PageRenderTime 46ms CodeModel.GetById 21ms RepoModel.GetById 0ms app.codeStats 0ms

/src/TortoisePlink/NETWORK.H

https://gitlab.com/mba811/TortoiseGit
C Header | 250 lines | 101 code | 31 blank | 118 comment | 0 complexity | dedf9cea6943974a590030386058bb87 MD5 | raw file
Possible License(s): LGPL-3.0, MPL-2.0-no-copyleft-exception, GPL-3.0
  1. /*
  2. * Networking abstraction in PuTTY.
  3. *
  4. * The way this works is: a back end can choose to open any number
  5. * of sockets - including zero, which might be necessary in some.
  6. * It can register a bunch of callbacks (most notably for when
  7. * data is received) for each socket, and it can call the networking
  8. * abstraction to send data without having to worry about blocking.
  9. * The stuff behind the abstraction takes care of selects and
  10. * nonblocking writes and all that sort of painful gubbins.
  11. */
  12. #ifndef PUTTY_NETWORK_H
  13. #define PUTTY_NETWORK_H
  14. #ifndef DONE_TYPEDEFS
  15. #define DONE_TYPEDEFS
  16. typedef struct conf_tag Conf;
  17. typedef struct backend_tag Backend;
  18. typedef struct terminal_tag Terminal;
  19. #endif
  20. typedef struct SockAddr_tag *SockAddr;
  21. /* pay attention to levels of indirection */
  22. typedef struct socket_function_table **Socket;
  23. typedef struct plug_function_table **Plug;
  24. #ifndef OSSOCKET_DEFINED
  25. typedef void *OSSocket;
  26. #endif
  27. struct socket_function_table {
  28. Plug(*plug) (Socket s, Plug p);
  29. /* use a different plug (return the old one) */
  30. /* if p is NULL, it doesn't change the plug */
  31. /* but it does return the one it's using */
  32. void (*close) (Socket s);
  33. int (*write) (Socket s, const char *data, int len);
  34. int (*write_oob) (Socket s, const char *data, int len);
  35. void (*write_eof) (Socket s);
  36. void (*flush) (Socket s);
  37. void (*set_private_ptr) (Socket s, void *ptr);
  38. void *(*get_private_ptr) (Socket s);
  39. void (*set_frozen) (Socket s, int is_frozen);
  40. /* ignored by tcp, but vital for ssl */
  41. const char *(*socket_error) (Socket s);
  42. };
  43. struct plug_function_table {
  44. void (*log)(Plug p, int type, SockAddr addr, int port,
  45. const char *error_msg, int error_code);
  46. /*
  47. * Passes the client progress reports on the process of setting
  48. * up the connection.
  49. *
  50. * - type==0 means we are about to try to connect to address
  51. * `addr' (error_msg and error_code are ignored)
  52. * - type==1 means we have failed to connect to address `addr'
  53. * (error_msg and error_code are supplied). This is not a
  54. * fatal error - we may well have other candidate addresses
  55. * to fall back to. When it _is_ fatal, the closing()
  56. * function will be called.
  57. */
  58. int (*closing)
  59. (Plug p, const char *error_msg, int error_code, int calling_back);
  60. /* error_msg is NULL iff it is not an error (ie it closed normally) */
  61. /* calling_back != 0 iff there is a Plug function */
  62. /* currently running (would cure the fixme in try_send()) */
  63. int (*receive) (Plug p, int urgent, char *data, int len);
  64. /*
  65. * - urgent==0. `data' points to `len' bytes of perfectly
  66. * ordinary data.
  67. *
  68. * - urgent==1. `data' points to `len' bytes of data,
  69. * which were read from before an Urgent pointer.
  70. *
  71. * - urgent==2. `data' points to `len' bytes of data,
  72. * the first of which was the one at the Urgent mark.
  73. */
  74. void (*sent) (Plug p, int bufsize);
  75. /*
  76. * The `sent' function is called when the pending send backlog
  77. * on a socket is cleared or partially cleared. The new backlog
  78. * size is passed in the `bufsize' parameter.
