Develop and Download Open Source Software

Browse Subversion Repository

Contents of /branches/ssh_chacha20poly1305/ttssh2/ttxssh/ttxssh.h

Parent Directory Parent Directory | Revision Log Revision Log


Revision 5545 - (show annotations) (download) (as text)
Mon Mar 17 16:06:58 2014 UTC (10 years ago) by yutakapon
Original Path: trunk/ttssh2/ttxssh/ttxssh.h
File MIME type: text/x-chdr
File size: 9083 byte(s)
チケット #33263
Curve25519楕円曲線DH(Diffe Hellman)アルゴリズムを使った鍵交換をサポートした。

svn+ssh://svn.sourceforge.jp/svnroot/ttssh2/branches/ssh_ed25519
ブランチからマージ。

現時点でサポートしている機能は下記の通り。

 ・Key Generatorで ED25519 鍵の作成
 ・Key Generatorで RSA/DSA/ECDSA 秘密鍵ファイルに bcrypt KDF を選択可能。
 ・ED25519 による公開鍵認証ログイン
 ・RSA(bcrypt KDF) による公開鍵認証ログイン
 ・DSA(bcrypt KDF) による公開鍵認証ログイン
 ・ECDSA(bcrypt KDF) による公開鍵認証ログイン
 ・Host Keyに ssh-ed25519 のサポート

