]>
Commit | Line | Data |
---|---|---|
b5afdff5 | 1 | /* $OpenBSD: packet.h,v 1.52 2009/06/27 09:29:06 andreas Exp $ */ |
1e608e42 | 2 | |
3c0ef626 | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | |
5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | |
6 | * All rights reserved | |
7 | * Interface for the packet protocol functions. | |
8 | * | |
9 | * As far as I am concerned, the code I have written for this software | |
10 | * can be used freely for any purpose. Any derived versions of this | |
11 | * software must be clearly marked as such, and if the derived work is | |
12 | * incompatible with the protocol description in the RFC file, it must be | |
13 | * called by a name other than "ssh" or "Secure Shell". | |
14 | */ | |
15 | ||
3c0ef626 | 16 | #ifndef PACKET_H |
17 | #define PACKET_H | |
18 | ||
30460aeb | 19 | #include <termios.h> |
20 | ||
3c0ef626 | 21 | #include <openssl/bn.h> |
22 | ||
473db5ab | 23 | void |
24 | packet_request_rekeying(void); | |
25 | ||
3c0ef626 | 26 | void packet_set_connection(int, int); |
5156b1a1 | 27 | void packet_set_timeout(int, int); |
3c0ef626 | 28 | void packet_set_nonblocking(void); |
29 | int packet_get_connection_in(void); | |
30 | int packet_get_connection_out(void); | |
31 | void packet_close(void); | |
32 | void packet_set_encryption_key(const u_char *, u_int, int); | |
44a053a3 | 33 | u_int packet_get_encryption_key(u_char *); |
3c0ef626 | 34 | void packet_set_protocol_flags(u_int); |
35 | u_int packet_get_protocol_flags(void); | |
36 | void packet_start_compression(int); | |
37 | void packet_set_interactive(int); | |
38 | int packet_is_interactive(void); | |
2ce0bfe4 | 39 | void packet_set_server(void); |
40 | void packet_set_authenticated(void); | |
6df46d40 | 41 | int packet_authentication_state(void); |
3c0ef626 | 42 | |
43 | void packet_start(u_char); | |
44 | void packet_put_char(int ch); | |
45 | void packet_put_int(u_int value); | |
b5afdff5 | 46 | void packet_put_int64(u_int64_t value); |
3c0ef626 | 47 | void packet_put_bignum(BIGNUM * value); |
48 | void packet_put_bignum2(BIGNUM * value); | |
1e608e42 | 49 | void packet_put_string(const void *buf, u_int len); |
3c0ef626 | 50 | void packet_put_cstring(const char *str); |
1e608e42 | 51 | void packet_put_raw(const void *buf, u_int len); |
fa7499cc | 52 | int packet_send(void); |
3c0ef626 | 53 | |
1e608e42 | 54 | int packet_read(void); |
55 | void packet_read_expect(int type); | |
56 | int packet_read_poll(void); | |
3c0ef626 | 57 | void packet_process_incoming(const char *buf, u_int len); |
1e608e42 | 58 | int packet_read_seqnr(u_int32_t *seqnr_p); |
59 | int packet_read_poll_seqnr(u_int32_t *seqnr_p); | |
3c0ef626 | 60 | |
61 | u_int packet_get_char(void); | |
62 | u_int packet_get_int(void); | |
b5afdff5 | 63 | u_int64_t packet_get_int64(void); |
1e608e42 | 64 | void packet_get_bignum(BIGNUM * value); |
65 | void packet_get_bignum2(BIGNUM * value); | |
2ce0bfe4 | 66 | void *packet_get_raw(u_int *length_ptr); |
1e608e42 | 67 | void *packet_get_string(u_int *length_ptr); |
5156b1a1 | 68 | void *packet_get_string_ptr(u_int *length_ptr); |
3c0ef626 | 69 | void packet_disconnect(const char *fmt,...) __attribute__((format(printf, 1, 2))); |
70 | void packet_send_debug(const char *fmt,...) __attribute__((format(printf, 1, 2))); | |
71 | ||
510132b6 | 72 | void set_newkeys(int mode); |
73 | int packet_get_keyiv_len(int); | |
74 | void packet_get_keyiv(int, u_char *, u_int); | |
75 | int packet_get_keycontext(int, u_char *); | |
76 | void packet_set_keycontext(int, u_char *); | |
5156b1a1 | 77 | void packet_get_state(int, u_int32_t *, u_int64_t *, u_int32_t *, u_int64_t *); |
78 | void packet_set_state(int, u_int32_t, u_int64_t, u_int32_t, u_int64_t); | |
510132b6 | 79 | int packet_get_ssh1_cipher(void); |
80 | void packet_set_iv(int, u_char *); | |
b5afdff5 | 81 | void *packet_get_newkeys(int); |
510132b6 | 82 | |
fa7499cc | 83 | int packet_write_poll(void); |
84 | int packet_write_wait(void); | |
3c0ef626 | 85 | int packet_have_data_to_write(void); |
86 | int packet_not_very_much_data_to_write(void); | |
87 | ||
88 | int packet_connection_is_on_socket(void); | |
89 | int packet_connection_is_ipv4(void); | |
90 | int packet_remaining(void); | |
91 | void packet_send_ignore(int); | |
92 | void packet_add_padding(u_char); | |
93 | ||
94 | void tty_make_modes(int, struct termios *); | |
95 | void tty_parse_modes(int, int *); | |
96 | ||
b5afdff5 | 97 | void packet_set_alive_timeouts(int); |
98 | int packet_inc_alive_timeouts(void); | |
7e82606e | 99 | int packet_set_maxsize(u_int); |
b5afdff5 | 100 | u_int packet_get_maxsize(void); |
3c0ef626 | 101 | |
1e608e42 | 102 | /* don't allow remaining bytes after the end of the message */ |
103 | #define packet_check_eom() \ | |
3c0ef626 | 104 | do { \ |
105 | int _len = packet_remaining(); \ | |
106 | if (_len > 0) { \ | |
7cac2b65 | 107 | logit("Packet integrity error (%d bytes remaining) at %s:%d", \ |
3c0ef626 | 108 | _len ,__FILE__, __LINE__); \ |
109 | packet_disconnect("Packet integrity error."); \ | |
110 | } \ | |
111 | } while (0) | |
112 | ||
7cac2b65 | 113 | int packet_need_rekeying(void); |
114 | void packet_set_rekey_limit(u_int32_t); | |
115 | ||
b5afdff5 | 116 | void packet_backup_state(void); |
117 | void packet_restore_state(void); | |
118 | ||
119 | void *packet_get_input(void); | |
120 | void *packet_get_output(void); | |
121 | ||
3c0ef626 | 122 | #endif /* PACKET_H */ |