2021-05-19 03:24:05 +02:00
|
|
|
/* $OpenBSD: channels.h,v 1.138 2021/05/19 01:24:05 djm Exp $ */
|
2002-03-05 02:53:02 +01:00
|
|
|
|
2000-09-16 04:29:08 +02:00
|
|
|
/*
|
|
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
* All rights reserved
|
|
|
|
*
|
|
|
|
* As far as I am concerned, the code I have written for this software
|
|
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
|
|
* software must be clearly marked as such, and if the derived work is
|
|
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
|
|
*/
|
|
|
|
/*
|
2002-01-22 13:29:03 +01:00
|
|
|
* Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved.
|
2000-09-16 04:29:08 +02:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
#ifndef CHANNEL_H
|
|
|
|
#define CHANNEL_H
|
1999-10-27 05:42:43 +02:00
|
|
|
|
|
|
|
/* Definitions for channel types. */
|
1999-11-25 01:54:57 +01:00
|
|
|
#define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */
|
1999-11-24 14:26:21 +01:00
|
|
|
#define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */
|
|
|
|
#define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */
|
|
|
|
#define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */
|
1999-11-25 01:54:57 +01:00
|
|
|
#define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */
|
2000-04-01 03:09:21 +02:00
|
|
|
#define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */
|
|
|
|
#define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */
|
|
|
|
#define SSH_CHANNEL_LARVAL 10 /* larval session */
|
2000-11-13 12:57:25 +01:00
|
|
|
#define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */
|
2000-12-06 02:42:49 +01:00
|
|
|
#define SSH_CHANNEL_CONNECTING 12
|
2001-04-08 20:30:26 +02:00
|
|
|
#define SSH_CHANNEL_DYNAMIC 13
|
2001-06-05 22:52:50 +02:00
|
|
|
#define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */
|
2010-01-26 03:26:22 +01:00
|
|
|
#define SSH_CHANNEL_MUX_LISTENER 15 /* Listener for mux conn. */
|
2020-07-06 01:59:45 +02:00
|
|
|
#define SSH_CHANNEL_MUX_CLIENT 16 /* Conn. to mux client */
|
2013-06-10 05:07:11 +02:00
|
|
|
#define SSH_CHANNEL_ABANDONED 17 /* Abandoned session, eg mux */
|
2014-07-18 06:11:24 +02:00
|
|
|
#define SSH_CHANNEL_UNIX_LISTENER 18 /* Listening on a domain socket. */
|
|
|
|
#define SSH_CHANNEL_RUNIX_LISTENER 19 /* Listening to a R-style domain socket. */
|
2020-07-06 01:59:45 +02:00
|
|
|
#define SSH_CHANNEL_MUX_PROXY 20 /* proxy channel for mux-client */
|
2017-09-21 21:16:53 +02:00
|
|
|
#define SSH_CHANNEL_RDYNAMIC_OPEN 21 /* reverse SOCKS, parsing request */
|
|
|
|
#define SSH_CHANNEL_RDYNAMIC_FINISH 22 /* reverse SOCKS, finishing connect */
|
|
|
|
#define SSH_CHANNEL_MAX_TYPE 23
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2011-09-22 13:39:48 +02:00
|
|
|
#define CHANNEL_CANCEL_PORT_STATIC -1
|
|
|
|
|
2021-05-19 03:24:05 +02:00
