Develop and Download Open Source Software

Browse Subversion Repository

Annotation of /branches/ssh_chacha20poly1305/ttssh2/ttxssh/ttxssh.h

Parent Directory Parent Directory | Revision Log Revision Log


Revision 4531 - (hide annotations) (download) (as text)
Tue Jul 26 08:50:11 2011 UTC (12 years, 8 months ago) by doda
Original Path: trunk/ttssh2/ttxssh/ttxssh.h
File MIME type: text/x-chdr
File size: 9000 byte(s)
RFC 4255 "Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints" 対応の準備
http://tools.ietf.org/html/rfc4255

VerifyHostKeyDNS = 1 にすると、ホスト鍵の検証を行う。
検証するだけで検証結果は使ってないけれど。

DNSSEC 未対応の問題が有るので、その部分について検討中。
解決する目途が立っていないので、もしかするとお蔵入りするかも。

Windows95/98/Me/NT4 では動かないかも。

1 maya 3227 /*
2     Copyright (c) 1998-2001, Robert O'Callahan
3     All rights reserved.
4    
5     Redistribution and use in source and binary forms, with or without modification,
6     are permitted provided that the following conditions are met:
7    
8     Redistributions of source code must retain the above copyright notice, this list of
9     conditions and the following disclaimer.
10    
11     Redistributions in binary form must reproduce the above copyright notice, this list
12     of conditions and the following disclaimer in the documentation and/or other materials
13     provided with the distribution.
14    
15     The name of Robert O'Callahan may not be used to endorse or promote products derived from
16     this software without specific prior written permission.
17    
18     THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND
19     ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20     OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
21     THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22     EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23     SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24     HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25     OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
26     SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27     */
28    
29     /*
30     This code is copyright (C) 1998-1999 Robert O'Callahan.
31     See LICENSE.TXT for the license.
32     */
33    
34     #ifndef __TTXSSH_H
35     #define __TTXSSH_H
36    
37     #pragma warning(3 : 4035)
38    
39     #ifndef NO_INET6
40     #include <winsock2.h>
41     #include <ws2tcpip.h>
42     /* actual body of in6addr_any and in6addr_loopback is disappeared?? */
43     #undef IN6_IS_ADDR_LOOPBACK
44     #define IN6_IS_ADDR_LOOPBACK(a) \
45     ((*(unsigned int *)(&(a)->s6_addr[0]) == 0) && \
46     (*(unsigned int *)(&(a)->s6_addr[4]) == 0) && \
47     (*(unsigned int *)(&(a)->s6_addr[8]) == 0) && \
48     (*(unsigned int *)(&(a)->s6_addr[12]) == ntohl(1)))
49     /* work around for MS Platform SDK Oct 2000 */
50     #include <malloc.h> /* prevent of conflict stdlib.h */
51     #endif /* NO_INET6 */
52     #include <stdlib.h>
53     #include <crtdbg.h>
54    
55     #include "i18n.h"
56 maya 3295 #include "ttlib.h"
57 maya 3227
58     typedef struct _TInstVar FAR * PTInstVar;
59    
60     #include "util.h"
61     #include "pkt.h"
62     #include "ssh.h"
63     #include "auth.h"
64     #include "crypt.h"
65     #include "hosts.h"
66     #include "fwd.h"
67    
68     #include <openssl/dh.h>
69 maya 4314 #include <openssl/ec.h>
70 maya 3227 #include <openssl/evp.h>
71     #include "buffer.h"
72    
73     /* tttypes.h �����`���������� EM �}�N���� openssl/rsa.h (OpenSSL 0.9.8)�������v���g�^�C�v������
74     * �������������d�����������������A�r���h�G���[�������B���L3�w�b�_��include���u�����L�����������B
75     * (2005.7.9 yutaka)
76     */
77     #include "teraterm.h"
78     #include "tttypes.h"
79     #include "ttplugin.h"
80    
