summaryrefslogtreecommitdiffhomepage
path: root/common-channel.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2004-06-01 02:46:09 +0000
committerMatt Johnston <matt@ucc.asn.au>2004-06-01 02:46:09 +0000
commit674a60748884dc55ee7091b7c23a41240e75f73c (patch)
tree3b5a173c356f867b94df3873b57ff36d33129ea7 /common-channel.c
Makefile.in contains updated files required
--HG-- extra : convert_revision : cc8a8c49dc70e632c352853a39801089b08149be
Diffstat (limited to 'common-channel.c')
-rw-r--r--common-channel.c1008
1 files changed, 1008 insertions, 0 deletions
diff --git a/common-channel.c b/common-channel.c
new file mode 100644
index 0000000..8b5423a
--- /dev/null
+++ b/common-channel.c
@@ -0,0 +1,1008 @@
+/*
+ * Dropbear - a SSH2 server
+ *
+ * Copyright (c) 2002,2003 Matt Johnston
+ * All rights reserved.
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
+ * of this software and associated documentation files (the "Software"), to deal
+ * in the Software without restriction, including without limitation the rights
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+ * copies of the Software, and to permit persons to whom the Software is
+ * furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in
+ * all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+ * SOFTWARE. */
+
+/* Handle the multiplexed channels, such as sessions, x11, agent connections */
+
+#include "includes.h"
+#include "session.h"
+#include "packet.h"
+#include "ssh.h"
+#include "buffer.h"
+#include "dbutil.h"
+#include "channel.h"
+#include "ssh.h"
+#include "localtcpfwd.h"
+#include "remotetcpfwd.h"
+#include "tcpfwd.h"
+
+static void send_msg_channel_open_failure(unsigned int remotechan, int reason,
+ const unsigned char *text, const unsigned char *lang);
+static void send_msg_channel_open_confirmation(struct Channel* channel,
+ unsigned int recvwindow,
+ unsigned int recvmaxpacket);
+static void writechannel(struct Channel *channel);
+static void send_msg_channel_window_adjust(struct Channel *channel,
+ unsigned int incr);
+static void send_msg_channel_data(struct Channel *channel, int isextended,
+ unsigned int exttype);
+static void send_msg_channel_eof(struct Channel *channel);
+static void send_msg_channel_close(struct Channel *channel);
+static void removechannel(struct Channel *channel);
+static void deletechannel(struct Channel *channel);
+static void checkinitdone(struct Channel *channel);
+static void checkclose(struct Channel *channel);
+
+static void closeinfd(struct Channel * channel);
+static void closeoutfd(struct Channel * channel, int fd);
+static void closechanfd(struct Channel *channel, int fd, int how);
+
+#define FD_UNINIT (-2)
+#define FD_CLOSED (-1)
+
+/* Initialise all the channels */
+void chaninitialise(struct ChanType *chantypes[]) {
+
+ /* may as well create space for a single channel */
+ ses.channels = (struct Channel**)m_malloc(sizeof(struct Channel*));
+ ses.chansize = 1;
+ ses.channels[0] = NULL;
+
+ ses.chantypes = chantypes;
+
+#ifdef USING_TCP_LISTENERS
+ tcp_fwd_initialise();
+#endif
+
+}
+
+/* Clean up channels, freeing allocated memory */
+void chancleanup() {
+
+ unsigned int i;
+
+ TRACE(("enter chancleanup"));
+ for (i = 0; i < ses.chansize; i++) {
+ if (ses.channels[i] != NULL) {
+ TRACE(("channel %d closing", i));
+ removechannel(ses.channels[i]);
+ }
+ }
+ m_free(ses.channels);
