]> andersk Git - openssh.git/blame - channels.h
- markus@cvs.openbsd.org 2002/03/04 13:10:46
[openssh.git] / channels.h
CommitLineData
bcbf86ec 1/*
2 * Author: Tatu Ylonen <ylo@cs.hut.fi>
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved
5 *
6 * As far as I am concerned, the code I have written for this software
7 * can be used freely for any purpose. Any derived versions of this
8 * software must be clearly marked as such, and if the derived work is
9 * incompatible with the protocol description in the RFC file, it must be
10 * called by a name other than "ssh" or "Secure Shell".
11 */
12/*
8ab5f6b2 13 * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved.
bcbf86ec 14 *
15 * Redistribution and use in source and binary forms, with or without
16 * modification, are permitted provided that the following conditions
17 * are met:
18 * 1. Redistributions of source code must retain the above copyright
19 * notice, this list of conditions and the following disclaimer.
20 * 2. Redistributions in binary form must reproduce the above copyright
21 * notice, this list of conditions and the following disclaimer in the
22 * documentation and/or other materials provided with the distribution.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
25 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
26 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
27 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
28 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
29 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
30 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
31 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
33 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
ea9700ba 35/* RCSID("$OpenBSD: channels.h,v 1.64 2002/02/14 23:28:00 markus Exp $"); */
8efc0c15 36
8e7895b8 37#ifndef CHANNEL_H
38#define CHANNEL_H
8efc0c15 39
01794848 40#include "buffer.h"
41
8efc0c15 42/* Definitions for channel types. */
aa3378df 43#define SSH_CHANNEL_X11_LISTENER 1 /* Listening for inet X11 conn. */
5260325f 44#define SSH_CHANNEL_PORT_LISTENER 2 /* Listening on a port. */
45#define SSH_CHANNEL_OPENING 3 /* waiting for confirmation */
46#define SSH_CHANNEL_OPEN 4 /* normal open two-way channel */
aa3378df 47#define SSH_CHANNEL_CLOSED 5 /* waiting for close confirmation */
7368a6c8 48#define SSH_CHANNEL_AUTH_SOCKET 6 /* authentication socket */
49#define SSH_CHANNEL_X11_OPEN 7 /* reading first X11 packet */
50#define SSH_CHANNEL_INPUT_DRAINING 8 /* sending remaining data to conn */
51#define SSH_CHANNEL_OUTPUT_DRAINING 9 /* sending remaining data to app */
52#define SSH_CHANNEL_LARVAL 10 /* larval session */
fa08c86b 53#define SSH_CHANNEL_RPORT_LISTENER 11 /* Listening to a R-style port */
97fb6912 54#define SSH_CHANNEL_CONNECTING 12
0490e609 55#define SSH_CHANNEL_DYNAMIC 13
6fd8622b 56#define SSH_CHANNEL_ZOMBIE 14 /* Almost dead. */
57#define SSH_CHANNEL_MAX_TYPE 15
8efc0c15 58
27c47c0a 59#define SSH_CHANNEL_PATH_LEN 256
719fc62f 60
2e73a022 61struct Channel;
62typedef struct Channel Channel;
63
2a1e4639 64typedef void channel_callback_fn(int, void *);
65typedef int channel_filter_fn(struct Channel *, char *, int);
8efc0c15 66
2e73a022 67struct Channel {
5260325f 68 int type; /* channel type/state */
69 int self; /* my own channel identifier */
70 int remote_id; /* channel identifier for remote peer */
368e9dfc 71 u_int istate; /* input from channel (state of receive half) */
72 u_int ostate; /* output to channel (state of transmit half) */
7e7327a1 73 int flags; /* close sent/rcvd */
7368a6c8 74 int rfd; /* read fd */
75 int wfd; /* write fd */
76 int efd; /* extended fd */
77 int sock; /* sock fd */
0ae4fe1d 78 int isatty; /* rfd is a tty */
639cb8ab 79 int force_drain; /* force close on iEOF */
80 int delayed; /* fdset hack */
5260325f 81 Buffer input; /* data read from socket, to be sent over
82 * encrypted connection */
83 Buffer output; /* data received over encrypted connection for
84 * send on socket */
7368a6c8 85 Buffer extended;
719fc62f 86 char path[SSH_CHANNEL_PATH_LEN];
87 /* path for unix domain sockets, or host name for forwards */
5260325f 88 int listening_port; /* port being listened for forwards */
89 int host_port; /* remote port to connect for forwards */
90 char *remote_name; /* remote hostname */
7368a6c8 91
92 int remote_window;
93 int remote_maxpacket;
94 int local_window;
95 int local_window_max;
96 int local_consumed;
97 int local_maxpacket;
98 int extended_usage;
ac151b18 99 int single_connection;
7368a6c8 100
101 char *ctype; /* type */
102
1d1ffb87 103 /* callback */
05ca0898 104 channel_callback_fn *confirm;
3cf2be58 105 channel_callback_fn *detach_user;
2e73a022 106
107 /* filter */
108 channel_filter_fn *input_filter;