81     HANDLE hInst; /* Instance handle of TTXSSH.DLL */
82    
83     #define ID_SSHSCPMENU 52110
84     #define ID_SSHSETUPMENU 52310
85     #define ID_SSHAUTHSETUPMENU 52320
86     #define ID_SSHFWDSETUPMENU 52330
87     #define ID_SSHKEYGENMENU 52340
88     #define ID_ABOUTMENU 52910
89    
90     #define ID_SSHAUTH 62501
91     #define ID_SSHUNKNOWNHOST 62502
92 maya 4330 #define ID_SSHDIFFERENTKEY 62503
93 maya 3227 #define ID_SSHASYNCMESSAGEBOX 62504
94    
95     #define OPTION_NONE 0
96     #define OPTION_CLEAR 1
97     #define OPTION_REPLACE 2
98    
99     /*
100     These are the fields that WOULD go in Tera Term's 'ts' structure, if
101     we could put them there.
102     */
103     typedef struct _TS_SSH {
104     BOOL Enabled;
105     int CompressionLevel; /* 0 = NONE, else 1-9 */
106     char DefaultUserName[256];
107    
108     /* this next option is a string of digits. Each digit represents a
109     cipher. The first digit is the most preferred cipher, and so on.
110     The digit SSH_CIPHER_NONE signifies that any ciphers after it are
111     disabled. */
112     char CipherOrder[SSH_CIPHER_MAX+1];
113    
114     char KnownHostsFiles[2048];
115     int DefaultAuthMethod;
116     char DefaultRhostsLocalUserName[256];
117     char DefaultRhostsHostPrivateKeyFile[1024];
118     char DefaultRSAPrivateKeyFile[1024];
119    
120     char DefaultForwarding[2048];
121     BOOL TryDefaultAuth;
122    
123     int LogLevel; /* 0 = NONE, 100 = Verbose */
124     int WriteBufferSize;
125    
126     int ssh_protocol_version; // SSH version (2004.10.11 yutaka)
127     int ssh_heartbeat_overtime; // SSH heartbeat(keepalive) (2004.12.11 yutaka)
128     // whether password will permanently store on heap memory (2006.8.5 yutaka)
129     int remember_password;
130    
131     // try auth with "none" method for disable unsupported on dialog (2007.9.24 maya)
132     BOOL CheckAuthListFirst;
133    
134     // Enable connection to the server that has RSA key length less than 768 bit (2008.9.11 maya)
135     BOOL EnableRsaShortKeyServer;
136    
137     // Enable Agent forwarding
138     BOOL ForwardAgent;
139 maya 4229
140     // Confirm Agent forwarding
141     BOOL ForwardAgentConfirm;
142 yutakapon 4367
143     // KEX order(derived from teraterm.ini)
144     char KexOrder[KEX_DH_MAX+1];
145     char HostKeyOrder[KEY_MAX+1];
146     char MacOrder[HMAC_MAX+1];
147     char CompOrder[COMP_MAX+1];
148 doda 4531
149     BOOL VerifyHostKeyDNS;
150 maya 3227 } TS_SSH;
151    
152     typedef struct _TInstVar {
153     PTTSet ts;
154     PComVar cv;
155    
156     /* shared memory for settings across instances. Basically it's
157     a cache for the INI file.*/
158     TS_SSH FAR * ts_SSH;
159    
160     int fatal_error;
161     int showing_err;
162     char FAR * err_msg;
163    
164     Tconnect Pconnect;
165     Trecv Precv;
166     Tsend Psend;
167     TWSAAsyncSelect PWSAAsyncSelect;
168     TWSAGetLastError PWSAGetLastError;
169    
170     PReadIniFile ReadIniFile;
171     PWriteIniFile WriteIniFile;
172     PParseParam ParseParam;
173    
174 doda 4463 HMENU FileMenu;
175    
176 maya 3227 SOCKET socket;
177     HWND NotificationWindow;
178     unsigned int notification_msg;
179     long notification_events;
180     HICON OldSmallIcon;
181     HICON OldLargeIcon;
182    
183     BOOL hostdlg_activated;
184     BOOL hostdlg_Enabled;
185    
186     int protocol_major;
187     int protocol_minor;
188    
189     PKTState pkt_state;
190     SSHState ssh_state;
191     AUTHState auth_state;
192     CRYPTState crypt_state;
193     HOSTSState hosts_state;
194     FWDState fwd_state;
195    
196     /* The settings applied to the current session. The user may change
