Mercurial > dropbear
annotate cli-session.c @ 39:0883c0906870
tty raw mode support works mostly
adding cli-{chansession,runopts}.c which were missing
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Fri, 30 Jul 2004 12:29:53 +0000 |
parents | 0913e2ee3545 |
children | b4874d772210 |
rev | line source |
---|---|
26 | 1 #include "includes.h" |
2 #include "session.h" | |
3 #include "dbutil.h" | |
4 #include "kex.h" | |
5 #include "ssh.h" | |
6 #include "packet.h" | |
7 #include "tcpfwd-direct.h" | |
8 #include "tcpfwd-remote.h" | |
9 #include "channel.h" | |
10 #include "random.h" | |
33 | 11 #include "service.h" |
26 | 12 |
13 static void cli_remoteclosed(); | |
14 static void cli_sessionloop(); | |
33 | 15 static void cli_session_init(); |
26 | 16 |
17 struct clientsession cli_ses; /* GLOBAL */ | |
18 | |
19 static const packettype cli_packettypes[] = { | |
20 /* TYPE, AUTHREQUIRED, FUNCTION */ | |
21 {SSH_MSG_KEXINIT, recv_msg_kexinit}, | |
22 {SSH_MSG_KEXDH_REPLY, recv_msg_kexdh_reply}, // client | |
23 {SSH_MSG_NEWKEYS, recv_msg_newkeys}, | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
24 {SSH_MSG_SERVICE_ACCEPT, recv_msg_service_accept}, // client |
26 | 25 {SSH_MSG_CHANNEL_DATA, recv_msg_channel_data}, |
26 {SSH_MSG_CHANNEL_WINDOW_ADJUST, recv_msg_channel_window_adjust}, | |
27 {SSH_MSG_GLOBAL_REQUEST, recv_msg_global_request_remotetcp}, | |
28 {SSH_MSG_CHANNEL_REQUEST, recv_msg_channel_request}, | |
29 {SSH_MSG_CHANNEL_OPEN, recv_msg_channel_open}, | |
30 {SSH_MSG_CHANNEL_EOF, recv_msg_channel_eof}, | |
31 {SSH_MSG_CHANNEL_CLOSE, recv_msg_channel_close}, | |
32 {SSH_MSG_CHANNEL_OPEN_CONFIRMATION, recv_msg_channel_open_confirmation}, | |
33 {SSH_MSG_CHANNEL_OPEN_FAILURE, recv_msg_channel_open_failure}, | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
34 {SSH_MSG_USERAUTH_FAILURE, recv_msg_userauth_failure}, // client |
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
35 {SSH_MSG_USERAUTH_SUCCESS, recv_msg_userauth_success}, // client |
26 | 36 {0, 0} /* End */ |
37 }; | |
38 | |
39 static const struct ChanType *cli_chantypes[] = { | |
40 /* &chan_tcpdirect etc, though need to only allow if we've requested | |
41 * that forwarding */ | |
42 NULL /* Null termination */ | |
43 }; | |
33 | 44 |
26 | 45 void cli_session(int sock, char* remotehost) { |
46 | |
47 crypto_init(); | |
48 common_session_init(sock, remotehost); | |
49 | |
50 chaninitialise(cli_chantypes); | |
51 | |
52 | |
33 | 53 /* Set up cli_ses vars */ |
54 cli_session_init(); | |
26 | 55 |
56 /* Ready to go */ | |
57 sessinitdone = 1; | |
58 | |
59 /* Exchange identification */ | |
60 session_identification(); | |
61 | |
62 seedrandom(); | |
63 | |
64 send_msg_kexinit(); | |
65 | |
66 /* XXX here we do stuff differently */ | |
67 | |
68 session_loop(cli_sessionloop); | |
69 | |
70 /* Not reached */ | |
71 | |
33 | 72 } |
26 | 73 |
33 | 74 static void cli_session_init() { |
75 | |
76 cli_ses.state = STATE_NOTHING; | |
77 cli_ses.kex_state = KEX_NOTHING; | |
78 | |
39
0883c0906870
tty raw mode support works mostly
Matt Johnston <matt@ucc.asn.au>
parents:
37
diff
changeset
|
79 cli_ses.tty_raw_mode = 0; |
0883c0906870
tty raw mode support works mostly
Matt Johnston <matt@ucc.asn.au>
parents:
37
diff
changeset
|
80 |
33 | 81 /* For printing "remote host closed" for the user */ |
82 ses.remoteclosed = cli_remoteclosed; | |
83 ses.buf_match_algo = cli_buf_match_algo; | |
84 | |
85 /* packet handlers */ | |
86 ses.packettypes = cli_packettypes; | |
35
0ad5fb979f42
set the isserver flag (oops)
Matt Johnston <matt@ucc.asn.au>
parents:
34
diff
changeset
|
87 |
0ad5fb979f42
set the isserver flag (oops)
Matt Johnston <matt@ucc.asn.au>
parents:
34
diff
changeset
|