+ TRACE(("leave chancleanup"));
+}
+
+/* Create a new channel entry, send a reply confirm or failure */
+/* If remotechan, transwindow and transmaxpacket are not know (for a new
+ * outgoing connection, with them to be filled on confirmation), they should
+ * all be set to 0 */
+struct Channel* newchannel(unsigned int remotechan, struct ChanType *type,
+ unsigned int transwindow, unsigned int transmaxpacket) {
+
+ struct Channel * newchan;
+ unsigned int i, j;
+
+ TRACE(("enter newchannel"));
+
+ /* first see if we can use existing channels */
+ for (i = 0; i < ses.chansize; i++) {
+ if (ses.channels[i] == NULL) {
+ break;
+ }
+ }
+
+ /* otherwise extend the list */
+ if (i == ses.chansize) {
+ if (ses.chansize >= MAX_CHANNELS) {
+ TRACE(("leave newchannel: max chans reached"));
+ return NULL;
+ }
+
+ /* extend the channels */
+ ses.channels = (struct Channel**)m_realloc(ses.channels,
+ (ses.chansize+CHAN_EXTEND_SIZE)*sizeof(struct Channel*));
+
+ ses.chansize += CHAN_EXTEND_SIZE;
+
+ /* set the new channels to null */
+ for (j = i; j < ses.chansize; j++) {
+ ses.channels[j] = NULL;
+ }
+
+ }
+
+ newchan = (struct Channel*)m_malloc(sizeof(struct Channel));
+ newchan->type = type;
+ newchan->index = i;
+ newchan->sentclosed = newchan->recvclosed = 0;
+ newchan->senteof = newchan->recveof = 0;
+
+ newchan->remotechan = remotechan;
+ newchan->transwindow = transwindow;
+ newchan->transmaxpacket = transmaxpacket;
+
+ newchan->typedata = NULL;
+ newchan->infd = FD_UNINIT;
+ newchan->outfd = FD_UNINIT;
+ newchan->errfd = FD_CLOSED; /* this isn't always set to start with */
+ newchan->initconn = 0;
+
+ newchan->writebuf = buf_new(RECV_MAXWINDOW);
+ newchan->recvwindow = RECV_MAXWINDOW;
+ newchan->recvmaxpacket = RECV_MAXPACKET;
+
+ ses.channels[i] = newchan;
+
+ TRACE(("leave newchannel"));
+
+ return newchan;
+}
+
+/* Get the channel structure corresponding to a channel number */
+static struct Channel* getchannel(unsigned int chan) {
+ if (chan >= ses.chansize || ses.channels[chan] == NULL) {
+ return NULL;
+ }
+ return ses.channels[chan];
+}
+
+/* Iterate through the channels, performing IO if available */
+void channelio(fd_set *readfd, fd_set *writefd) {
+
+ struct Channel *channel;
+ unsigned int i;
+
+ /* iterate through all the possible channels */
+ for (i = 0; i < ses.chansize; i++) {
+
+ channel = ses.channels[i];
+ if (channel == NULL) {
+ /* only process in-use channels */
+ continue;
+ }
+
+ /* read from program/pipe stdout */
+ if (channel->outfd >= 0 && FD_ISSET(channel->outfd, readfd)) {
+ send_msg_channel_data(channel, 0, 0);
+ }
+
+ /* read from program/pipe stderr */
+ if (channel->errfd >= 0 && FD_ISSET(channel->errfd, readfd)) {
+ send_msg_channel_data(channel, 1, SSH_EXTENDED_DATA_STDERR);
+ }
+
+ /* if we can read from the infd, it might be closed, so we try to
+ * see if it has errors */
+ if (channel->infd >= 0 && channel->infd != channel->outfd
+ && FD_ISSET(channel->infd, readfd)) {
+ int ret;
+ ret = write(channel->infd, NULL, 0);
+ if (ret < 0 && errno != EINTR && errno != EAGAIN) {
+ closeinfd(channel);
+ }
+ }
+
+ /* write to program/pipe stdin */
+ if (channel->infd >= 0 && FD_ISSET(channel->infd, writefd)) {
+ if (channel->initconn) {
+ checkinitdone(channel);
+ continue; /* Important not to use the channel after
+ checkinitdone(), as it may be NULL */
+ } else {
+ writechannel(channel);