197     the settings but usually we don't want that to affect the session
198     in progress (race conditions). So user setup changes usually
199     modify the 'settings' field below. */
200     TS_SSH session_settings;
201    
202     /* our copy of the global settings. This is synced up with the shared
203     memory only when we do a ReadIniFile or WriteIniFile
204     (i.e. the user loads or saves setup) */
205     TS_SSH settings;
206    
207     // SSH2
208     DH *kexdh;
209     char server_version_string[128];
210     char client_version_string[128];
211     buffer_t *my_kex;
212     buffer_t *peer_kex;
213 maya 4378 kex_algorithm kex_type; // KEX algorithm
214     ssh_keytype hostkey_type;
215 maya 3227 SSHCipher ctos_cipher;
216     SSHCipher stoc_cipher;
217 maya 4378 hmac_type ctos_hmac;
218     hmac_type stoc_hmac;
219     compression_type ctos_compression;
220     compression_type stoc_compression;
221 maya 3227 int we_need;
222     int key_done;
223     int rekeying;
224     char *session_id;
225     int session_id_len;
226     Newkeys ssh2_keys[MODE_MAX];
227     EVP_CIPHER_CTX evpcip[MODE_MAX];
228     int userauth_success;
229     int shell_id;
230     /*int remote_id;*/
231     int session_nego_status;
232     /*
233     unsigned int local_window;
234     unsigned int local_window_max;
235     unsigned int local_consumed;
236     unsigned int local_maxpacket;
237     unsigned int remote_window;
238     unsigned int remote_maxpacket;
239     */
240     int client_key_bits;
241     int server_key_bits;
242     int kexgex_min;
243     int kexgex_bits;
244     int kexgex_max;
245     int ssh2_autologin;
246     int ask4passwd;
247     SSHAuthMethod ssh2_authmethod;
248     char ssh2_username[MAX_PATH];
249     char ssh2_password[MAX_PATH];
250     char ssh2_keyfile[MAX_PATH];
251     time_t ssh_heartbeat_tick;
252     HANDLE ssh_heartbeat_thread;
253     int keyboard_interactive_password_input;
254     int userauth_retry_count;
255     buffer_t *decomp_buffer;
256     char *ssh2_authlist;
257     BOOL tryed_ssh2_authlist;
258     HWND ssh_hearbeat_dialog;
259    
260     /* Pageant �������M�p */
261     unsigned char *pageant_key;
262     unsigned char *pageant_curkey;
263     int pageant_keylistlen;
264     int pageant_keycount;
265     int pageant_keycurrent;
266     BOOL pageant_keyfinal;// SSH2 PK_OK ������������ TRUE ������
267    
268     // agent forward
269     BOOL agentfwd_enable;
270 doda 3579
271     BOOL origDisableTCPEchoCR;
272 yutakapon 3631
273     BOOL nocheck_known_hosts;
274 maya 4314
275     EC_KEY *ecdh_client_key;
276 maya 3227 } TInstVar;
277    
278     #define LOG_LEVEL_FATAL 5
279     #define LOG_LEVEL_ERROR 10
280     #define LOG_LEVEL_URGENT 20
281     #define LOG_LEVEL_WARNING 30
282     #define LOG_LEVEL_VERBOSE 100
283     #define LOG_LEVEL_SSHDUMP 200
284    
285     #define SSHv1(pvar) ((pvar)->protocol_major == 1)
286     #define SSHv2(pvar) ((pvar)->protocol_major == 2)
287    
288     void notify_established_secure_connection(PTInstVar pvar);
289     void notify_closed_connection(PTInstVar pvar);
290     void notify_nonfatal_error(PTInstVar pvar, char FAR * msg);
291     void notify_fatal_error(PTInstVar pvar, char FAR * msg);
292     void notify_verbose_message(PTInstVar pvar, char FAR * msg, int level);
293    
294     void get_teraterm_dir_relative_name(char FAR * buf, int bufsize, char FAR * basename);
295     int copy_teraterm_dir_relative_path(char FAR * dest, int destsize, char FAR * basename);
296     void get_file_version(char *exefile, int *major, int *minor, int *release, int *build);
297     int uuencode(unsigned char *src, int srclen, unsigned char *target, int targsize);
298    
299     #endif

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26