BUG_SSH2_DERIVEKEY is apparently only present in SSH 2.0.11 and
[u/mdw/putty] / portfwd.c
CommitLineData
f26d5c33 1#include <stdio.h>
2#include <stdlib.h>
3
4#include "putty.h"
5#include "ssh.h"
6
7#ifndef FALSE
8#define FALSE 0
9#endif
10#ifndef TRUE
11#define TRUE 1
12#endif
13
14#define GET_32BIT_LSB_FIRST(cp) \
15 (((unsigned long)(unsigned char)(cp)[0]) | \
16 ((unsigned long)(unsigned char)(cp)[1] << 8) | \
17 ((unsigned long)(unsigned char)(cp)[2] << 16) | \
18 ((unsigned long)(unsigned char)(cp)[3] << 24))
19
20#define PUT_32BIT_LSB_FIRST(cp, value) ( \
21 (cp)[0] = (value), \
22 (cp)[1] = (value) >> 8, \
23 (cp)[2] = (value) >> 16, \
24 (cp)[3] = (value) >> 24 )
25
26#define GET_16BIT_LSB_FIRST(cp) \
27 (((unsigned long)(unsigned char)(cp)[0]) | \
28 ((unsigned long)(unsigned char)(cp)[1] << 8))
29
30#define PUT_16BIT_LSB_FIRST(cp, value) ( \
31 (cp)[0] = (value), \
32 (cp)[1] = (value) >> 8 )
33
34#define GET_32BIT_MSB_FIRST(cp) \
35 (((unsigned long)(unsigned char)(cp)[0] << 24) | \
36 ((unsigned long)(unsigned char)(cp)[1] << 16) | \
37 ((unsigned long)(unsigned char)(cp)[2] << 8) | \
38 ((unsigned long)(unsigned char)(cp)[3]))
39
40#define PUT_32BIT_MSB_FIRST(cp, value) ( \
41 (cp)[0] = (value) >> 24, \
42 (cp)[1] = (value) >> 16, \
43 (cp)[2] = (value) >> 8, \
44 (cp)[3] = (value) )
45
46#define GET_16BIT_MSB_FIRST(cp) \
47 (((unsigned long)(unsigned char)(cp)[0] << 8) | \
48 ((unsigned long)(unsigned char)(cp)[1]))
49
50#define PUT_16BIT_MSB_FIRST(cp, value) ( \
51 (cp)[0] = (value) >> 8, \
52 (cp)[1] = (value) )
53
f26d5c33 54struct pfwd_queue {
55 struct pfwd_queue *next;
56 char *buf;
57};
58
59struct PFwdPrivate {
60 struct plug_function_table *fn;
61 /* the above variable absolutely *must* be the first in this structure */
62 void *c; /* (channel) data used by ssh.c */
6b78788a 63 void *backhandle; /* instance of SSH backend itself */
64 /* Note that backhandle need not be filled in if c is non-NULL */
f26d5c33 65 Socket s;
66 char hostname[128];
5471d09a 67 int throttled, throttle_override;
f26d5c33 68 int port;
69 int ready;
70 struct pfwd_queue *waiting;
71};
72
73void pfd_close(Socket s);
74
75
76static int pfd_closing(Plug plug, char *error_msg, int error_code,
77 int calling_back)
78{
79 struct PFwdPrivate *pr = (struct PFwdPrivate *) plug;
80
81 /*
82 * We have no way to communicate down the forwarded connection,
83 * so if an error occurred on the socket, we just ignore it
84 * and treat it like a proper close.
85 */
86 sshfwd_close(pr->c);
87 pfd_close(pr->s);
88 return 1;
89}
90
91static int pfd_receive(Plug plug, int urgent, char *data, int len)
92{
93 struct PFwdPrivate *pr = (struct PFwdPrivate *) plug;
5471d09a 94 if (pr->ready) {
95 if (sshfwd_write(pr->c, data, len) > 0) {
96 pr->throttled = 1;
97 sk_set_frozen(pr->s, 1);
98 }
99 }
f26d5c33 100 return 1;
101}
102
5471d09a 103static void pfd_sent(Plug plug, int bufsize)
104{
105 struct PFwdPrivate *pr = (struct PFwdPrivate *) plug;
106
107 sshfwd_unthrottle(pr->c, bufsize);
108}
109
f26d5c33 110/*
111 * Called when receiving a PORT OPEN from the server
112 */
113char *pfd_newconnect(Socket *s, char *hostname, int port, void *c)
114{
115 static struct plug_function_table fn_table = {
116 pfd_closing,
117 pfd_receive,
5471d09a 118 pfd_sent,
f26d5c33 119 NULL
120 };
121
122 SockAddr addr;
123 char *err, *dummy_realhost;
124 struct PFwdPrivate *pr;
125
126 /*
127 * Try to find host.
128 */
129 addr = sk_namelookup(hostname, &dummy_realhost);
130 if ((err = sk_addr_error(addr)))
131 return err;
132
133 /*
134 * Open socket.