|
|
|
/* nonblocking flags for channel_new */
|
|
|
|
#define CHANNEL_NONBLOCK_LEAVE 0 /* don't modify non-blocking state */
|
|
|
|
#define CHANNEL_NONBLOCK_SET 1 /* set non-blocking state */
|
|
|
|
#define CHANNEL_NONBLOCK_STDIO 2 /* set non-blocking and restore on close */
|
|
|
|
|
|
|
|
/* c->restore_block mask flags */
|
|
|
|
#define CHANNEL_RESTORE_RFD 0x01
|
|
|
|
#define CHANNEL_RESTORE_WFD 0x02
|
|
|
|
#define CHANNEL_RESTORE_EFD 0x04
|
|
|
|
|
2018-06-06 20:22:41 +02:00
|
|
|
/* TCP forwarding */
|
|
|
|
#define FORWARD_DENY 0
|
|
|
|
#define FORWARD_REMOTE (1)
|
|
|
|
#define FORWARD_LOCAL (1<<1)
|
|
|
|
#define FORWARD_ALLOW (FORWARD_REMOTE|FORWARD_LOCAL)
|
|
|
|
|
|
|
|
#define FORWARD_ADM 0x100
|
|
|
|
#define FORWARD_USER 0x101
|
|
|
|
|
2017-05-30 16:23:52 +02:00
|
|
|
struct ssh;
|
2000-08-23 02:46:23 +02:00
|
|
|
struct Channel;
|
|
|
|
typedef struct Channel Channel;
|
2017-09-12 08:32:07 +02:00
|
|
|
struct fwd_perm_list;
|
2000-08-23 02:46:23 +02:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
typedef void channel_open_fn(struct ssh *, int, int, void *);
|
|
|
|
typedef void channel_callback_fn(struct ssh *, int, void *);
|
|
|
|
typedef int channel_infilter_fn(struct ssh *, struct Channel *, char *, int);
|
|
|
|
typedef void channel_filter_cleanup_fn(struct ssh *, int, void *);
|
|
|
|
typedef u_char *channel_outfilter_fn(struct ssh *, struct Channel *,
|
|
|
|
u_char **, size_t *);
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2008-05-19 07:05:07 +02:00
|
|
|
/* Channel success/failure callbacks */
|
2017-09-12 08:32:07 +02:00
|
|
|
typedef void channel_confirm_cb(struct ssh *, int, struct Channel *, void *);
|
|
|
|
typedef void channel_confirm_abandon_cb(struct ssh *, struct Channel *, void *);
|
2008-05-19 07:05:07 +02:00
|
|
|
struct channel_confirm {
|
|
|
|
TAILQ_ENTRY(channel_confirm) entry;
|
|
|
|
channel_confirm_cb *cb;
|
|
|
|
channel_confirm_abandon_cb *abandon_cb;
|
|
|
|
void *ctx;
|
|
|
|
};
|
|
|
|
TAILQ_HEAD(channel_confirms, channel_confirm);
|
|
|
|
|
2008-05-19 07:37:09 +02:00
|
|
|
/* Context for non-blocking connects */
|
|
|
|
struct channel_connect {
|
|
|
|
char *host;
|
|
|
|
int port;
|
|
|
|
struct addrinfo *ai, *aitop;
|
|
|
|
};
|
|
|
|
|
2010-01-26 03:26:22 +01:00
|
|
|
/* Callbacks for mux channels back into client-specific code */
|
2017-09-12 08:32:07 +02:00
|
|
|
typedef int mux_callback_fn(struct ssh *, struct Channel *);
|
2010-01-26 03:26:22 +01:00
|
|
|
|
2020-01-25 23:49:38 +01:00
|
|
|
/*
|
|
|
|
* NB. channel IDs on the wire and in c->remote_id are uint32, but local
|
|
|
|
* channel IDs (e.g. c->self) only ever use the int32 subset of this range,
|
|
|
|
* because we use local channel ID -1 for housekeeping. Remote channels have
|
|
|
|
* a dedicated "have_remote_id" flag to indicate their validity.