+ }
+ }
+
+ /* now handle any of the channel-closing type stuff */
+ checkclose(channel);
+
+ } /* foreach channel */
+
+ /* Not channel specific */
+#ifdef USING_TCP_LISTENERS
+ handle_tcp_fwd(readfd);
+#endif
+}
+
+
+/* do all the EOF/close type stuff checking for a channel */
+static void checkclose(struct Channel *channel) {
+
+ if (!channel->sentclosed) {
+
+ /* check for exited - currently only used for server sessions,
+ * if the shell has exited etc */
+ if (channel->type->checkclose) {
+ if (channel->type->checkclose(channel)) {
+ closeinfd(channel);
+ }
+ }
+
+ if (!channel->senteof
+ && channel->outfd == FD_CLOSED
+ && channel->errfd == FD_CLOSED) {
+ send_msg_channel_eof(channel);
+ }
+
+ if (channel->infd == FD_CLOSED
+ && channel->outfd == FD_CLOSED
+ && channel->errfd == FD_CLOSED) {
+ send_msg_channel_close(channel);
+ }
+ }
+
+ /* When either party wishes to terminate the channel, it sends
+ * SSH_MSG_CHANNEL_CLOSE. Upon receiving this message, a party MUST
+ * send back a SSH_MSG_CHANNEL_CLOSE unless it has already sent this
+ * message for the channel. The channel is considered closed for a
+ * party when it has both sent and received SSH_MSG_CHANNEL_CLOSE, and
+ * the party may then reuse the channel number. A party MAY send
+ * SSH_MSG_CHANNEL_CLOSE without having sent or received
+ * SSH_MSG_CHANNEL_EOF.
+ * (from draft-ietf-secsh-connect)
+ */
+ if (channel->recvclosed) {
+ if (! channel->sentclosed) {
+ TRACE(("Sending MSG_CHANNEL_CLOSE in response to same."));
+ send_msg_channel_close(channel);
+ }
+ removechannel(channel);
+ }
+}
+
+
+/* Check whether a deferred (EINPROGRESS) connect() was successful, and
+ * if so, set up the channel properly. Otherwise, the channel is cleaned up, so
+ * it is important that the channel reference isn't used after a call to this
+ * function */
+static void checkinitdone(struct Channel *channel) {
+
+ int val;
+ socklen_t vallen = sizeof(val);
+
+ TRACE(("enter checkinitdone"));
+
+ if (getsockopt(channel->infd, SOL_SOCKET, SO_ERROR, &val, &vallen)
+ || val != 0) {
+ close(channel->infd);
+ deletechannel(channel);
+ TRACE(("leave checkinitdone: fail"));
+ } else {
+ channel->outfd = channel->infd;
+ channel->initconn = 0;
+ TRACE(("leave checkinitdone: success"));
+ }
+}
+
+
+
+/* Send the close message and set the channel as closed */
+static void send_msg_channel_close(struct Channel *channel) {
+
+ TRACE(("enter send_msg_channel_close"));
+ /* XXX server */
+ if (channel->type->closehandler) {
+ channel->type->closehandler(channel);
+ }
+#if 0
+ if (channel->type == CHANNEL_ID_SESSION) {
+ send_exitsignalstatus(channel);
+
+ closechansess(channel);
+ }
+#endif
+
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_CLOSE);
+ buf_putint(ses.writepayload, channel->remotechan);
+
+ encrypt_packet();
+
+ channel->senteof = 1;
+ channel->sentclosed = 1;
+ TRACE(("leave send_msg_channel_close"));
+}
+
+/* call this when trans/eof channels are closed */
+static void send_msg_channel_eof(struct Channel *channel) {
+
+ TRACE(("enter send_msg_channel_eof"));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_EOF);
+ buf_putint(ses.writepayload, channel->remotechan);
+
+ encrypt_packet();
+
+ channel->senteof = 1;
+
+ TRACE(("leave send_msg_channel_eof"));
+}
+
+/* Called to write data out to the server side of a channel (eg a shell or a
+ * program.
