Develop and Download Open Source Software

Browse Subversion Repository

Annotation of /branches/ssh_chacha20poly1305/ttssh2/ttxssh/ttxssh.h

Parent Directory Parent Directory | Revision Log Revision Log


Revision 5928 - (hide annotations) (download) (as text)
Tue Aug 4 10:00:19 2015 UTC (8 years, 8 months ago) by doda
Original Path: trunk/ttssh2/ttxssh/ttxssh.h
File MIME type: text/x-chdr
File size: 9722 byte(s)
相手サーバが Cisco だった場合は DH-GEX で要求するグループサイズを 4096 以下に制限する。
[Ttssh2-devel 2644]
http://logmett.com/forum/viewtopic.php?f=8&t=2758
https://bugzilla.mindrot.org/show_bug.cgi?id=2209

サーバ判別部分は手抜き。他にもサーバ別の workaround が必要になった時に考える。

1 maya 3227 /*
2     Copyright (c) 1998-2001, Robert O'Callahan
3     All rights reserved.
4    
5     Redistribution and use in source and binary forms, with or without modification,
6     are permitted provided that the following conditions are met:
7    
8     Redistributions of source code must retain the above copyright notice, this list of
9     conditions and the following disclaimer.
10    
11     Redistributions in binary form must reproduce the above copyright notice, this list
12     of conditions and the following disclaimer in the documentation and/or other materials
13     provided with the distribution.
14    
15     The name of Robert O'Callahan may not be used to endorse or promote products derived from
16     this software without specific prior written permission.
17    
18     THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND
19     ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20     OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
21     THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22     EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23     SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24     HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25     OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
26     SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27     */
28    
29     /*
30     This code is copyright (C) 1998-1999 Robert O'Callahan.
31     See LICENSE.TXT for the license.
32     */
33    
34     #ifndef __TTXSSH_H
35     #define __TTXSSH_H
36    
37     #pragma warning(3 : 4035)
38    
39     #ifndef NO_INET6
40     #include <winsock2.h>
41     #include <ws2tcpip.h>
42     /* actual body of in6addr_any and in6addr_loopback is disappeared?? */
43     #undef IN6_IS_ADDR_LOOPBACK
44     #define IN6_IS_ADDR_LOOPBACK(a) \
45     ((*(unsigned int *)(&(a)->s6_addr[0]) == 0) && \
46     (*(unsigned int *)(&(a)->s6_addr[4]) == 0) && \
47     (*(unsigned int *)(&(a)->s6_addr[8]) == 0) && \
48     (*(unsigned int *)(&(a)->s6_addr[12]) == ntohl(1)))
49     /* work around for MS Platform SDK Oct 2000 */
50     #include <malloc.h> /* prevent of conflict stdlib.h */
51     #endif /* NO_INET6 */
52     #include <stdlib.h>
53     #include <crtdbg.h>
54    
55     #include "i18n.h"
56 maya 3295 #include "ttlib.h"
57 maya 3227
58     typedef struct _TInstVar FAR * PTInstVar;
59    
60     #include "util.h"
61     #include "pkt.h"
62     #include "ssh.h"
63     #include "auth.h"
64     #include "crypt.h"
65     #include "hosts.h"
66     #include "fwd.h"
67    
68     #include <openssl/dh.h>
69 maya 4314 #include <openssl/ec.h>
70 maya 3227 #include <openssl/evp.h>
71     #include "buffer.h"
72    
73     /* tttypes.h �����`���������� EM �}�N���� openssl/rsa.h (OpenSSL 0.9.8)�������v���g�^�C�v������
74     * �������������d�����������������A�r���h�G���[�������B���L3�w�b�_��include���u�����L�����������B
75     * (2005.7.9 yutaka)
76     */
77     #include "teraterm.h"
78     #include "tttypes.h"
79     #include "ttplugin.h"
80    
81     HANDLE hInst; /* Instance handle of TTXSSH.DLL */
82    
83     #define ID_SSHSCPMENU 52110
84     #define ID_SSHSETUPMENU 52310
85     #define ID_SSHAUTHSETUPMENU 52320
86     #define ID_SSHFWDSETUPMENU 52330
87     #define ID_SSHKEYGENMENU 52340
88     #define ID_ABOUTMENU 52910
89    
90     #define ID_SSHAUTH 62501
91     #define ID_SSHUNKNOWNHOST 62502
92 maya 4330 #define ID_SSHDIFFERENTKEY 62503