|
|
|
|
*/
|
|
|
|
|
2000-08-23 02:46:23 +02:00
|
|
|
struct Channel {
|
1999-11-24 14:26:21 +01:00
|
|
|
int type; /* channel type/state */
|
2020-01-25 23:49:38 +01:00
|
|
|
|
1999-11-24 14:26:21 +01:00
|
|
|
int self; /* my own channel identifier */
|
2017-09-12 08:35:31 +02:00
|
|
|
uint32_t remote_id; /* channel identifier for remote peer */
|
|
|
|
int have_remote_id; /* non-zero if remote_id is valid */
|
|
|
|
|
2002-01-22 13:27:11 +01:00
|
|
|
u_int istate; /* input from channel (state of receive half) */
|
|
|
|
u_int ostate; /* output to channel (state of transmit half) */
|
2000-04-04 06:38:59 +02:00
|
|
|
int flags; /* close sent/rcvd */
|
2000-04-01 03:09:21 +02:00
|
|
|
int rfd; /* read fd */
|
|
|
|
int wfd; /* write fd */
|
|
|
|
int efd; /* extended fd */
|
|
|
|
int sock; /* sock fd */
|
2010-01-26 03:26:22 +01:00
|
|
|
int ctl_chan; /* control channel (multiplexed connections) */
|
2001-02-16 02:34:57 +01:00
|
|
|
int isatty; /* rfd is a tty */
|
2013-08-01 06:29:20 +02:00
|
|
|
#ifdef _AIX
|
2002-07-22 17:28:53 +02:00
|
|
|
int wfd_isatty; /* wfd is a tty */
|
2013-08-01 06:29:20 +02:00
|
|
|
#endif
|
2004-11-05 10:35:44 +01:00
|
|
|
int client_tty; /* (client) TTY has been requested */
|
2001-10-10 07:03:58 +02:00
|
|
|
int force_drain; /* force close on iEOF */
|
2012-04-22 03:21:10 +02:00
|
|
|
time_t notbefore; /* Pause IO until deadline (time_t) */
|
2010-01-08 07:08:00 +01:00
|
|
|
int delayed; /* post-select handlers for newly created
|
|
|
|
* channels are delayed until the first call
|
2015-05-08 08:45:13 +02:00
|
|
|
* to a matching pre-select handler.
|
2010-01-08 07:08:00 +01:00
|
|
|
* this way post-select handlers are not
|
2013-06-06 00:09:10 +02:00
|
|
|
* accidentally called if a FD gets reused */
|
2021-05-19 03:24:05 +02:00
|
|
|
int restore_block; /* fd mask to restore blocking status */
|
2017-09-12 08:32:07 +02:00
|
|
|
struct sshbuf *input; /* data read from socket, to be sent over
|
1999-11-24 14:26:21 +01:00
|
|
|
* encrypted connection */
|
2017-09-12 08:32:07 +02:00
|
|
|
struct sshbuf *output; /* data received over encrypted connection for
|
1999-11-24 14:26:21 +01:00
|
|
|
* send on socket */
|
2017-09-12 08:32:07 +02:00
|
|
|
struct sshbuf *extended;
|
|
|
|
|
2009-01-28 06:29:49 +01:00
|
|
|
char *path;
|
2001-05-05 06:09:47 +02:00
|
|
|
/* path for unix domain sockets, or host name for forwards */
|
1999-11-24 14:26:21 +01:00
|
|
|
int listening_port; /* port being listened for forwards */
|
2011-09-22 13:38:52 +02:00
|
|
|
char *listening_addr; /* addr being listened for forwards */
|
1999-11-24 14:26:21 +01:00
|
|
|
int host_port; /* remote port to connect for forwards */
|
|
|
|
char *remote_name; /* remote hostname */
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2002-06-26 01:17:36 +02:00
|
|
|
u_int remote_window;
|
|
|
|
u_int remote_maxpacket;
|
|
|
|
u_int local_window;
|
|
|
|
u_int local_window_max;
|
|
|
|
u_int local_consumed;
|
|
|
|
u_int local_maxpacket;
|
2000-04-01 03:09:21 +02:00
|
|
|
int extended_usage;
|
2001-12-21 04:58:35 +01:00
|
|
|
int single_connection;
|
2000-04-01 03:09:21 +02:00
|
|
|
|
|
|
|
char *ctype; /* type */
|
|
|
|
|
- Remove references to SSLeay.