+ * Only called when we know we can write to a channel, writes as much as
+ * possible */
+static void writechannel(struct Channel* channel) {
+
+ int len, maxlen;
+ buffer *buf;
+
+ TRACE(("enter writechannel"));
+
+ buf = channel->writebuf;
+ maxlen = buf->len - buf->pos;
+
+ len = write(channel->infd, buf_getptr(buf, maxlen), maxlen);
+ if (len <= 0) {
+ if (len < 0 && errno != EINTR) {
+ /* no more to write */
+ closeinfd(channel);
+ }
+ TRACE(("leave writechannel: len <= 0"));
+ return;
+ }
+
+ if (len == maxlen) {
+ buf_setpos(buf, 0);
+ buf_setlen(buf, 0);
+
+ if (channel->recveof) {
+ /* we're closing up */
+ closeinfd(channel);
+ return;
+ TRACE(("leave writechannel: recveof set"));
+ }
+
+ /* extend the window if we're at the end*/
+ /* TODO - this is inefficient */
+ send_msg_channel_window_adjust(channel, buf->size
+ - channel->recvwindow);
+ channel->recvwindow = buf->size;
+ } else {
+ buf_incrpos(buf, len);
+ }
+ TRACE(("leave writechannel"));
+}
+
+/* Set the file descriptors for the main select in session.c
+ * This avoid channels which don't have any window available, are closed, etc*/
+void setchannelfds(fd_set *readfd, fd_set *writefd) {
+
+ unsigned int i;
+ struct Channel * channel;
+
+ for (i = 0; i < ses.chansize; i++) {
+
+ channel = ses.channels[i];
+ if (channel == NULL) {
+ continue;
+ }
+
+ /* stdout and stderr */
+ if (channel->transwindow > 0) {
+
+ /* stdout */
+ if (channel->outfd >= 0) {
+ /* there's space to read more from the program */
+ FD_SET(channel->outfd, readfd);
+ }
+ /* stderr */
+ if (channel->errfd >= 0) {
+ FD_SET(channel->errfd, readfd);
+ }
+ }
+
+ if (channel->infd >= 0 && channel->infd != channel->outfd) {
+ FD_SET(channel->infd, readfd);
+ }
+
+ /* stdin */
+ if (channel->infd >= 0 &&
+ (channel->writebuf->pos < channel->writebuf->len ||
+ channel->initconn)) {
+ /* there's space to write more to the program */
+ FD_SET(channel->infd, writefd);
+ }
+
+ } /* foreach channel */
+
+#ifdef USING_TCP_LISTENERS
+ set_tcp_fwd_fds(readfd);
+#endif
+
+}
+
+/* handle the channel EOF event, by closing the channel filedescriptor. The
+ * channel isn't closed yet, it is left until the incoming (from the program
+ * etc) FD is also EOF */
+void recv_msg_channel_eof() {
+
+ unsigned int chan;
+ struct Channel * channel;
+
+ TRACE(("enter recv_msg_channel_eof"));
+
+ chan = buf_getint(ses.payload);
+ channel = getchannel(chan);
+
+ if (channel == NULL) {
+ dropbear_exit("EOF for unknown channel");
+ }
+
+ channel->recveof = 1;
+ if (channel->writebuf->len == 0) {
+ closeinfd(channel);
+ }
+
+ TRACE(("leave recv_msg_channel_eof"));
+}
+
+
+/* Handle channel closure(), respond in kind and close the channels */
+void recv_msg_channel_close() {
+
+ unsigned int chan;
+ struct Channel * channel;
+
+ TRACE(("enter recv_msg_channel_close"));
+
+ chan = buf_getint(ses.payload);
+ TRACE(("close channel = %d", chan));
+ channel = getchannel(chan);
+
+ if (channel == NULL) {
+ /* disconnect ? */
+ dropbear_exit("Close for unknown channel");
+ }
+
+ channel->recveof = 1;
+ channel->recvclosed = 1;
+
+ if (channel->sentclosed) {
+ removechannel(channel);
+ }
+
+ TRACE(("leave recv_msg_channel_close"));
+}
+
+/* Remove a channel entry, this is only executed after both sides have sent
+ * channel close */
+static void removechannel(struct Channel * channel) {
+
+ TRACE(("enter removechannel"));
