📄 session.h
字号:
/****************************************************************************
* *
* Secure Session Routines Header File *
* Copyright Peter Gutmann 1998-2004 *
* *
****************************************************************************/
#ifndef _SES_DEFINED
#define _SES_DEFINED
#ifndef _STREAM_DEFINED
#if defined( INC_ALL )
#include "stream.h"
#else
#include "io/stream.h"
#endif /* Compiler-specific includes */
#endif /* _STREAM_DEFINED */
/****************************************************************************
* *
* Session Types and Constants *
* *
****************************************************************************/
/* Session information flags. These are:
SESSION_ISOPEN: The session is active.
SESSION_PARTIALOPEN: The session is partially active pending
confirmation of credentials such as a username and password
or certificate. This means that the session remains in the
handshake state, with the handshake being completed once the
credentials have been confirmed.
SESSION_SENDCLOSED: The remote system has closed its receive channel,
which means that no more data can be sent to it. This does not
however mean that no more data can be received on our receive
channel.
SESSION_ISCLOSINGDOWN: The session is in the shutdown stage, if further
requests from the remote system arrive they should be NACK'd or
ignored.
SESSION_NOREPORTERROR: Don't update the extended error information if
an error occurs, since this has already been set. This is
typically used when performing shutdown actions in response to
a protocol error, when a network error such as the other side
closing the connection would overwrite the details of the
error that caused the shutdown to be performed.
SESSION_ISSERVER: The session is a server session.
SESSION_ISSECURE_READ: The read/write channel is in the secure state,
SESSION_ISSECURE_WRITE: for secure data transport sessions. In other
words the session has passed the initial handshake stage and all
data is now being encrypted/MACd/whatever.
SESSION_ISCRYPTLIB: The peer is also running cryptlib, which means that
we can apply cryptlib-specific optimistions and security
enhancements.
SESSION_ISHTTPTRANSPORT: The session is using HTTP transport, for
request/response sessions.
SESSION_USEALTTRANSPORT: The protocol usually uses HTTP but also
supports an alternative transport type, which should be used
in place of HTTP.
SESSION_USEHTTPTUNNEL: The protocol is (potentially) tunneled over an
HTTP proxy. In other words if CRYPT_OPTION_NET_HTTP_PROXY is
set, the protocol talks through an HTTP proxy rather than a
direct connection */
#define SESSION_NONE 0x0000 /* No session flags */
#define SESSION_ISOPEN 0x0001 /* Session is active */
#define SESSION_PARTIALOPEN 0x0002 /* Session is partially active */
#define SESSION_SENDCLOSED 0x0004 /* Send channel is closed */
#define SESSION_ISCLOSINGDOWN 0x0008 /* Session is in process of shutdown */
#define SESSION_NOREPORTERROR 0x0010 /* Don't report network-level errors */
#define SESSION_ISSERVER 0x0020 /* Session is server session */
#define SESSION_ISSECURE_READ 0x0040 /* Session read ch.in secure state */
#define SESSION_ISSECURE_WRITE 0x0080 /* Session write ch.in secure state */
#define SESSION_ISCRYPTLIB 0x0100 /* Peer is running cryptlib */
#define SESSION_ISHTTPTRANSPORT 0x0200 /* Session using HTTP transport */
#define SESSION_USEHTTPTUNNEL 0x0400 /* Session uses HTTP tunnel */
#define SESSION_USEALTTRANSPORT 0x0800 /* Use alternative to HTTP xport */
/* Needed-information flags used by protocol-specific handlers to indicate
that the caller must set the given attributes in the session information
before the session can be activated. This allows it to be checked at the
general cryptses.c level rather than at the per-protocol level.
Some session types have private keys optional but if present they must
meet certain requirements, this is indicated by omitting the presence-
check SESSION_NEEDS_PRIVATEKEY but specifying one or more of the
SESSION_NEEDS_PRIVKEYxxx options */
#define SESSION_NEEDS_USERID 0x0001 /* Must have userID */
#define SESSION_NEEDS_PASSWORD 0x0002 /* Must have password */
#define SESSION_NEEDS_PRIVATEKEY 0x0004 /* Must have private key */
#define SESSION_NEEDS_PRIVKEYCRYPT 0x0008 /* Priv.key must have cert */
#define SESSION_NEEDS_PRIVKEYSIGN 0x0010 /* Priv.key must have sig.capabil.*/
#define SESSION_NEEDS_PRIVKEYCERT 0x0020 /* Priv.key must have crypt capabil.*/
#define SESSION_NEEDS_PRIVKEYCACERT 0x0040 /* Priv key must have CA cert */
#define SESSION_NEEDS_KEYORPASSWORD 0x0080 /* PW can be used in place of privK */
#define SESSION_NEEDS_REQUEST 0x0100 /* Must have request obj.*/
#define SESSION_NEEDS_KEYSET 0x0200 /* Must have cert keyset */
#define SESSION_NEEDS_CERTSTORE 0x0400 /* Keyset must be cert store */
/* When reading packets for a secure session protocol, we need to
communicate read state information which is more complex than the usual
length or error code. The following values modify the standard return
value (either a positive or zero byte count or a negative error value)
with additional context-specific information */
typedef enum {
READINFO_NONE, /* No special handling */
READINFO_HEADERPAYLOAD, /* Header read got some payload data */
READINFO_NOOP, /* Packet was no-op, try again */
READINFO_PARTIAL, /* Partial packet, try again */
READINFO_FATAL, /* Treat errors as fatal */
READINFO_LAST /* Last possible read info */
} READSTATE_INFO;
/****************************************************************************
* *
* Session Structures *
* *
****************************************************************************/
/* Protocol-specific information for each session. The alt.protocol info can
be used when a secondary transport protocol is available (e.g. HTTP tunnel
for SSL), if the URI type matches then the alt.protocol type, port, and