- Big OpenBSD CVS update
- markus@cvs.openbsd.org
[clientloop.c]
- typo
[session.c]
- update proctitle on pty alloc/dealloc, e.g. w/ windows client
[session.c]
- update proctitle for proto 1, too
[channels.h nchan.c serverloop.c session.c sshd.c]
- use c-style comments
- deraadt@cvs.openbsd.org
[scp.c]
- more atomicio
- markus@cvs.openbsd.org
[channels.c]
- set O_NONBLOCK
[ssh.1]
- update AUTHOR
[readconf.c ssh-keygen.c ssh.h]
- default DSA key file ~/.ssh/id_dsa
[clientloop.c]
- typo, rm verbose debug
- deraadt@cvs.openbsd.org
[ssh-keygen.1]
- document DSA use of ssh-keygen
[sshd.8]
- a start at describing what i understand of the DSA side
[ssh-keygen.1]
- document -X and -x
[ssh-keygen.c]
- simplify usage
- markus@cvs.openbsd.org
[sshd.8]
- there is no rhosts_dsa
[ssh-keygen.1]
- document -y, update -X,-x
[nchan.c]
- fix close for non-open ssh1 channels
[servconf.c servconf.h ssh.h sshd.8 sshd.c ]
- s/DsaKey/HostDSAKey/, document option
[sshconnect2.c]
- respect number_of_password_prompts
[channels.c channels.h servconf.c servconf.h session.c sshd.8]
- GatewayPorts for sshd, ok deraadt@
[ssh-add.1 ssh-agent.1 ssh.1]
- more doc on: DSA, id_dsa, known_hosts2, authorized_keys2
[ssh.1]
- more info on proto 2
[sshd.8]
- sync AUTHOR w/ ssh.1
[key.c key.h sshconnect.c]
- print key type when talking about host keys
[packet.c]
- clear padding in ssh2
[dsa.c key.c radix.c ssh.h sshconnect1.c uuencode.c uuencode.h]
- replace broken uuencode w/ libc b64_ntop
[auth2.c]
- log failure before sending the reply
[key.c radix.c uuencode.c]
- remote trailing comments before calling __b64_pton
[auth2.c readconf.c readconf.h servconf.c servconf.h ssh.1]
[sshconnect2.c sshd.8]
- add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8
- Bring in b64_ntop and b64_pton from OpenBSD libc (bsd-base64.[ch])
2000-05-07 04:03:14 +02:00
|
|
|
/* callback */
|
2010-05-21 06:57:10 +02:00
|
|
|
channel_open_fn *open_confirm;
|
2008-05-19 07:05:07 +02:00
|
|
|
void *open_confirm_ctx;
|
2005-11-05 04:52:50 +01:00
|
|
|
channel_callback_fn *detach_user;
|
|
|
|
int detach_close;
|
2008-05-19 07:05:07 +02:00
|
|
|
struct channel_confirms status_confirms;
|
2000-08-23 02:46:23 +02:00
|
|
|
|
|
|
|
/* filter */
|
2005-12-31 06:22:32 +01:00
|
|
|
channel_infilter_fn *input_filter;
|
|
|
|
channel_outfilter_fn *output_filter;
|
2008-06-12 20:49:33 +02:00
|
|
|
void *filter_ctx;
|
2008-06-12 20:55:46 +02:00
|
|
|
channel_filter_cleanup_fn *filter_cleanup;
|
2005-12-13 09:29:02 +01:00
|
|
|
|
2008-05-19 07:37:09 +02:00
|
|
|
/* keep boundaries */
|
2021-04-03 07:54:14 +02:00
|
|
|
int datagram;
|
2008-05-19 07:37:09 +02:00
|
|
|
|
|
|
|
/* non-blocking connect */
|
2017-09-12 08:32:07 +02:00
|
|
|
/* XXX make this a pointer so the structure can be opaque */
|
2008-05-19 07:37:09 +02:00
|
|
|
struct channel_connect connect_ctx;
|
2010-01-26 03:26:22 +01:00
|
|
|
|
|
|
|
/* multiplexing protocol hook, called for each packet received */
|
|
|
|
mux_callback_fn *mux_rcb;
|
|
|
|
void *mux_ctx;
|
2010-05-21 06:57:10 +02:00
|
|
|
int mux_pause;
|
2021-04-03 07:54:14 +02:00
|
|
|
int mux_downstream_id;
|
2000-08-23 02:46:23 +02:00
|
|
|
};
|