+ TRACE(("channel index is %d", channel->index));
+
+ buf_free(channel->writebuf);
+
+ /* close the FDs in case they haven't been done
+ * yet (ie they were shutdown etc */
+ close(channel->infd);
+ close(channel->outfd);
+ if (channel->errfd >= 0) {
+ close(channel->errfd);
+ }
+
+ deletechannel(channel);
+
+ TRACE(("leave removechannel"));
+}
+
+/* Remove a channel entry */
+static void deletechannel(struct Channel *channel) {
+
+ ses.channels[channel->index] = NULL;
+ m_free(channel);
+
+}
+
+
+/* Handle channel specific requests, passing off to corresponding handlers
+ * such as chansession or x11fwd */
+void recv_msg_channel_request() {
+
+ unsigned int chan;
+ struct Channel *channel;
+
+ TRACE(("enter recv_msg_channel_request"));
+
+ chan = buf_getint(ses.payload);
+ channel = getchannel(chan);
+
+ if (channel == NULL) {
+ /* disconnect ? */
+ dropbear_exit("Unknown channel");
+ }
+
+ TRACE(("chan type is %d", channel->type));
+
+ if (channel->type->reqhandler) {
+ channel->type->reqhandler(channel);
+ } else {
+ send_msg_channel_failure(channel);
+ }
+
+#if 0
+ /* handle according to channel type */
+ switch (channel->type) {
+
+ case CHANNEL_ID_SESSION:
+ TRACE(("continue recv_msg_channel_request: session request"));
+ /* XXX server */
+ /* Here we need to do things channel-specific style. Function
+ * pointer callbacks perhaps */
+ chansessionrequest(channel);
+ break;
+
+ default:
+ send_msg_channel_failure(channel);
+ }
+#endif
+
+ TRACE(("leave recv_msg_channel_request"));
+
+}
+
+/* Reads data from the server's program/shell/etc, and puts it in a
+ * channel_data packet to send.
+ * chan is the remote channel, isextended is 0 if it is normal data, 1
+ * if it is extended data. if it is extended, then the type is in
+ * exttype */
+static void send_msg_channel_data(struct Channel *channel, int isextended,
+ unsigned int exttype) {
+
+ buffer *buf;
+ int len;
+ unsigned int maxlen;
+ int fd;
+
+/* TRACE(("enter send_msg_channel_data"));
+ TRACE(("extended = %d type = %d", isextended, exttype));*/
+
+ CHECKCLEARTOWRITE();
+
+ assert(!channel->sentclosed);
+
+ if (isextended) {
+ fd = channel->errfd;
+ } else {
+ fd = channel->outfd;
+ }
+ assert(fd >= 0);
+
+ maxlen = MIN(channel->transwindow, channel->transmaxpacket);
+ /* -(1+4+4) is SSH_MSG_CHANNEL_DATA, channel number, string length, and
+ * exttype if is extended */
+ maxlen = MIN(maxlen,
+ ses.writepayload->size - 1 - 4 - 4 - (isextended ? 4 : 0));
+ if (maxlen == 0) {
+ TRACE(("leave send_msg_channel_data: no window"));
+ return; /* the data will get written later */
+ }
+
+ /* read the data */
+ buf = buf_new(maxlen);
+ len = read(fd, buf_getwriteptr(buf, maxlen), maxlen);
+ if (len <= 0) {
+ /* on error/eof, send eof */
+ if (len == 0 || errno != EINTR) {
+ closeoutfd(channel, fd);
+ TRACE(("leave send_msg_channel_data: read err"));
+ }
+ buf_free(buf);
+ return;
+ }
+ buf_incrlen(buf, len);
+
+ buf_putbyte(ses.writepayload,
+ isextended ? SSH_MSG_CHANNEL_EXTENDED_DATA : SSH_MSG_CHANNEL_DATA);
+ buf_putint(ses.writepayload, channel->remotechan);
+
+ if (isextended) {
+ buf_putint(ses.writepayload, exttype);
+ }
+
+ buf_putstring(ses.writepayload, buf_getptr(buf, len), len);
+ buf_free(buf);
+
+ channel->transwindow -= len;
+
+ encrypt_packet();
+ TRACE(("leave send_msg_channel_data"));
+}
+
+
+/* when we receive channel data, put it in a buffer for writing to the program/