1 /*
2 Copyright (c) 1998-2001, Robert O'Callahan
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without modification,
6 are permitted provided that the following conditions are met:
7
8 Redistributions of source code must retain the above copyright notice, this list of
9 conditions and the following disclaimer.
10
11 Redistributions in binary form must reproduce the above copyright notice, this list
12 of conditions and the following disclaimer in the documentation and/or other materials
13 provided with the distribution.
14
15 The name of Robert O'Callahan may not be used to endorse or promote products derived from
16 this software without specific prior written permission.
17
18 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND
19 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
21 THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
26 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 /*
30 This code is copyright (C) 1998-1999 Robert O'Callahan.
31 See LICENSE.TXT for the license.
32 */
33
34 #ifndef __TTXSSH_H
35 #define __TTXSSH_H
36
37 #pragma warning(3 : 4035)
38
39 #ifndef NO_INET6
40 #include <winsock2.h>
41 #include <ws2tcpip.h>
42 /* actual body of in6addr_any and in6addr_loopback is disappeared?? */
43 #undef IN6_IS_ADDR_LOOPBACK
44 #define IN6_IS_ADDR_LOOPBACK(a) \
45 ((*(unsigned int *)(&(a)->s6_addr[0]) == 0) && \
46 (*(unsigned int *)(&(a)->s6_addr[4]) == 0) && \
47 (*(unsigned int *)(&(a)->s6_addr[8]) == 0) && \
48 (*(unsigned int *)(&(a)->s6_addr[12]) == ntohl(1)))
49 /* work around for MS Platform SDK Oct 2000 */
50 #include <malloc.h> /* prevent of conflict stdlib.h */
51 #endif /* NO_INET6 */
52 #include <stdlib.h>
53 #include <crtdbg.h>
54
55 #include "i18n.h"
56 #include "ttlib.h"
57
58 typedef struct _TInstVar FAR * PTInstVar;
59
60 #include "util.h"
61 #include "pkt.h"
62 #include "ssh.h"
63 #include "auth.h"
64 #include "crypt.h"
65 #include "hosts.h"
66 #include "fwd.h"
67
68 #include <openssl/dh.h>
69 #include <openssl/ec.h>
70 #include <openssl/evp.h>
71 #include "buffer.h"
72
73 /* tttypes.h �����`���������� EM �}�N���� openssl/rsa.h (OpenSSL 0.9.8)�������v���g�^�C�v������
74 * �������������d�����������������A�r���h�G���[�������B���L3�w�b�_��include���u�����L�����������B
75 * (2005.7.9 yutaka)
76 */
77 #include "teraterm.h"
78 #include "tttypes.h"
79 #include "ttplugin.h"
80
81 HANDLE hInst; /* Instance handle of TTXSSH.DLL */
82
83 #define ID_SSHSCPMENU 52110
84 #define ID_SSHSETUPMENU 52310
85 #define ID_SSHAUTHSETUPMENU 52320
86 #define ID_SSHFWDSETUPMENU 52330
87 #define ID_SSHKEYGENMENU 52340
88 #define ID_ABOUTMENU 52910
89
90 #define ID_SSHAUTH 62501
91 #define ID_SSHUNKNOWNHOST 62502
92 #define ID_SSHDIFFERENTKEY 62503
93 #define ID_SSHASYNCMESSAGEBOX 62504
94
95 #define OPTION_NONE 0
96 #define OPTION_CLEAR 1
97 #define OPTION_REPLACE 2
98
99 /*
100 These are the fields that WOULD go in Tera Term's 'ts' structure, if
101 we could put them there.
102 */
103 typedef struct _TS_SSH {
104 BOOL Enabled;
105 int CompressionLevel; /* 0 = NONE, else 1-9 */
106 char DefaultUserName[256];
107
108 /* this next option is a string of digits. Each digit represents a
109 cipher. The first digit is the most preferred cipher, and so on.
110 The digit SSH_CIPHER_NONE signifies that any ciphers after it are
111 disabled. */
112 char CipherOrder[SSH_CIPHER_MAX+1];
113
114 char KnownHostsFiles[2048];
115 int DefaultAuthMethod;
116 char DefaultRhostsLocalUserName[256];
117 char DefaultRhostsHostPrivateKeyFile[1024];
118 char DefaultRSAPrivateKeyFile[1024];
119
120 char DefaultForwarding[2048];
121 BOOL TryDefaultAuth;
122
123 int LogLevel; /* 0 = NONE, 100 = Verbose */
124 int WriteBufferSize;
125
126 int ssh_protocol_version; // SSH version (2004.10.11 yutaka)
127 int ssh_heartbeat_overtime; // SSH heartbeat(keepalive) (2004.12.11 yutaka)
128 // whether password will permanently store on heap memory (2006.8.5 yutaka)
129 int remember_password;
130
131 // try auth with "none" method for disable unsupported on dialog (2007.9.24 maya)
132 BOOL CheckAuthListFirst;
133
134 // Enable connection to the server that has RSA key length less than 768 bit (2008.9.11 maya)
135 BOOL EnableRsaShortKeyServer;
136
137 // Enable Agent forwarding
138 BOOL ForwardAgent;
139
140 // Confirm Agent forwarding
141 BOOL ForwardAgentConfirm;
142
143 // KEX order(derived from teraterm.ini)
144 char KexOrder[KEX_DH_MAX+1];
145 char HostKeyOrder[KEY_MAX+1];
146 char MacOrder[HMAC_MAX+1];
147 char CompOrder[COMP_MAX+1];
