libssh
session.h
1 /*
2  * This file is part of the SSH Library
3  *
4  * Copyright (c) 2009 by Aris Adamantiadis
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
19  */
20 
21 #ifndef SESSION_H_
22 #define SESSION_H_
23 #include "libssh/priv.h"
24 #include "libssh/kex.h"
25 #include "libssh/packet.h"
26 #include "libssh/pcap.h"
27 #include "libssh/auth.h"
28 #include "libssh/channels.h"
29 #include "libssh/poll.h"
30 
31 /* These are the different states a SSH session can be into its life */
32 enum ssh_session_state_e {
33  SSH_SESSION_STATE_NONE=0,
34  SSH_SESSION_STATE_CONNECTING,
35  SSH_SESSION_STATE_SOCKET_CONNECTED,
36  SSH_SESSION_STATE_BANNER_RECEIVED,
37  SSH_SESSION_STATE_INITIAL_KEX,
38  SSH_SESSION_STATE_KEXINIT_RECEIVED,
39  SSH_SESSION_STATE_DH,
40  SSH_SESSION_STATE_AUTHENTICATING,
41  SSH_SESSION_STATE_AUTHENTICATED,
42  SSH_SESSION_STATE_ERROR,
43  SSH_SESSION_STATE_DISCONNECTED
44 };
45 
46 enum ssh_dh_state_e {
47  DH_STATE_INIT=0,
48  DH_STATE_INIT_SENT,
49  DH_STATE_NEWKEYS_SENT,
50  DH_STATE_FINISHED
51 };
52 
53 enum ssh_pending_call_e {
54  SSH_PENDING_CALL_NONE = 0,
55  SSH_PENDING_CALL_CONNECT,
56  SSH_PENDING_CALL_AUTH_NONE,
57  SSH_PENDING_CALL_AUTH_PASSWORD,
58  SSH_PENDING_CALL_AUTH_OFFER_PUBKEY,
59  SSH_PENDING_CALL_AUTH_PUBKEY,
60  SSH_PENDING_CALL_AUTH_AGENT,
61  SSH_PENDING_CALL_AUTH_KBDINT_INIT,
62  SSH_PENDING_CALL_AUTH_KBDINT_SEND,
63  SSH_PENDING_CALL_AUTH_GSSAPI_MIC
64 };
65 
66 /* libssh calls may block an undefined amount of time */
67 #define SSH_SESSION_FLAG_BLOCKING 1
68 
69 /* Client successfully authenticated */
70 #define SSH_SESSION_FLAG_AUTHENTICATED 2
71 
72 /* codes to use with ssh_handle_packets*() */
73 /* Infinite timeout */
74 #define SSH_TIMEOUT_INFINITE -1
75 /* Use the timeout defined by user if any. Mostly used with new connections */
76 #define SSH_TIMEOUT_USER -2
77 /* Use the default timeout, depending on ssh_is_blocking() */
78 #define SSH_TIMEOUT_DEFAULT -3
79 /* Don't block at all */
80 #define SSH_TIMEOUT_NONBLOCKING 0
81 
82 /* options flags */
83 /* Authentication with *** allowed */
84 #define SSH_OPT_FLAG_PASSWORD_AUTH 0x1
85 #define SSH_OPT_FLAG_PUBKEY_AUTH 0x2
86 #define SSH_OPT_FLAG_KBDINT_AUTH 0x4
87 #define SSH_OPT_FLAG_GSSAPI_AUTH 0x8
88 
89 /* members that are common to ssh_session and ssh_bind */
90 struct ssh_common_struct {
91  struct error_struct error;
92  ssh_callbacks callbacks; /* Callbacks to user functions */
93  int log_verbosity; /* verbosity of the log functions */
94 };
95 
96 struct ssh_session_struct {
97  struct ssh_common_struct common;
98  struct ssh_socket_struct *socket;
99  char *serverbanner;
100  char *clientbanner;
101  int protoversion;
102  int server;
103  int client;
104  int openssh;
105  uint32_t send_seq;
106  uint32_t recv_seq;
107 
108  int connected;
109  /* !=0 when the user got a session handle */
110  int alive;
111  /* two previous are deprecated */
112  /* int auth_service_asked; */
113 
114  /* session flags (SSH_SESSION_FLAG_*) */
115  int flags;
116 
117  ssh_string banner; /* that's the issue banner from
118  the server */
119  char *discon_msg; /* disconnect message from
120  the remote host */
121  ssh_buffer in_buffer;
122  PACKET in_packet;
123  ssh_buffer out_buffer;
124 
125  /* the states are used by the nonblocking stuff to remember */
126  /* where it was before being interrupted */
127  enum ssh_pending_call_e pending_call_state;
128  enum ssh_session_state_e session_state;
129  int packet_state;
130  enum ssh_dh_state_e dh_handshake_state;
131  enum ssh_auth_service_state_e auth_service_state;
132  enum ssh_auth_state_e auth_state;
133  enum ssh_channel_request_state_e global_req_state;
134  struct ssh_agent_state_struct *agent_state;
135  struct ssh_auth_auto_state_struct *auth_auto_state;
136 
137  /*
138  * RFC 4253, 7.1: if the first_kex_packet_follows flag was set in
139  * the received SSH_MSG_KEXINIT, but the guess was wrong, this
140  * field will be set such that the following guessed packet will
141  * be ignored. Once that packet has been received and ignored,
142  * this field is cleared.