+ * shell etc */
+void recv_msg_channel_data() {
+
+ unsigned int chan;
+ struct Channel * channel;
+ unsigned int datalen;
+ unsigned int pos;
+ unsigned int maxdata;
+
+ TRACE(("enter recv_msg_channel_data"));
+
+ chan = buf_getint(ses.payload);
+ channel = getchannel(chan);
+ if (channel == NULL) {
+ dropbear_exit("Unknown channel");
+ }
+
+ if (channel->recveof) {
+ dropbear_exit("received data after eof");
+ }
+
+ if (channel->infd < 0) {
+ dropbear_exit("received data with bad infd");
+ }
+
+ datalen = buf_getint(ses.payload);
+
+ /* if the client is going to send us more data than we've allocated, then
+ * it has ignored the windowsize, so we "MAY ignore all extra data" */
+ maxdata = channel->writebuf->size - channel->writebuf->pos;
+ if (datalen > maxdata) {
+ TRACE(("Warning: recv_msg_channel_data: extra data past window"));
+ datalen = maxdata;
+ }
+
+ /* write to the buffer - we always append to the end of the buffer */
+ pos = channel->writebuf->pos;
+ buf_setpos(channel->writebuf, channel->writebuf->len);
+ memcpy(buf_getwriteptr(channel->writebuf, datalen),
+ buf_getptr(ses.payload, datalen), datalen);
+ buf_incrwritepos(channel->writebuf, datalen);
+ buf_setpos(channel->writebuf, pos); /* revert pos */
+
+ channel->recvwindow -= datalen;
+
+ /* matt - this might be for later */
+/* if (channel->recvwindow < RECV_MINWINDOW) {
+ send_msg_channel_window_adjust(channel,
+ RECV_MAXWINDOW - channel->recvwindow);
+ channel->recvwindow = RECV_MAXWINDOW;
+ }*/
+
+ TRACE(("leave recv_msg_channel_data"));
+}
+
+/* Increment the outgoing data window for a channel - the remote end limits
+ * the amount of data which may be transmitted, this window is decremented
+ * as data is sent, and incremented upon receiving window-adjust messages */
+void recv_msg_channel_window_adjust() {
+
+ unsigned int chan;
+ struct Channel * channel;
+ unsigned int incr;
+
+ chan = buf_getint(ses.payload);
+ channel = getchannel(chan);
+
+ if (channel == NULL) {
+ dropbear_exit("Unknown channel");
+ }
+
+ incr = buf_getint(ses.payload);
+ TRACE(("received window increment %d", incr));
+ incr = MIN(incr, MAX_TRANS_WIN_INCR);
+
+ channel->transwindow += incr;
+ channel->transwindow = MIN(channel->transwindow, MAX_TRANS_WINDOW);
+
+}
+
+/* Increment the incoming data window for a channel, and let the remote
+ * end know */
+static void send_msg_channel_window_adjust(struct Channel* channel,
+ unsigned int incr) {
+
+ TRACE(("sending window adjust %d", incr));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_WINDOW_ADJUST);
+ buf_putint(ses.writepayload, channel->remotechan);
+ buf_putint(ses.writepayload, incr);
+
+ encrypt_packet();
+}
+
+/* Handle a new channel request, performing any channel-type-specific setup */
+/* XXX server */
+void recv_msg_channel_open() {
+
+ unsigned char *type;
+ unsigned int typelen;
+ unsigned int remotechan, transwindow, transmaxpacket;
+ struct Channel *channel;
+ struct ChanType *chantype;
+ unsigned int errtype = SSH_OPEN_UNKNOWN_CHANNEL_TYPE;
+ int ret;
+
+
+ TRACE(("enter recv_msg_channel_open"));
+
+ /* get the packet contents */
+ type = buf_getstring(ses.payload, &typelen);
+
+ remotechan = buf_getint(ses.payload);
+ transwindow = buf_getint(ses.payload);
+ transwindow = MIN(transwindow, MAX_TRANS_WINDOW);
+ transmaxpacket = buf_getint(ses.payload);
+ transmaxpacket = MIN(transmaxpacket, MAX_TRANS_PAYLOAD_LEN);