148
149 BOOL VerifyHostKeyDNS;
150
151 int IconID;
152 } TS_SSH;
153
154 typedef struct _TInstVar {
155 PTTSet ts;
156 PComVar cv;
157
158 /* shared memory for settings across instances. Basically it's
159 a cache for the INI file.*/
160 TS_SSH FAR * ts_SSH;
161
162 int fatal_error;
163 int showing_err;
164 char FAR * err_msg;
165
166 Tconnect Pconnect;
167 Trecv Precv;
168 Tsend Psend;
169 TWSAAsyncSelect PWSAAsyncSelect;
170 TWSAGetLastError PWSAGetLastError;
171
172 PReadIniFile ReadIniFile;
173 PWriteIniFile WriteIniFile;
174 PParseParam ParseParam;
175
176 HMENU FileMenu;
177
178 SOCKET socket;
179 HWND NotificationWindow;
180 unsigned int notification_msg;
181 long notification_events;
182 HICON OldSmallIcon;
183 HICON OldLargeIcon;
184
185 BOOL hostdlg_activated;
186 BOOL hostdlg_Enabled;
187
188 int protocol_major;
189 int protocol_minor;
190
191 PKTState pkt_state;
192 SSHState ssh_state;
193 AUTHState auth_state;
194 CRYPTState crypt_state;
195 HOSTSState hosts_state;
196 FWDState fwd_state;
197
198 /* The settings applied to the current session. The user may change
199 the settings but usually we don't want that to affect the session
200 in progress (race conditions). So user setup changes usually
201 modify the 'settings' field below. */
202 TS_SSH session_settings;
203
204 /* our copy of the global settings. This is synced up with the shared
205 memory only when we do a ReadIniFile or WriteIniFile
206 (i.e. the user loads or saves setup) */
207 TS_SSH settings;
208
209 // SSH2
210 DH *kexdh;
211 char server_version_string[128];
212 char client_version_string[128];
213 buffer_t *my_kex;
214 buffer_t *peer_kex;
215 kex_algorithm kex_type; // KEX algorithm
216 ssh_keytype hostkey_type;
217 SSHCipher ctos_cipher;
218 SSHCipher stoc_cipher;
219 hmac_type ctos_hmac;
220 hmac_type stoc_hmac;
221 compression_type ctos_compression;
222 compression_type stoc_compression;
223 int we_need;
224 int key_done;
225 int rekeying;
226 char *session_id;
227 int session_id_len;
228 Newkeys ssh2_keys[MODE_MAX];
229 EVP_CIPHER_CTX evpcip[MODE_MAX];
230 int userauth_success;
231 int shell_id;
232 /*int remote_id;*/
233 int session_nego_status;
234 /*
235 unsigned int local_window;
236 unsigned int local_window_max;
237 unsigned int local_consumed;
238 unsigned int local_maxpacket;
239 unsigned int remote_window;
240 unsigned int remote_maxpacket;
241 */
242 int client_key_bits;
243 int server_key_bits;
244 int kexgex_min;
245 int kexgex_bits;
246 int kexgex_max;
247 int ssh2_autologin;
248 int ask4passwd;
249 SSHAuthMethod ssh2_authmethod;
250 char ssh2_username[MAX_PATH];
251 char ssh2_password[MAX_PATH];
252 char ssh2_keyfile[MAX_PATH];
253 time_t ssh_heartbeat_tick;
254 HANDLE ssh_heartbeat_thread;
255 int keyboard_interactive_password_input;
256 int userauth_retry_count;
257 buffer_t *decomp_buffer;
258 char *ssh2_authlist;
259 BOOL tryed_ssh2_authlist;
260 HWND ssh_hearbeat_dialog;
261
262 /* Pageant �������M�p */
263 unsigned char *pageant_key;
264 unsigned char *pageant_curkey;
265 int pageant_keylistlen;
266 int pageant_keycount;
267 int pageant_keycurrent;
268 BOOL pageant_keyfinal;// SSH2 PK_OK ������������ TRUE ������
269
270 // agent forward
271 BOOL agentfwd_enable;
272
273 BOOL origDisableTCPEchoCR;
274
275 BOOL nocheck_known_hosts;
276
277 EC_KEY *ecdh_client_key;
278
279 int dns_key_check;
280 } TInstVar;
281
282 #define LOG_LEVEL_FATAL 5
283 #define LOG_LEVEL_ERROR 10
284 #define LOG_LEVEL_URGENT 20
285 #define LOG_LEVEL_WARNING 30
286 #define LOG_LEVEL_VERBOSE 100
287 #define LOG_LEVEL_SSHDUMP 200
288
289 #define SSHv1(pvar) ((pvar)->protocol_major == 1)
290 #define SSHv2(pvar) ((pvar)->protocol_major == 2)
291
292 void notify_established_secure_connection(PTInstVar pvar);
293 void notify_closed_connection(PTInstVar pvar);
294 void notify_nonfatal_error(PTInstVar pvar, char FAR * msg);
295 void notify_fatal_error(PTInstVar pvar, char FAR * msg);
296 void notify_verbose_message(PTInstVar pvar, char FAR * msg, int level);
297
298 void get_teraterm_dir_relative_name(char FAR * buf, int bufsize, char FAR * basename);
299 int copy_teraterm_dir_relative_path(char FAR * dest, int destsize, char FAR * basename);
300 void get_file_version(char *exefile, int *major, int *minor, int *release, int *build);
301 int uuencode(unsigned char *src, int srclen, unsigned char *target, int targsize);
302 void arc4random_buf(void *_buf, size_t n);
303
304 #endif

Back to OSDN">Back to OSDN
ViewVC Help
Powered by ViewVC 1.1.26