2000-04-01 03:09:21 +02:00
|
|
|
|
|
|
|
#define CHAN_EXTENDED_IGNORE 0
|
|
|
|
#define CHAN_EXTENDED_READ 1
|
|
|
|
#define CHAN_EXTENDED_WRITE 2
|
|
|
|
|
2000-09-16 04:29:08 +02:00
|
|
|
/* default window/packet sizes for tcp/x11-fwd-channel */
|
2002-02-19 05:20:57 +01:00
|
|
|
#define CHAN_SES_PACKET_DEFAULT (32*1024)
|
2007-06-12 15:38:53 +02:00
|
|
|
#define CHAN_SES_WINDOW_DEFAULT (64*CHAN_SES_PACKET_DEFAULT)
|
2002-02-19 05:20:57 +01:00
|
|
|
#define CHAN_TCP_PACKET_DEFAULT (32*1024)
|
2007-06-12 15:38:53 +02:00
|
|
|
#define CHAN_TCP_WINDOW_DEFAULT (64*CHAN_TCP_PACKET_DEFAULT)
|
2002-02-19 05:20:57 +01:00
|
|
|
#define CHAN_X11_PACKET_DEFAULT (16*1024)
|
|
|
|
#define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT)
|
2000-09-16 04:29:08 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* possible input states */
|
2002-01-22 13:27:11 +01:00
|
|
|
#define CHAN_INPUT_OPEN 0
|
|
|
|
#define CHAN_INPUT_WAIT_DRAIN 1
|
|
|
|
#define CHAN_INPUT_WAIT_OCLOSE 2
|
|
|
|
#define CHAN_INPUT_CLOSED 3
|
2000-09-16 04:29:08 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* possible output states */
|
2002-01-22 13:27:11 +01:00
|
|
|
#define CHAN_OUTPUT_OPEN 0
|
|
|
|
#define CHAN_OUTPUT_WAIT_DRAIN 1
|
|
|
|
#define CHAN_OUTPUT_WAIT_IEOF 2
|
|
|
|
#define CHAN_OUTPUT_CLOSED 3
|
2001-06-09 02:41:05 +02:00
|
|
|
|
|
|
|
#define CHAN_CLOSE_SENT 0x01
|
|
|
|
#define CHAN_CLOSE_RCVD 0x02
|
2002-03-26 04:26:24 +01:00
|
|
|
#define CHAN_EOF_SENT 0x04
|
|
|
|
#define CHAN_EOF_RCVD 0x08
|
2010-01-26 03:26:22 +01:00
|
|
|
#define CHAN_LOCAL 0x10
|
2002-03-26 04:26:24 +01:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
/* Read buffer size */
|
|
|
|
#define CHAN_RBUF (16*1024)
|
|
|
|
|
2020-09-20 07:47:25 +02:00
|
|
|
/* Maximum channel input buffer size */
|
|
|
|
#define CHAN_INPUT_MAX (16*1024*1024)
|
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
/* Hard limit on number of channels */
|
|
|
|
#define CHANNELS_MAX_CHANNELS (16*1024)
|
2005-12-31 06:22:32 +01:00
|
|
|
|
2002-03-26 04:26:24 +01:00
|
|
|
/* check whether 'efd' is still in use */
|
|
|
|
#define CHANNEL_EFD_INPUT_ACTIVE(c) \
|
2017-05-01 01:13:25 +02:00
|
|
|
(c->extended_usage == CHAN_EXTENDED_READ && \
|
2002-03-26 04:26:24 +01:00
|
|
|
(c->efd != -1 || \
|
2017-09-12 08:32:07 +02:00
|
|
|
sshbuf_len(c->extended) > 0))
|
2002-03-26 04:26:24 +01:00
|
|
|
#define CHANNEL_EFD_OUTPUT_ACTIVE(c) \
|
2017-05-01 01:13:25 +02:00
|
|
|
(c->extended_usage == CHAN_EXTENDED_WRITE && \
|
2005-07-14 09:05:51 +02:00
|
|
|
c->efd != -1 && (!(c->flags & (CHAN_EOF_RCVD|CHAN_CLOSE_RCVD)) || \
|
2017-09-12 08:32:07 +02:00
|
|
|
sshbuf_len(c->extended) > 0))
|
|
|
|
|
|
|
|
/* Add channel management structures to SSH transport instance */
|
|
|
|
void channel_init_channels(struct ssh *ssh);
|
2001-06-09 02:41:05 +02:00
|
|
|
|
|
|
|
/* channel management */
|
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
Channel *channel_by_id(struct ssh *, int);
|
2017-09-12 08:35:31 +02:00
|
|
|
Channel *channel_by_remote_id(struct ssh *, u_int);
|
2017-09-12 08:32:07 +02:00
|
|
|
Channel *channel_lookup(struct ssh *, int);
|
|
|
|