+
+ /* figure what type of packet it is */
+ if (typelen > MAX_NAME_LEN) {
+ goto failure;
+ }
+
+ /* Get the channel type. This will depend if it is a client or a server,
+ * so we iterate through the connection-specific list which was
+ * set up when the connection started */
+ for (chantype = ses.chantypes[0]; chantype != NULL; chantype++) {
+ if (strcmp(type, chantype->name) == 0) {
+ break;
+ }
+ }
+
+ if (chantype == NULL) {
+ goto failure;
+ }
+
+ /* create the channel */
+ channel = newchannel(remotechan, chantype, transwindow, transmaxpacket);
+
+ if (channel == NULL) {
+ goto failure;
+ }
+
+ if (channel->type->inithandler) {
+ ret = channel->type->inithandler(channel);
+ if (ret >= 0) {
+ errtype = ret;
+ deletechannel(channel);
+ goto failure;
+ }
+ }
+
+#if 0
+ /* type specific initialisation */
+ if (typeval == CHANNEL_ID_SESSION) {
+ newchansess(channel);
+#ifndef DISABLE_LOCALTCPFWD
+ } else if (typeval == CHANNEL_ID_TCPDIRECT) {
+ if (ses.opts->nolocaltcp) {
+ errtype = SSH_OPEN_ADMINISTRATIVELY_PROHIBITED;
+ } else if (newtcpdirect(channel) == DROPBEAR_FAILURE) {
+ errtype = SSH_OPEN_CONNECT_FAILED;
+ deletechannel(channel);
+ goto failure;
+ }
+#endif
+ }
+#endif
+
+ /* success */
+ send_msg_channel_open_confirmation(channel, channel->recvwindow,
+ channel->recvmaxpacket);
+ goto cleanup;
+
+failure:
+ send_msg_channel_open_failure(remotechan, errtype, "", "");
+
+cleanup:
+ m_free(type);
+
+ TRACE(("leave recv_msg_channel_open"));
+}
+
+/* Send a failure message */
+void send_msg_channel_failure(struct Channel *channel) {
+
+ TRACE(("enter send_msg_channel_failure"));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_FAILURE);
+ buf_putint(ses.writepayload, channel->remotechan);
+
+ encrypt_packet();
+ TRACE(("leave send_msg_channel_failure"));
+}
+
+/* Send a success message */
+void send_msg_channel_success(struct Channel *channel) {
+
+ TRACE(("enter send_msg_channel_success"));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_SUCCESS);
+ buf_putint(ses.writepayload, channel->remotechan);
+
+ encrypt_packet();
+ TRACE(("leave send_msg_channel_success"));
+}
+
+/* Send a channel open failure message, with a corresponding reason
+ * code (usually resource shortage or unknown chan type) */
+static void send_msg_channel_open_failure(unsigned int remotechan,
+ int reason, const unsigned char *text, const unsigned char *lang) {
+
+ TRACE(("enter send_msg_channel_open_failure"));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_OPEN_FAILURE);
+ buf_putint(ses.writepayload, remotechan);
+ buf_putint(ses.writepayload, reason);
+ buf_putstring(ses.writepayload, text, strlen((char*)text));
+ buf_putstring(ses.writepayload, lang, strlen((char*)lang));
+
+ encrypt_packet();
+ TRACE(("leave send_msg_channel_open_failure"));
+}
+
+/* Confirm a channel open, and let the remote end know what number we've
+ * allocated and the receive parameters */
+static void send_msg_channel_open_confirmation(struct Channel* channel,
+ unsigned int recvwindow,
+ unsigned int recvmaxpacket) {
+
+ TRACE(("enter send_msg_channel_open_confirmation"));
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_OPEN_CONFIRMATION);
+ buf_putint(ses.writepayload, channel->remotechan);
+ buf_putint(ses.writepayload, channel->index);
+ buf_putint(ses.writepayload, recvwindow);
+ buf_putint(ses.writepayload, recvmaxpacket);
+
+ encrypt_packet();