93 maya 3227 #define ID_SSHASYNCMESSAGEBOX 62504
94    
95     #define OPTION_NONE 0
96     #define OPTION_CLEAR 1
97     #define OPTION_REPLACE 2
98    
99     /*
100 yutakapon 5620 * DisablePopupMessage �p���r�b�g���`
101     */
102     #define POPUP_MSG_default 0
103     #define POPUP_MSG_FWD_received_data (1 << 0)
104    
105 yutakapon 5849
106 yutakapon 5620 /*
107 yutakapon 5849 * Host key rotation
108     */
109 doda 5887 #define SSH_UPDATE_HOSTKEYS_NO 0
110     #define SSH_UPDATE_HOSTKEYS_YES 1
111     #define SSH_UPDATE_HOSTKEYS_ASK 2
112 yutakapon 5901 #define SSH_UPDATE_HOSTKEYS_MAX 3
113 yutakapon 5849
114 doda 5928 /*
115     * Server compatibility flag
116     */
117     #define SSH_BUG_DHGEX_LARGE 0x00000001
118 yutakapon 5849
119 doda 5928
120 yutakapon 5849 /*
121 maya 3227 These are the fields that WOULD go in Tera Term's 'ts' structure, if
122     we could put them there.
123     */
124     typedef struct _TS_SSH {
125     BOOL Enabled;
126     int CompressionLevel; /* 0 = NONE, else 1-9 */
127     char DefaultUserName[256];
128    
129     /* this next option is a string of digits. Each digit represents a
130     cipher. The first digit is the most preferred cipher, and so on.
131     The digit SSH_CIPHER_NONE signifies that any ciphers after it are
132     disabled. */
133     char CipherOrder[SSH_CIPHER_MAX+1];
134    
135     char KnownHostsFiles[2048];
136     int DefaultAuthMethod;
137     char DefaultRhostsLocalUserName[256];
138     char DefaultRhostsHostPrivateKeyFile[1024];
139     char DefaultRSAPrivateKeyFile[1024];
140    
141     char DefaultForwarding[2048];
142     BOOL TryDefaultAuth;
143    
144     int LogLevel; /* 0 = NONE, 100 = Verbose */
145     int WriteBufferSize;
146    
147     int ssh_protocol_version; // SSH version (2004.10.11 yutaka)
148     int ssh_heartbeat_overtime; // SSH heartbeat(keepalive) (2004.12.11 yutaka)
149     // whether password will permanently store on heap memory (2006.8.5 yutaka)
150     int remember_password;
151    
152     // try auth with "none" method for disable unsupported on dialog (2007.9.24 maya)
153     BOOL CheckAuthListFirst;
154    
155     // Enable connection to the server that has RSA key length less than 768 bit (2008.9.11 maya)
156     BOOL EnableRsaShortKeyServer;
157    
158     // Enable Agent forwarding
159     BOOL ForwardAgent;
160 maya 4229
161     // Confirm Agent forwarding
162     BOOL ForwardAgentConfirm;
163 yutakapon 4367
164     // KEX order(derived from teraterm.ini)
165     char KexOrder[KEX_DH_MAX+1];
166     char HostKeyOrder[KEY_MAX+1];
167     char MacOrder[HMAC_MAX+1];
168     char CompOrder[COMP_MAX+1];
169 doda 4531
170     BOOL VerifyHostKeyDNS;
171 doda 5261
172     int IconID;
173 yutakapon 5620
174     int DisablePopupMessage;
175 doda 5793
176     char X11Display[128];
177 yutakapon 5839
178 yutakapon 5901 int UpdateHostkeys;
179 doda 5900
180     int GexMinimalGroupSize;
181 maya 3227 } TS_SSH;
182    
183     typedef struct _TInstVar {
184     PTTSet ts;
185     PComVar cv;
186    
187     /* shared memory for settings across instances. Basically it's
188     a cache for the INI file.*/
189     TS_SSH FAR * ts_SSH;
190    
191     int fatal_error;
192     int showing_err;
193     char FAR * err_msg;
194    
195     Tconnect Pconnect;
196     Trecv Precv;
197     Tsend Psend;
198     TWSAAsyncSelect PWSAAsyncSelect;
199     TWSAGetLastError PWSAGetLastError;
200    
201     PReadIniFile ReadIniFile;
202     PWriteIniFile WriteIniFile;
203     PParseParam ParseParam;
204    
205 doda 4463 HMENU FileMenu;
206    
207 maya 3227 SOCKET socket;
208     HWND NotificationWindow;
209     unsigned int notification_msg;
210     long notification_events;
211     HICON OldSmallIcon;
212     HICON OldLargeIcon;
213    
214     BOOL hostdlg_activated;
215     BOOL hostdlg_Enabled;
216    
217     int protocol_major;
218     int protocol_minor;
219    
220     PKTState pkt_state;
221     SSHState ssh_state;
222     AUTHState auth_state;
223     CRYPTState crypt_state;
224     HOSTSState hosts_state;
225     FWDState fwd_state;
226    
227     /* The settings applied to the current session. The user may change
