,
248 u_int, u_int, int, char *, int);
249void channel_set_fds(struct ssh *, int, int, int, int, int,
250 int, int, u_int);
251void channel_free(struct ssh *, Channel *);
252void channel_free_all(struct ssh *);
253void channel_stop_listening(struct ssh *);
Ben Lindstrome9c99912001-06-09 00:41:05 +0000254
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000255void channel_send_open(struct ssh *, int);
256void channel_request_start(struct ssh *, int, char *, int);
257void channel_register_cleanup(struct ssh *, int,
258 channel_callback_fn *, int);
259void channel_register_open_confirm(struct ssh *, int,
260 channel_open_fn *, void *);
261void channel_register_filter(struct ssh *, int, channel_infilter_fn *,
262 channel_outfilter_fn *, channel_filter_cleanup_fn *, void *);
263void channel_register_status_confirm(struct ssh *, int,
264 channel_confirm_cb *, channel_confirm_abandon_cb *, void *);
265void channel_cancel_cleanup(struct ssh *, int);
266int channel_close_fd(struct ssh *, int *);
267void channel_send_window_changes(struct ssh *);
Damien Millerb38eff82000-04-01 11:09:21 +1000268
markus@openbsd.org8d057842016-09-30 09:19:13 +0000269/* mux proxy support */
270
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000271int channel_proxy_downstream(struct ssh *, Channel *mc);
markus@openbsd.org2ae666a2017-05-30 14:23:52 +0000272int channel_proxy_upstream(Channel *, int, u_int32_t, struct ssh *);
markus@openbsd.org8d057842016-09-30 09:19:13 +0000273
Ben Lindstrome9c99912001-06-09 00:41:05 +0000274/* protocol handler */
Damien Millerb38eff82000-04-01 11:09:21 +1000275
markus@openbsd.org2ae666a2017-05-30 14:23:52 +0000276int channel_input_data(int, u_int32_t, struct ssh *);
277int channel_input_extended_data(int, u_int32_t, struct ssh *);
278int channel_input_ieof(int, u_int32_t, struct ssh *);
279int channel_input_oclose(int, u_int32_t, struct ssh *);
280int channel_input_open_confirmation(int, u_int32_t, struct ssh *);
281int channel_input_open_failure(int, u_int32_t, struct ssh *);
282int channel_input_port_open(int, u_int32_t, struct ssh *);
283int channel_input_window_adjust(int, u_int32_t, struct ssh *);
284int channel_input_status_confirm(int, u_int32_t, struct ssh *);
Damien Millerb38eff82000-04-01 11:09:21 +1000285
Ben Lindstrome9c99912001-06-09 00:41:05 +0000286/* file descriptor handling (read/write) */
Damien Millerb38eff82000-04-01 11:09:21 +1000287
djm@openbsd.org71e5a532017-08-30 03:59:08 +0000288void channel_prepare_select(struct ssh *, fd_set **, fd_set **, int *,
289 u_int*, time_t*);
290void channel_after_select(struct ssh *, fd_set *, fd_set *);
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000291void channel_output_poll(struct ssh *);
Damien Millerb38eff82000-04-01 11:09:21 +1000292
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000293int channel_not_very_much_buffered_data(struct ssh *);
294void channel_close_all(struct ssh *);
295int channel_still_open(struct ssh *);
djm@openbsd.orgf1dd1792018-10-04 00:10:11 +0000296const char *channel_format_extended_usage(const Channel *);
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000297char *channel_open_message(struct ssh *);
298int channel_find_open(struct ssh *);
Damien Millerb38eff82000-04-01 11:09:21 +1000299
Ben Lindstrom908afed2001-10-03 17:34:59 +0000300/* tcp forwarding */
Damien Miller7acefbb2014-07-18 14:11:24 +1000301struct Forward;
302struct ForwardOptions;
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000303void channel_set_af(struct ssh *, int af);
djm@openbsd.org115063a2018-06-06 18:22:41 +0000304void channel_permit_all(struct ssh *, int);
305void channel_add_permission(struct ssh *, int, int, char *, int);
306void channel_clear_permission(struct ssh *, int, int);
307void channel_disable_admin(struct ssh *, int);
308void channel_update_permission(struct ssh *, int, int);
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000309Channel *channel_connect_to_port(struct ssh *, const char *, u_short,
310 char *, char *, int *, const char **);
311Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *);
312Channel *channel_connect_stdio_fwd(struct ssh *, const char*,
313 u_short, int, int);
314Channel *channel_connect_by_listen_address(struct ssh *, const char *,
315 u_short, char *, char *);
316Channel *channel_connect_by_listen_path(struct ssh *, const char *,
317 char *, char *);
318int channel_request_remote_forwarding(struct ssh *, struct Forward *);
319int channel_setup_local_fwd_listener(struct ssh *, struct Forward *,
320 struct ForwardOptions *);
321int channel_request_rforward_cancel(struct ssh *, struct Forward *);
322int channel_setup_remote_fwd_listener(struct ssh *, struct Forward *,
323 int *, struct ForwardOptions *);
324int channel_cancel_rport_listener(struct ssh *, struct Forward *);
325int channel_cancel_lport_listener(struct ssh *, struct Forward *,
326 int, struct ForwardOptions *);
Darren Tucker1338b9e2011-10-02 18:57:35 +1100327int permitopen_port(const char *);
Damien Millerb38eff82000-04-01 11:09:21 +1000328
Ben Lindstrome9c99912001-06-09 00:41:05 +0000329/* x11 forwarding */
330
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000331void channel_set_x11_refuse_time(struct ssh *, u_int);
332int x11_connect_display(struct ssh *);
333int x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **);
334void x11_request_forwarding_with_spoofing(struct ssh *, int,
335 const char *, const char *, const char *, int);
Damien Millerb38eff82000-04-01 11:09:21 +1000336
Ben Lindstrome9c99912001-06-09 00:41:05 +0000337/* channel close */
Damien Miller33b13562000-04-04 14:38:59 +1000338
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000339int chan_is_dead(struct ssh *, Channel *, int);
340void chan_mark_dead(struct ssh *, Channel *);
Ben Lindstrom4cc240d2001-07-04 04:46:56 +0000341
Damien Miller5144df92002-01-22 23:28:45 +1100342/* channel events */
Ben Lindstrome9c99912001-06-09 00:41:05 +0000343
djm@openbsd.orgdbee4112017-09-12 06:32:07 +0000344void chan_rcvd_oclose(struct ssh *, Channel *);
345void chan_rcvd_eow(struct ssh *, Channel *);
346void chan_read_failed(struct ssh *, Channel *);
347void chan_ibuf_empty(struct ssh *, Channel *);
348void chan_rcvd_ieof(struct ssh *, Channel *);
349void chan_write_failed(struct ssh *, Channel *);
350void chan_obuf_empty(struct ssh *, Channel *);
Ben Lindstrome9c99912001-06-09 00:41:05 +0000351
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000352#endif