  79. */
  80. int (*accepting)(Plug p, OSSocket sock);
  81. /*
  82. * returns 0 if the host at address addr is a valid host for connecting or error
  83. */
  84. };
  85. /* proxy indirection layer */
  86. /* NB, control of 'addr' is passed via new_connection, which takes
  87. * responsibility for freeing it */
  88. Socket new_connection(SockAddr addr, char *hostname,
  89. int port, int privport,
  90. int oobinline, int nodelay, int keepalive,
  91. Plug plug, Conf *conf);
  92. Socket new_listener(char *srcaddr, int port, Plug plug, int local_host_only,
  93. Conf *conf, int addressfamily);
  94. SockAddr name_lookup(char *host, int port, char **canonicalname,
  95. Conf *conf, int addressfamily);
  96. /* platform-dependent callback from new_connection() */
  97. /* (same caveat about addr as new_connection()) */
  98. Socket platform_new_connection(SockAddr addr, char *hostname,
  99. int port, int privport,
  100. int oobinline, int nodelay, int keepalive,
  101. Plug plug, Conf *conf);
  102. /* socket functions */
  103. void sk_init(void); /* called once at program startup */
  104. void sk_cleanup(void); /* called just before program exit */
  105. SockAddr sk_namelookup(const char *host, char **canonicalname, int address_family);
  106. SockAddr sk_nonamelookup(const char *host);
  107. void sk_getaddr(SockAddr addr, char *buf, int buflen);
  108. int sk_hostname_is_local(const char *name);
  109. int sk_address_is_local(SockAddr addr);
  110. int sk_address_is_special_local(SockAddr addr);
  111. int sk_addrtype(SockAddr addr);
  112. void sk_addrcopy(SockAddr addr, char *buf);
  113. void sk_addr_free(SockAddr addr);
  114. /* sk_addr_dup generates another SockAddr which contains the same data
  115. * as the original one and can be freed independently. May not actually
  116. * physically _duplicate_ it: incrementing a reference count so that
  117. * one more free is required before it disappears is an acceptable
  118. * implementation. */
  119. SockAddr sk_addr_dup(SockAddr addr);
  120. /* NB, control of 'addr' is passed via sk_new, which takes responsibility
  121. * for freeing it, as for new_connection() */
  122. Socket sk_new(SockAddr addr, int port, int privport, int oobinline,
  123. int nodelay, int keepalive, Plug p);
  124. Socket sk_newlistener(char *srcaddr, int port, Plug plug, int local_host_only, int address_family);
  125. Socket sk_register(OSSocket sock, Plug plug);
  126. #define sk_plug(s,p) (((*s)->plug) (s, p))
  127. #define sk_close(s) (((*s)->close) (s))
  128. #define sk_write(s,buf,len) (((*s)->write) (s, buf, len))
  129. #define sk_write_oob(s,buf,len) (((*s)->write_oob) (s, buf, len))
  130. #define sk_write_eof(s) (((*s)->write_eof) (s))
  131. #define sk_flush(s) (((*s)->flush) (s))
  132. #ifdef DEFINE_PLUG_METHOD_MACROS
  133. #define plug_log(p,type,addr,port,msg,code) (((*p)->log) (p, type, addr, port, msg, code))
  134. #define plug_closing(p,msg,code,callback) (((*p)->closing) (p, msg, code, callback))
  135. #define plug_receive(p,urgent,buf,len) (((*p)->receive) (p, urgent, buf, len))
  136. #define plug_sent(p,bufsize) (((*p)->sent) (p, bufsize))
  137. #define plug_accepting(p, sock) (((*p)->accepting)(p, sock))
  138. #endif
  139. /*
  140. * Each socket abstraction contains a `void *' private field in
  141. * which the client can keep state.
  142. *
  143. * This is perhaps unnecessary now that we have the notion of a plug,
  144. * but there is some existing code that uses it, so it stays.
  145. */
  146. #define sk_set_private_ptr(s, ptr) (((*s)->set_private_ptr) (s, ptr))
  147. #define sk_get_private_ptr(s) (((*s)->get_private_ptr) (s))
  148. /*
  149. * Special error values are returned from sk_namelookup and sk_new
  150. * if there's a problem. These functions extract an error message,
  151. * or return NULL if there's no problem.
  152. */
  153. const char *sk_addr_error(SockAddr addr);
  154. #define sk_socket_error(s) (((*s)->socket_error) (s))
  155. /*
  156. * Set the `frozen' flag on a socket. A frozen socket is one in
  157. * which all READABLE notifications are ignored, so that data is
  158. * not accepted from the peer until the socket is unfrozen. This
  159. * exists for two purposes:
  160. *
  161. * - Port forwarding: when a local listening port receives a
  162. * connection, we do not want to receive data from the new
  163. * socket until we have somewhere to send it. Hence, we freeze
  164. * the socket until its associated SSH channel is ready; then we
  165. * unfreeze it and pending data is delivered.
  166. *
  167. * - Socket buffering: if an SSH channel (or the whole connection)
  168. * backs up or presents a zero window, we must freeze the
  169. * associated local socket in order to avoid unbounded buffer
  170. * growth.
  171. */
  172. #define sk_set_frozen(s, is_frozen) (((*s)->set_frozen) (s, is_frozen))
  173. /*
  174. * Call this after an operation that might have tried to send on a
  175. * socket, to clean up any pending network errors.
  176. */
  177. void net_pending_errors(void);
  178. /*
  179. * Simple wrapper on getservbyname(), needed by ssh.c. Returns the
  180. * port number, in host byte order (suitable for printf and so on).
  181. * Returns 0 on failure. Any platform not supporting getservbyname
  182. * can just return 0 - this function is not required to handle
  183. * numeric port specifications.
  184. */
  185. int net_service_lookup(char *service);
  186. /*
  187. * Look up the local hostname; return value needs freeing.
  188. * May return NULL.
  189. */
  190. char *get_hostname(void);
  191. /********** SSL stuff **********/
  192. /*
  193. * This section is subject to change, but you get the general idea
  194. * of what it will eventually look like.
  195. */
  196. typedef struct certificate *Certificate;
  197. typedef struct our_certificate *Our_Certificate;
  198. /* to be defined somewhere else, somehow */
  199. typedef struct ssl_client_socket_function_table **SSL_Client_Socket;
  200. typedef struct ssl_client_plug_function_table **SSL_Client_Plug;
  201. struct ssl_client_socket_function_table {
  202. struct socket_function_table base;
  203. void (*renegotiate) (SSL_Client_Socket s);
  204. /* renegotiate the cipher spec */
  205. };
  206. struct ssl_client_plug_function_table {
  207. struct plug_function_table base;
  208. int (*refuse_cert) (SSL_Client_Plug p, Certificate cert[]);
  209. /* do we accept this certificate chain? If not, why not? */
  210. /* cert[0] is the server's certificate, cert[] is NULL-terminated */
  211. /* the last certificate may or may not be the root certificate */
  212. Our_Certificate(*client_cert) (SSL_Client_Plug p);
  213. /* the server wants us to identify ourselves */
  214. /* may return NULL if we want anonymity */
  215. };
  216. SSL_Client_Socket sk_ssl_client_over(Socket s, /* pre-existing (tcp) connection */
  217. SSL_Client_Plug p);
  218. #define sk_renegotiate(s) (((*s)->renegotiate) (s))
  219. #endif