88 ses.isserver = 0; |
26 | 89 } |
90 | |
33 | 91 /* This function drives the progress of the session - it initiates KEX, |
92 * service, userauth and channel requests */ | |
26 | 93 static void cli_sessionloop() { |
94 | |
33 | 95 TRACE(("enter cli_sessionloop")); |
96 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
97 if (ses.lastpacket == SSH_MSG_KEXINIT && cli_ses.kex_state == KEX_NOTHING) { |
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
98 cli_ses.kex_state = KEXINIT_RCVD; |
33 | 99 } |
100 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
101 if (cli_ses.kex_state == KEXINIT_RCVD) { |
33 | 102 |
103 /* We initiate the KEXDH. If DH wasn't the correct type, the KEXINIT | |
104 * negotiation would have failed. */ | |
105 send_msg_kexdh_init(); | |
106 cli_ses.kex_state = KEXDH_INIT_SENT; | |
107 TRACE(("leave cli_sessionloop: done with KEXINIT_RCVD")); | |
108 return; | |
109 } | |
110 | |
111 /* A KEX has finished, so we should go back to our KEX_NOTHING state */ | |
112 if (cli_ses.kex_state != KEX_NOTHING && ses.kexstate.recvkexinit == 0 | |
113 && ses.kexstate.sentkexinit == 0) { | |
114 cli_ses.kex_state = KEX_NOTHING; | |
115 } | |
116 | |
117 /* We shouldn't do anything else if a KEX is in progress */ | |
118 if (cli_ses.kex_state != KEX_NOTHING) { | |
119 TRACE(("leave cli_sessionloop: kex_state != KEX_NOTHING")); | |
120 return; | |
121 } | |
122 | |
123 /* We should exit if we haven't donefirstkex: we shouldn't reach here | |
124 * in normal operation */ | |
125 if (ses.kexstate.donefirstkex == 0) { | |
126 TRACE(("XXX XXX might be bad! leave cli_sessionloop: haven't donefirstkex")); | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
127 return; |
33 | 128 } |
129 | |
26 | 130 switch (cli_ses.state) { |
131 | |
33 | 132 case STATE_NOTHING: |
133 /* We've got the transport layer sorted, we now need to request | |
134 * userauth */ | |
135 send_msg_service_request(SSH_SERVICE_USERAUTH); | |
136 cli_ses.state = SERVICE_AUTH_REQ_SENT; | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
137 TRACE(("leave cli_sessionloop: sent userauth service req")); |
33 | 138 return; |
26 | 139 |
33 | 140 /* userauth code */ |
141 case SERVICE_AUTH_ACCEPT_RCVD: | |
142 cli_auth_getmethods(); | |
143 cli_ses.state = USERAUTH_METHODS_SENT; | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
144 TRACE(("leave cli_sessionloop: sent userauth methods req")); |
33 | 145 return; |
146 | |
147 case USERAUTH_FAIL_RCVD: | |
148 cli_auth_try(); | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
149 TRACE(("leave cli_sessionloop: cli_auth_try")); |
33 | 150 return; |
151 | |
37 | 152 /* |
153 case USERAUTH_SUCCESS_RCVD: | |
154 send_msg_service_request(SSH_SERVICE_CONNECTION); | |
155 cli_ses.state = SERVICE_CONN_REQ_SENT; | |
156 TRACE(("leave cli_sessionloop: sent ssh-connection service req")); | |
157 return; | |
158 */ | |
159 | |
160 case USERAUTH_SUCCESS_RCVD: | |
161 cli_send_chansess_request(); | |
162 TRACE(("leave cli_sessionloop: cli_send_chansess_request")); | |
163 cli_ses.state = SESSION_RUNNING; | |
164 return; | |
165 | |
33 | 166 /* XXX more here needed */ |
167 | |
168 | |
169 default: | |
170 break; | |
26 | 171 } |
172 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
173 TRACE(("leave cli_sessionloop: fell out")); |
26 | 174 |
175 } | |
176 | |
177 /* called when the remote side closes the connection */ | |
178 static void cli_remoteclosed() { | |
179 | |
180 /* XXX TODO perhaps print a friendlier message if we get this but have | |
181 * already sent/received disconnect message(s) ??? */ | |
182 close(ses.sock); | |
183 ses.sock = -1; | |
33 | 184 dropbear_exit("remote closed the connection"); |
26 | 185 } |