143  */
144  int first_kex_follows_guess_wrong;
145 
146  ssh_buffer in_hashbuf;
147  ssh_buffer out_hashbuf;
148  struct ssh_crypto_struct *current_crypto;
149  struct ssh_crypto_struct *next_crypto; /* next_crypto is going to be used after a SSH2_MSG_NEWKEYS */
150 
151  struct ssh_list *channels; /* linked list of channels */
152  int maxchannel;
153  int exec_channel_opened; /* version 1 only. more
154  info in channels1.c */
155  ssh_agent agent; /* ssh agent */
156 
157 /* keyb interactive data */
158  struct ssh_kbdint_struct *kbdint;
159  struct ssh_gssapi_struct *gssapi;
160 
161  /* server host keys */
162  struct {
163  ssh_key rsa_key;
164  ssh_key dsa_key;
165  ssh_key ecdsa_key;
166  ssh_key ed25519_key;
167  /* The type of host key wanted by client */
168  enum ssh_keytypes_e hostkey;
169  } srv;
170  /* auths accepted by server */
171  int auth_methods;
172  struct ssh_list *ssh_message_list; /* list of delayed SSH messages */
173  int (*ssh_message_callback)( struct ssh_session_struct *session, ssh_message msg, void *userdata);
174  void *ssh_message_callback_data;
175  ssh_server_callbacks server_callbacks;
176  void (*ssh_connection_callback)( struct ssh_session_struct *session);
177  struct ssh_packet_callbacks_struct default_packet_callbacks;
178  struct ssh_list *packet_callbacks;
179  struct ssh_socket_callbacks_struct socket_callbacks;
180  ssh_poll_ctx default_poll_ctx;
181  /* options */
182 #ifdef WITH_PCAP
183  ssh_pcap_context pcap_ctx; /* pcap debugging context */
184 #endif
185  struct {
186  struct ssh_list *identity;
187  char *username;
188  char *host;
189  char *bindaddr; /* bind the client to an ip addr */
190  char *sshdir;
191  char *knownhosts;
192  char *global_knownhosts;
193  char *wanted_methods[10];
194  char *ProxyCommand;
195  char *custombanner;
196  unsigned long timeout; /* seconds */
197  unsigned long timeout_usec;
198  unsigned int port;
199  socket_t fd;
200  int StrictHostKeyChecking;
201  char compressionlevel;
202  char *gss_server_identity;
203  char *gss_client_identity;
204  int gss_delegate_creds;
205  int flags;
206  int nodelay;
207  } opts;
208  /* counters */
209  ssh_counter socket_counter;
210  ssh_counter raw_counter;
211 };
212 
218 typedef int (*ssh_termination_function)(void *user);
219 int ssh_handle_packets(ssh_session session, int timeout);
220 int ssh_handle_packets_termination(ssh_session session, int timeout,
221  ssh_termination_function fct, void *user);
222 void ssh_socket_exception_callback(int code, int errno_code, void *user);
223 
224 #endif /* SESSION_H_ */
These are the callbacks exported by the socket structure They are called by the socket module when a ...
Definition: callbacks.h:378