228     the settings but usually we don't want that to affect the session
229     in progress (race conditions). So user setup changes usually
230     modify the 'settings' field below. */
231     TS_SSH session_settings;
232    
233     /* our copy of the global settings. This is synced up with the shared
234     memory only when we do a ReadIniFile or WriteIniFile
235     (i.e. the user loads or saves setup) */
236     TS_SSH settings;
237    
238     // SSH2
239     DH *kexdh;
240     char server_version_string[128];
241     char client_version_string[128];
242     buffer_t *my_kex;
243     buffer_t *peer_kex;
244 maya 4378 kex_algorithm kex_type; // KEX algorithm
245     ssh_keytype hostkey_type;
246 maya 3227 SSHCipher ctos_cipher;
247     SSHCipher stoc_cipher;
248 maya 4378 hmac_type ctos_hmac;
249     hmac_type stoc_hmac;
250     compression_type ctos_compression;
251     compression_type stoc_compression;
252 maya 3227 int we_need;
253     int key_done;
254     int rekeying;
255     char *session_id;
256     int session_id_len;
257     Newkeys ssh2_keys[MODE_MAX];
258     EVP_CIPHER_CTX evpcip[MODE_MAX];
259     int userauth_success;
260     int shell_id;
261     /*int remote_id;*/
262     int session_nego_status;
263     /*
264     unsigned int local_window;
265     unsigned int local_window_max;
266     unsigned int local_consumed;
267     unsigned int local_maxpacket;
268     unsigned int remote_window;
269     unsigned int remote_maxpacket;
270     */
271     int client_key_bits;
272     int server_key_bits;
273     int kexgex_min;
274     int kexgex_bits;
275     int kexgex_max;
276     int ssh2_autologin;
277     int ask4passwd;
278     SSHAuthMethod ssh2_authmethod;
279     char ssh2_username[MAX_PATH];
280     char ssh2_password[MAX_PATH];
281     char ssh2_keyfile[MAX_PATH];
282     time_t ssh_heartbeat_tick;
283     HANDLE ssh_heartbeat_thread;
284     int keyboard_interactive_password_input;
285     int userauth_retry_count;
286     buffer_t *decomp_buffer;
287     char *ssh2_authlist;
288     BOOL tryed_ssh2_authlist;
289     HWND ssh_hearbeat_dialog;
290    
291     /* Pageant �������M�p */
292     unsigned char *pageant_key;
293     unsigned char *pageant_curkey;
294     int pageant_keylistlen;
295     int pageant_keycount;
296     int pageant_keycurrent;
297     BOOL pageant_keyfinal;// SSH2 PK_OK ������������ TRUE ������
298    
299     // agent forward
300     BOOL agentfwd_enable;
301 doda 3579
302     BOOL origDisableTCPEchoCR;
303 yutakapon 3631
304     BOOL nocheck_known_hosts;
305 maya 4314
306     EC_KEY *ecdh_client_key;
307 doda 4559
308     int dns_key_check;
309 doda 5928
310     unsigned int server_compat_flag;
311 maya 3227 } TInstVar;
312    
313     #define LOG_LEVEL_FATAL 5
314     #define LOG_LEVEL_ERROR 10
315     #define LOG_LEVEL_URGENT 20
316     #define LOG_LEVEL_WARNING 30
317 doda 5927 #define LOG_LEVEL_NOTIFY 50
318     #define LOG_LEVEL_INFO 80
319 maya 3227 #define LOG_LEVEL_VERBOSE 100
320     #define LOG_LEVEL_SSHDUMP 200
321    
322     #define SSHv1(pvar) ((pvar)->protocol_major == 1)
323     #define SSHv2(pvar) ((pvar)->protocol_major == 2)
324    
325     void notify_established_secure_connection(PTInstVar pvar);
326 maya 5678 void notify_closed_connection(PTInstVar pvar, char FAR * send_msg);
327 maya 3227 void notify_nonfatal_error(PTInstVar pvar, char FAR * msg);
328 maya 5678 void notify_fatal_error(PTInstVar pvar, char FAR * msg, BOOL send_disconnect);
329 maya 3227 void notify_verbose_message(PTInstVar pvar, char FAR * msg, int level);
330    
331     void get_teraterm_dir_relative_name(char FAR * buf, int bufsize, char FAR * basename);
332     int copy_teraterm_dir_relative_path(char FAR * dest, int destsize, char FAR * basename);
333     void get_file_version(char *exefile, int *major, int *minor, int *release, int *build);
334     int uuencode(unsigned char *src, int srclen, unsigned char *target, int targsize);
335 yutakapon 5545 void arc4random_buf(void *_buf, size_t n);
336 maya 3227
337     #endif

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26