+ TRACE(("leave send_msg_channel_open_confirmation"));
+}
+
+#ifdef USE_LISTENERS
+/* Create a new channel, and start the open request. This is intended
+ * for X11, agent, tcp forwarding, and should be filled with channel-specific
+ * options, with the calling function calling encrypt_packet() after
+ * completion. It is mandatory for the caller to encrypt_packet() if
+ * DROPBEAR_SUCCESS is returned */
+int send_msg_channel_open_init(int fd, struct ChanType *type,
+ const char * typestring) {
+
+ struct Channel* chan;
+
+ TRACE(("enter send_msg_channel_open_init()"));
+ chan = newchannel(0, type, 0, 0);
+ if (!chan) {
+ TRACE(("leave send_msg_channel_open_init() - FAILED in newchannel()"));
+ return DROPBEAR_FAILURE;
+ }
+
+ /* set fd non-blocking */
+ if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0) {
+ TRACE(("leave send_msg_channel_open_init() - FAILED in fcntl()"));
+ return DROPBEAR_FAILURE;
+ }
+
+ chan->infd = chan->outfd = fd;
+ ses.maxfd = MAX(ses.maxfd, fd);
+
+ /* now open the channel connection */
+ CHECKCLEARTOWRITE();
+
+ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_OPEN);
+ buf_putstring(ses.writepayload, typestring, strlen(typestring));
+ buf_putint(ses.writepayload, chan->index);
+ buf_putint(ses.writepayload, RECV_MAXWINDOW);
+ buf_putint(ses.writepayload, RECV_MAXPACKET);
+
+ TRACE(("leave send_msg_channel_open_init()"));
+ return DROPBEAR_SUCCESS;
+}
+
+/* Confirmation that our channel open request (for forwardings) was
+ * successful*/
+void recv_msg_channel_open_confirmation() {
+
+ unsigned int chan;
+ struct Channel * channel;
+
+ TRACE(("enter recv_msg_channel_open_confirmation"));
+ chan = buf_getint(ses.payload);
+
+ channel = getchannel(chan);
+ if (channel == NULL) {
+ dropbear_exit("Unknown channel");
+ }
+
+ channel->remotechan = buf_getint(ses.payload);
+ channel->transwindow = buf_getint(ses.payload);
+ channel->transmaxpacket = buf_getint(ses.payload);
+
+ TRACE(("leave recv_msg_channel_open_confirmation"));
+}
+
+/* Notification that our channel open request failed */
+void recv_msg_channel_open_failure() {
+
+ unsigned int chan;
+ struct Channel * channel;
+ chan = buf_getbyte(ses.payload);
+
+ channel = getchannel(chan);
+ if (channel == NULL) {
+ dropbear_exit("Unknown channel");
+ }
+
+ removechannel(channel);
+}
+
+/* close a stdout/stderr fd */
+static void closeoutfd(struct Channel * channel, int fd) {
+
+ /* don't close it if it is the same as infd,
+ * unless infd is already set -1 */
+ TRACE(("enter closeoutfd"));
+ closechanfd(channel, fd, 0);
+ TRACE(("leave closeoutfd"));
+}
+
+/* close a stdin fd */
+static void closeinfd(struct Channel * channel) {
+
+ TRACE(("enter closeinfd"));
+ closechanfd(channel, channel->infd, 1);
+ TRACE(("leave closeinfd"));
+}
+
+/* close a fd, how is 0 for stdout/stderr, 1 for stdin */
+static void closechanfd(struct Channel *channel, int fd, int how) {
+
+ int closein = 0, closeout = 0;
+
+ /* XXX server */
+ if (channel->type->sepfds) {
+ shutdown(fd, how);
+ if (how == 0) {
+ closeout = 1;
+ } else {
+ closein = 1;
+ }
+ } else {
+ close(fd);
+ closein = closeout = 1;
+ }
+
+ if (closeout && fd == channel->errfd) {
+ channel->errfd = FD_CLOSED;
+ }
+ if (closeout && fd == channel->outfd) {
+ channel->outfd = FD_CLOSED;
+ }
+ if (closein && fd == channel->infd) {
+ channel->infd = FD_CLOSED;
+ }
+}
+
+#endif /* USE_LISTENERS */