protocol flags are used, the mask is used to mask out existing flags and
the new flags value is used to set replacement flags */
typedef struct {
const STREAM_PROTOCOL_TYPE type; /* Protocol type */
BUFFER_FIXED( uriTypeLen ) \
const char *uriType; /* Protocol URI type (e.g. "cmp://") */
const int uriTypeLen; /* Protocol URI type length */
const int port; /* Protocol port */
const int oldFlagsMask; /* Mask for current protocol flags */
const int newFlags; /* Replacement flags */
} ALTPROTOCOL_INFO;
typedef struct {
/* Information required for all sessions: Whether this is a secure
session or request/response protocol, protocol-specific flags, the
default port for the protocol, flags for attributes required before
the session can be activated, the default protocol version and lowest
and highest allowed versions, and the transport-protocol client and
server content-types */
const BOOLEAN isReqResp; /* Whether session is req/resp session */
const int flags; /* Protocol flags */
const int port; /* Default port */
const int clientReqAttrFlags, serverReqAttrFlags; /* Required attributes */
const int version, minVersion, maxVersion;/* Protocol version/subtype */
/* Session type-specific information: The send and receive buffer size,
the alternative transport protocol for request/response sessions if
HTTP isn't being used, the minimum allowed size for the server's
private key */
const int bufSize; /* Send/receive buffer sizes */
const int sendBufStartOfs; /* Payload data start */
const int maxPacketSize; /* Maximum packet (payload data) size */
const ALTPROTOCOL_INFO *altProtocolInfo; /* Alternative xport protocol */
const int requiredPrivateKeySize; /* Min.allowed size for private key */
} PROTOCOL_INFO;
/* A value to initialise the session type-specific buffer size values to
default settings for request/response protocols */
#define BUFFER_SIZE_DEFAULT 0, 0, 0
/* Attribute flags. These are:
FLAG_COMPOSITE: Composite attribute containing sub-attribute data in the
{ value, valueLength } buffer. The attribute cursor can be
moved within the attribute using the internal virtual cursor.
FLAG_CURSORMOVED: The attribute (group) cursor has moved, so the virtual
cursor within the attribute needs to be reset the next time that
it's referenced. This is used with composite attributes, whose
internal structure is opaque to the general session code.
FLAG_ENCODEDVALUE: The attribute value is stored in cryptlib
XXXXX-XXXXX-... style encoding and needs to be converted to
binary form before use.
FLAG_EPHEMERAL: The attribute is only valid for the current session
activation and is cleared between session re-activations.
FLAG_MULTIVALUED: Multiple instances of the attribute are permitted.
This complements ATTR_FLAG_OVERWRITE in that instead of
overwriting the single existing instance, another instance is
created */
#define ATTR_FLAG_NONE 0x00 /* No attribute flag */
#define ATTR_FLAG_ENCODEDVALUE 0x01 /* Value uses XXX-XXX encoding */
#define ATTR_FLAG_MULTIVALUED 0x02 /* Multiple instances permitted */
#define ATTR_FLAG_COMPOSITE 0x04 /* Composite attribute */
#define ATTR_FLAG_CURSORMOVED 0x08 /* Attribute virtual cursor reset */
#define ATTR_FLAG_EPHEMERAL 0x10 /* Only valid for current sess.act.*/
/* The helper function used to access session subtype-specific internal
attributes within an attribute list entry */
struct AL; /* Forward declaration for attribute-list access function */
typedef int ( *ATTRACCESSFUNCTION )( INOUT struct AL *attributeListPtr,
const ATTR_TYPE attrGetType );
/* An attribute list used to store session-related attributes such as
user names, passwords, and public keys. Since some of these can be
composite attributes (with information stored in the { value,
valueLength } buffer), we implement a virtual cursor that points to the
currently-selected sub-attribute within the composite attribute */
typedef struct AL {
/* Identification and other information for this attribute */
CRYPT_ATTRIBUTE_TYPE groupID, attributeID; /* Attribute group and type */
ATTRACCESSFUNCTION accessFunction; /* Internal attribute access fn.*/
int flags; /* Attribute data flags */
/* The data payload for this attribute. If it's numeric data such as
a small integer or context, we store it in the intValue member. If
it's a string or composite attribute data, we store it in the
variable-length buffer */
long intValue; /* Integer value for simple types */
BUFFER_OPT_FIXED( valueLength ) \
void *value; /* Attribute value */
int valueLength; /* Attribute value length */
/* The previous and next list element in the linked list of elements */
struct AL *prev, *next; /* Prev, next item in the list */
/* Variable-length storage for the attribute data */
DECLARE_VARSTRUCT_VARS;
} ATTRIBUTE_LIST;
/* Scoreboard information */
#define SCOREBOARD_UNIQUEID_NONE 0 /* Scoreboard empty value ID */
typedef struct {
/* Scoreboard index and data storage, and the total number of entries in
the scoreboard */
void *index, *data; /* Scoreboard index and data */
int size; /* Scoreboard total size */
/* The last used entry in the scoreboard, and a unique ID for each
scoreboard entry. This is incremented for each index entry added,
so even if an entry is deleted and then another one with the same
index value added, the uniqueID for the two will be different */
int lastEntry; /* Last used entry in scoreboard */
int uniqueID; /* Unique ID for scoreboard entry */
} SCOREBOARD_INFO;
/* Deferred response information. When we get a request, we may be in the
middle of assembling or sending a data packet, so the response has to be
deferred until after the data packet has been completed and sent. The
following structure is used to hold the response data until the send
channel is clear */
#define SSH_MAX_RESPONSESIZE 16 /* 2 * channelNo + 2 * param */
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -