]> andersk Git - openssh.git/blob - compat.c
- (bal) Slight auth2-pam.c clean up.
[openssh.git] / compat.c
1 /*
2  * Copyright (c) 1999,2000 Markus Friedl.  All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions
6  * are met:
7  * 1. Redistributions of source code must retain the above copyright
8  *    notice, this list of conditions and the following disclaimer.
9  * 2. Redistributions in binary form must reproduce the above copyright
10  *    notice, this list of conditions and the following disclaimer in the
11  *    documentation and/or other materials provided with the distribution.
12  *
13  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23  */
24
25 #include "includes.h"
26 RCSID("$OpenBSD: compat.c,v 1.33 2001/01/08 22:29:05 markus Exp $");
27
28 #include "ssh.h"
29 #include "packet.h"
30 #include "xmalloc.h"
31 #include "compat.h"
32 #ifdef HAVE_LIBPCRE
33 #  include <pcreposix.h>
34 #else /* Use native regex libraries */
35 #  ifdef HAVE_REGEX_H
36 #    include <regex.h>
37 #  else
38 #    ifdef HAVE_REGCOMP
39 #      include "fake-regex.h"
40 #    else
41 #      error "No regular libraries detected.  See INSTALL file."
42 #    endif
43 #  endif
44 #endif /* HAVE_LIBPCRE */
45
46 int compat13 = 0;
47 int compat20 = 0;
48 int datafellows = 0;
49
50 void
51 enable_compat20(void)
52 {
53         verbose("Enabling compatibility mode for protocol 2.0");
54         compat20 = 1;
55 }
56 void
57 enable_compat13(void)
58 {
59         verbose("Enabling compatibility mode for protocol 1.3");
60         compat13 = 1;
61 }
62 /* datafellows bug compatibility */
63 void
64 compat_datafellows(const char *version)
65 {
66         int i, ret;
67         char ebuf[1024];
68         regex_t reg;
69         static struct {
70                 char    *pat;
71                 int     bugs;
72         } check[] = {
73                 { "^OpenSSH[-_]2\\.[012]",
74                                         SSH_OLD_SESSIONID|SSH_BUG_BANNER },
75                 { "^OpenSSH_2\\.3\\.0", SSH_BUG_BANNER },
76                 { "^OpenSSH",           0 },
77                 { "MindTerm",           0 },
78                 { "^2\\.1\\.0",         SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
79                                         SSH_OLD_SESSIONID|SSH_BUG_DEBUG },
80                 { "^2\\.0\\.1[3-9]",    SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
81                                         SSH_OLD_SESSIONID|SSH_BUG_DEBUG|
82                                         SSH_BUG_PKSERVICE|SSH_BUG_X11FWD },
83                 { "^2\\.0\\.",          SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
84                                         SSH_OLD_SESSIONID|SSH_BUG_DEBUG|
85                                         SSH_BUG_PKSERVICE|SSH_BUG_X11FWD|
86                                         SSH_BUG_PKAUTH },
87                 { "^2\\.[23]\\.0",      SSH_BUG_HMAC},
88                 { "^2\\.[2-9]\\.",      0 },
89                 { "^2\\.4$",            SSH_OLD_SESSIONID}, /* Van Dyke */
90                 { "^3\\.0 SecureCRT",   SSH_OLD_SESSIONID},
91                 { "^1\\.7 SecureFX",    SSH_OLD_SESSIONID},
92                 { NULL,                 0 }
93         };
94         /* process table, return first match */
95         for (i = 0; check[i].pat; i++) {
96                 ret = regcomp(&reg, check[i].pat, REG_EXTENDED|REG_NOSUB);
97                 if (ret != 0) {
98                         regerror(ret, &reg, ebuf, sizeof(ebuf));
99                         ebuf[sizeof(ebuf)-1] = '\0';
100                         error("regerror: %s", ebuf);
101                         continue;
102                 }
103                 ret = regexec(&reg, version, 0, NULL, 0);
104                 regfree(&reg);
105                 if (ret == 0) {
106                         debug("match: %s pat %s", version, check[i].pat);
107                         datafellows = check[i].bugs;
108                         return;
109                 }
110         }
111         debug("no match: %s", version);
112 }
113
114 #define SEP     ","
115 int
116 proto_spec(const char *spec)
117 {
118         char *s, *p, *q;
119         int ret = SSH_PROTO_UNKNOWN;
120
121         if (spec == NULL)
122                 return ret;
123         q = s = xstrdup(spec);
124         for ((p = strsep(&q, SEP)); p && *p != '\0'; (p = strsep(&q, SEP))) {
125                 switch(atoi(p)) {
126                 case 1:
127                         if (ret == SSH_PROTO_UNKNOWN)
128                                 ret |= SSH_PROTO_1_PREFERRED;
129                         ret |= SSH_PROTO_1;
130                         break;
131                 case 2:
132                         ret |= SSH_PROTO_2;
133                         break;
134                 default:
135                         log("ignoring bad proto spec: '%s'.", p);
136                         break;
137                 }
138         }
139         xfree(s);
140         return ret;
141 }
This page took 0.045024 seconds and 5 git commands to generate.