Channel *channel_new(struct ssh *, char *, int, int, int, int,
|
|
|
|
u_int, u_int, int, char *, int);
|
|
|
|
void channel_set_fds(struct ssh *, int, int, int, int, int,
|
|
|
|
int, int, u_int);
|
|
|
|
void channel_free(struct ssh *, Channel *);
|
|
|
|
void channel_free_all(struct ssh *);
|
|
|
|
void channel_stop_listening(struct ssh *);
|
|
|
|
|
|
|
|
void channel_send_open(struct ssh *, int);
|
|
|
|
void channel_request_start(struct ssh *, int, char *, int);
|
|
|
|
void channel_register_cleanup(struct ssh *, int,
|
|
|
|
channel_callback_fn *, int);
|
|
|
|
void channel_register_open_confirm(struct ssh *, int,
|
|
|
|
channel_open_fn *, void *);
|
|
|
|
void channel_register_filter(struct ssh *, int, channel_infilter_fn *,
|
|
|
|
channel_outfilter_fn *, channel_filter_cleanup_fn *, void *);
|
|
|
|
void channel_register_status_confirm(struct ssh *, int,
|
|
|
|
channel_confirm_cb *, channel_confirm_abandon_cb *, void *);
|
|
|
|
void channel_cancel_cleanup(struct ssh *, int);
|
2021-05-19 03:24:05 +02:00
|
|
|
int channel_close_fd(struct ssh *, Channel *, int *);
|
2017-09-12 08:32:07 +02:00
|
|
|
void channel_send_window_changes(struct ssh *);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2016-09-30 11:19:13 +02:00
|
|
|
/* mux proxy support */
|
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
int channel_proxy_downstream(struct ssh *, Channel *mc);
|
2017-05-30 16:23:52 +02:00
|
|
|
int channel_proxy_upstream(Channel *, int, u_int32_t, struct ssh *);
|
2016-09-30 11:19:13 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* protocol handler */
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2017-05-30 16:23:52 +02:00
|
|
|
int channel_input_data(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_extended_data(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_ieof(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_oclose(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_open_confirmation(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_open_failure(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_port_open(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_window_adjust(int, u_int32_t, struct ssh *);
|
|
|
|
int channel_input_status_confirm(int, u_int32_t, struct ssh *);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* file descriptor handling (read/write) */
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2017-08-30 05:59:08 +02:00
|
|
|
void channel_prepare_select(struct ssh *, fd_set **, fd_set **, int *,
|
2021-04-03 08:18:40 +02:00
|
|
|
u_int*, time_t*);
|
2017-08-30 05:59:08 +02:00
|
|
|
void channel_after_select(struct ssh *, fd_set *, fd_set *);
|
2017-09-12 08:32:07 +02:00
|
|
|
void channel_output_poll(struct ssh *);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
int channel_not_very_much_buffered_data(struct ssh *);
|
|
|
|
void channel_close_all(struct ssh *);
|
|
|
|
int channel_still_open(struct ssh *);
|
2018-10-04 02:10:11 +02:00
|
|
|
const char *channel_format_extended_usage(const Channel *);
|
2017-09-12 08:32:07 +02:00
|
|
|
char *channel_open_message(struct ssh *);
|
|
|
|
int channel_find_open(struct ssh *);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2001-10-03 19:34:59 +02:00