135 */
136 pr = (struct PFwdPrivate *) smalloc(sizeof(struct PFwdPrivate));
137 pr->fn = &fn_table;
5471d09a 138 pr->throttled = pr->throttle_override = 0;
f26d5c33 139 pr->ready = 1;
140 pr->c = c;
6b78788a 141 pr->backhandle = NULL; /* we shouldn't need this */
f26d5c33 142
8eebd221 143 pr->s = *s = new_connection(addr, dummy_realhost, port, 0, 1, 0, (Plug) pr);
f26d5c33 144 if ((err = sk_socket_error(*s))) {
145 sfree(pr);
146 return err;
147 }
148
149 sk_set_private_ptr(*s, pr);
150 sk_addr_free(addr);
151 return NULL;
152}
153
154/*
155 called when someone connects to the local port
156 */
157
bcce45ed 158static int pfd_accepting(Plug p, void *sock)
f26d5c33 159{
f26d5c33 160 static struct plug_function_table fn_table = {
161 pfd_closing,
162 pfd_receive,
5471d09a 163 pfd_sent,
f26d5c33 164 NULL
165 };
166 struct PFwdPrivate *pr, *org;
f26d5c33 167 Socket s;
168 char *err;
169
f26d5c33 170 org = (struct PFwdPrivate *)p;
171 pr = (struct PFwdPrivate *) smalloc(sizeof(struct PFwdPrivate));
172 pr->fn = &fn_table;
173
174 pr->c = NULL;
6b78788a 175 pr->backhandle = org->backhandle;
f26d5c33 176
177 pr->s = s = sk_register(sock, (Plug) pr);
178 if ((err = sk_socket_error(s))) {
179 sfree(pr);
180 return err != NULL;
181 }
182
6b78788a 183 pr->c = new_sock_channel(org->backhandle, s);
f26d5c33 184
185 strcpy(pr->hostname, org->hostname);
186 pr->port = org->port;
5471d09a 187 pr->throttled = pr->throttle_override = 0;
f26d5c33 188 pr->ready = 0;
189 pr->waiting = NULL;
190
191 sk_set_private_ptr(s, pr);
192
193 if (pr->c == NULL) {
194 sfree(pr);
195 return 1;
196 } else {
197 /* asks to forward to the specified host/port for this */
6b78788a 198 ssh_send_port_open(pr->c, pr->hostname, pr->port, "forwarding");
f26d5c33 199 }
200
201 return 0;
202}
203
204
205/* Add a new forwarding from port -> desthost:destport
bcce45ed 206 sets up a listener on the local machine on port
f26d5c33 207 */
6b78788a 208char *pfd_addforward(char *desthost, int destport, int port, void *backhandle)
f26d5c33 209{
210 static struct plug_function_table fn_table = {
211 pfd_closing,
5471d09a 212 pfd_receive, /* should not happen... */
213 pfd_sent, /* also should not happen */
f26d5c33 214 pfd_accepting
215 };
216
217 char *err;
218 struct PFwdPrivate *pr;
219 Socket s;
220
221 /*
222 * Open socket.
223 */
224 pr = (struct PFwdPrivate *) smalloc(sizeof(struct PFwdPrivate));
225 pr->fn = &fn_table;
226 pr->c = NULL;
227 strcpy(pr->hostname, desthost);
228 pr->port = destport;
5471d09a 229 pr->throttled = pr->throttle_override = 0;
f26d5c33 230 pr->ready = 0;
231 pr->waiting = NULL;
6b78788a 232 pr->backhandle = backhandle;
f26d5c33 233
8eebd221 234 pr->s = s = new_listener(port, (Plug) pr, !cfg.lport_acceptall);
f26d5c33 235 if ((err = sk_socket_error(s))) {
236 sfree(pr);
237 return err;
238 }
239
240 sk_set_private_ptr(s, pr);
241
242 return NULL;
243}
244
245void pfd_close(Socket s)
246{
247 struct PFwdPrivate *pr;
248
249 if (!s)
250 return;
251
252 pr = (struct PFwdPrivate *) sk_get_private_ptr(s);
253
254 sfree(pr);
255
256 sk_close(s);
257}
258
5471d09a 259void pfd_unthrottle(Socket s)
260{
261 struct PFwdPrivate *pr;
262 if (!s)
263 return;
264 pr = (struct PFwdPrivate *) sk_get_private_ptr(s);
265
266 pr->throttled = 0;
267 sk_set_frozen(s, pr->throttled || pr->throttle_override);
268}
269
270void pfd_override_throttle(Socket s, int enable)
271{
272 struct PFwdPrivate *pr;
273 if (!s)
274 return;
275 pr = (struct PFwdPrivate *) sk_get_private_ptr(s);
276
277 pr->throttle_override = enable;
278 sk_set_frozen(s, pr->throttled || pr->throttle_override);
279}
280
f26d5c33 281/*
282 * Called to send data down the raw connection.
283 */
5471d09a 284int pfd_send(Socket s, char *data, int len)
f26d5c33 285{
f26d5c33 286 if (s == NULL)
5471d09a 287 return 0;
288 return sk_write(s, data, len);
f26d5c33 289}
290
291
292void pfd_confirm(Socket s)
293{
5f2e19fc 294 struct PFwdPrivate *pr;
f26d5c33 295
296 if (s == NULL)
297 return;
298
5f2e19fc 299 pr = (struct PFwdPrivate *) sk_get_private_ptr(s);
f26d5c33 300 pr->ready = 1;
301 sk_set_frozen(s, 0);
302 sk_write(s, NULL, 0);
303}