109};
7368a6c8 110
111#define CHAN_EXTENDED_IGNORE 0
112#define CHAN_EXTENDED_READ 1
113#define CHAN_EXTENDED_WRITE 2
114
bcbf86ec 115/* default window/packet sizes for tcp/x11-fwd-channel */
ea9700ba 116#define CHAN_SES_PACKET_DEFAULT (32*1024)
117#define CHAN_SES_WINDOW_DEFAULT (4*CHAN_SES_PACKET_DEFAULT)
118#define CHAN_TCP_PACKET_DEFAULT (32*1024)
119#define CHAN_TCP_WINDOW_DEFAULT (4*CHAN_TCP_PACKET_DEFAULT)
120#define CHAN_X11_PACKET_DEFAULT (16*1024)
121#define CHAN_X11_WINDOW_DEFAULT (4*CHAN_X11_PACKET_DEFAULT)
bcbf86ec 122
8e7895b8 123/* possible input states */
368e9dfc 124#define CHAN_INPUT_OPEN 0
125#define CHAN_INPUT_WAIT_DRAIN 1
126#define CHAN_INPUT_WAIT_OCLOSE 2
127#define CHAN_INPUT_CLOSED 3
bcbf86ec 128
8e7895b8 129/* possible output states */
368e9dfc 130#define CHAN_OUTPUT_OPEN 0
131#define CHAN_OUTPUT_WAIT_DRAIN 1
132#define CHAN_OUTPUT_WAIT_IEOF 2
133#define CHAN_OUTPUT_CLOSED 3
8e7895b8 134
135#define CHAN_CLOSE_SENT 0x01
136#define CHAN_CLOSE_RCVD 0x02
137
8e7895b8 138/* channel management */
139
2a1e4639 140Channel *channel_lookup(int);
141Channel *channel_new(char *, int, int, int, int, int, int, int, char *, int);
ea9700ba 142void channel_set_fds(int, int, int, int, int, int, u_int);
3cf2be58 143void channel_free(Channel *);
144void channel_free_all(void);
3cf2be58 145void channel_stop_listening(void);
255cabd9 146
147void channel_send_open(int);
255cabd9 148void channel_request_start(int, char *, int);
255cabd9 149void channel_register_cleanup(int, channel_callback_fn *);
05ca0898 150void channel_register_confirm(int, channel_callback_fn *);
255cabd9 151void channel_register_filter(int, channel_filter_fn *);
152void channel_cancel_cleanup(int);
489aa2e9 153int channel_close_fd(int *);
7368a6c8 154
8e7895b8 155/* protocol handler */
7368a6c8 156
7819b5c3 157void channel_input_close(int, u_int32_t, void *);
158void channel_input_close_confirmation(int, u_int32_t, void *);
159void channel_input_data(int, u_int32_t, void *);
160void channel_input_extended_data(int, u_int32_t, void *);
161void channel_input_ieof(int, u_int32_t, void *);
162void channel_input_oclose(int, u_int32_t, void *);
163void channel_input_open_confirmation(int, u_int32_t, void *);
164void channel_input_open_failure(int, u_int32_t, void *);
165void channel_input_port_open(int, u_int32_t, void *);
166void channel_input_window_adjust(int, u_int32_t, void *);
7368a6c8 167
8e7895b8 168/* file descriptor handling (read/write) */
7368a6c8 169
489aa2e9 170void channel_prepare_select(fd_set **, fd_set **, int *, int*, int);
255cabd9 171void channel_after_select(fd_set *, fd_set *);
172void channel_output_poll(void);
7368a6c8 173
255cabd9 174int channel_not_very_much_buffered_data(void);
175void channel_close_all(void);
255cabd9 176int channel_still_open(void);
177char *channel_open_message(void);
178int channel_find_open(void);
7368a6c8 179
5e4a7219 180/* tcp forwarding */
181void channel_set_af(int af);
255cabd9 182void channel_permit_all_opens(void);
183void channel_add_permitted_opens(char *, int);
184void channel_clear_permitted_opens(void);
185void channel_input_port_forward_request(int, int);
186int channel_connect_to(const char *, u_short);
b3f8a79c 187int channel_connect_by_listen_address(u_short);
255cabd9 188void channel_request_remote_forwarding(u_short, const char *, u_short);
5641aefa 189int channel_setup_local_fwd_listener(u_short, const char *, u_short, int);
190int channel_setup_remote_fwd_listener(const char *, u_short, int);
7368a6c8 191
8e7895b8 192/* x11 forwarding */
7368a6c8 193
255cabd9 194int x11_connect_display(void);
ac151b18 195int x11_create_display_inet(int, int, int);
7819b5c3 196void x11_input_open(int, u_int32_t, void *);
255cabd9 197void x11_request_forwarding_with_spoofing(int, const char *, const char *);
7819b5c3 198void deny_input_open(int, u_int32_t, void *);
7368a6c8 199
8e7895b8 200/* agent forwarding */
7368a6c8 201
255cabd9 202void auth_request_forwarding(void);
203char *auth_get_socket_name(void);
204void auth_sock_cleanup_proc(void *);
205int auth_input_request_forwarding(struct passwd *);
7819b5c3 206void auth_input_open_request(int, u_int32_t, void *);
7368a6c8 207
8e7895b8 208/* channel close */
7e7327a1 209
418e724c 210int chan_is_dead(Channel *, int);
255cabd9 211void chan_mark_dead(Channel *);
255cabd9 212
70bef40e 213/* channel events */
8e7895b8 214
70bef40e 215void chan_rcvd_oclose(Channel *);
216void chan_read_failed(Channel *);
217void chan_ibuf_empty(Channel *);
8e7895b8 218
70bef40e 219void chan_rcvd_ieof(Channel *);
220void chan_write_failed(Channel *);
221void chan_obuf_empty(Channel *);
8e7895b8 222
8efc0c15 223#endif
This page took 0.174408 seconds and 5 git commands to generate.