|
|
|
/* tcp forwarding */
|
2014-07-18 06:11:24 +02:00
|
|
|
struct Forward;
|
|
|
|
struct ForwardOptions;
|
2017-09-12 08:32:07 +02:00
|
|
|
void channel_set_af(struct ssh *, int af);
|
2018-06-06 20:22:41 +02:00
|
|
|
void channel_permit_all(struct ssh *, int);
|
|
|
|
void channel_add_permission(struct ssh *, int, int, char *, int);
|
|
|
|
void channel_clear_permission(struct ssh *, int, int);
|
|
|
|
void channel_disable_admin(struct ssh *, int);
|
|
|
|
void channel_update_permission(struct ssh *, int, int);
|
2017-09-12 08:32:07 +02:00
|
|
|
Channel *channel_connect_to_port(struct ssh *, const char *, u_short,
|
|
|
|
char *, char *, int *, const char **);
|
|
|
|
Channel *channel_connect_to_path(struct ssh *, const char *, char *, char *);
|
|
|
|
Channel *channel_connect_stdio_fwd(struct ssh *, const char*,
|
2021-05-19 03:24:05 +02:00
|
|
|
u_short, int, int, int);
|
2017-09-12 08:32:07 +02:00
|
|
|
Channel *channel_connect_by_listen_address(struct ssh *, const char *,
|
|
|
|
u_short, char *, char *);
|
|
|
|
Channel *channel_connect_by_listen_path(struct ssh *, const char *,
|
|
|
|
char *, char *);
|
|
|
|
int channel_request_remote_forwarding(struct ssh *, struct Forward *);
|
|
|
|
int channel_setup_local_fwd_listener(struct ssh *, struct Forward *,
|
|
|
|
struct ForwardOptions *);
|
|
|
|
int channel_request_rforward_cancel(struct ssh *, struct Forward *);
|
|
|
|
int channel_setup_remote_fwd_listener(struct ssh *, struct Forward *,
|
|
|
|
int *, struct ForwardOptions *);
|
|
|
|
int channel_cancel_rport_listener(struct ssh *, struct Forward *);
|
|
|
|
int channel_cancel_lport_listener(struct ssh *, struct Forward *,
|
|
|
|
int, struct ForwardOptions *);
|
2011-10-02 09:57:35 +02:00
|
|
|
int permitopen_port(const char *);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* x11 forwarding */
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
void channel_set_x11_refuse_time(struct ssh *, u_int);
|
|
|
|
int x11_connect_display(struct ssh *);
|
|
|
|
int x11_create_display_inet(struct ssh *, int, int, int, u_int *, int **);
|
|
|
|
void x11_request_forwarding_with_spoofing(struct ssh *, int,
|
|
|
|
const char *, const char *, const char *, int);
|
2000-04-01 03:09:21 +02:00
|
|
|
|
2001-06-09 02:41:05 +02:00
|
|
|
/* channel close */
|
2000-04-04 06:38:59 +02:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
int chan_is_dead(struct ssh *, Channel *, int);
|
|
|
|
void chan_mark_dead(struct ssh *, Channel *);
|
2001-07-04 06:46:56 +02:00
|
|
|
|
2002-01-22 13:28:45 +01:00
|
|
|
/* channel events */
|
2001-06-09 02:41:05 +02:00
|
|
|
|
2017-09-12 08:32:07 +02:00
|
|
|
void chan_rcvd_oclose(struct ssh *, Channel *);
|
|
|
|
void chan_rcvd_eow(struct ssh *, Channel *);
|
|
|
|
void chan_read_failed(struct ssh *, Channel *);
|
|
|
|
void chan_ibuf_empty(struct ssh *, Channel *);
|
|
|
|
void chan_rcvd_ieof(struct ssh *, Channel *);
|
|
|
|
void chan_write_failed(struct ssh *, Channel *);
|
|
|
|
void chan_obuf_empty(struct ssh *, Channel *);
|
2001-06-09 02:41:05 +02:00
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
#endif
|