[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] SSH Tunnels
[Thread Prev] | [Thread Next]
- Subject: Re: [PATCH] SSH Tunnels
- From: Loïc Michaux <lmichaux@xxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Fri, 7 Mar 2014 15:51:10 +0100 (CET)
- To: libssh@xxxxxxxxxx
Hi, To address this issue I added two callbacks for direct-tcpip and forwarded-tcpip channel open requests. Patch attached, please tell me if something is missing or to modify. Best regards, Loïc Michaux
From c2eec6a95e7a4f839f04ec99c878f2b127638a2a Mon Sep 17 00:00:00 2001
From: Loïc Michaux <lmichaux@xxxxxxxxxx>
Date: Fri, 7 Mar 2014 15:19:44 +0100
Subject: [PATCH] direct-tcpip and forwarded-tcpip callbacks
---
include/libssh/callbacks.h | 34 ++++++++++++++++++++++++++++++++--
src/messages.c | 32 ++++++++++++++++++++++++++++++++
2 files changed, 64 insertions(+), 2 deletions(-)
diff --git a/include/libssh/callbacks.h b/include/libssh/callbacks.h
index 6bd8c57..a4f603c 100644
--- a/include/libssh/callbacks.h
+++ b/include/libssh/callbacks.h
@@ -124,6 +124,7 @@ typedef void (*ssh_global_request_callback) (ssh_session session,
typedef ssh_channel (*ssh_channel_open_request_x11_callback) (ssh_session session,
const char * originator_address, int originator_port, void *userdata);
+
/**
* The structure to replace libssh functions with appropriate callbacks.
*/
@@ -239,6 +240,21 @@ typedef int (*ssh_service_request_callback) (ssh_session session, const char *se
typedef ssh_channel (*ssh_channel_open_request_session_callback) (ssh_session session, void *userdata);
/*
+ * @brief Handles an SSH new channel open direct TCPIP request
+ */
+typedef ssh_channel (*ssh_channel_open_request_direct_tcpip_callback) (ssh_session session,
+ const char *destination, uint16_t destination_port, const char *originator,
+ uint16_t originator_port, void *userdata);
+
+/*
+ * @brief Handles an SSH new channel open forwarded TCPIP request
+ */
+
+typedef ssh_channel (*ssh_channel_open_request_forwarded_tcpip_callback) (ssh_session session,
+ const char *destination, uint16_t destination_port, const char *originator,
+ uint16_t originator_port, void *userdata);
+
+/*
* @brief handle the beginning of a GSSAPI authentication, server side.
* @param session current session handler
* @param user the username of the client
@@ -313,20 +329,34 @@ struct ssh_server_callbacks_struct {
*/
ssh_auth_pubkey_callback auth_pubkey_function;
- /** This functions gets called when a service request is issued by the
+ /** This function gets called when a service request is issued by the
* client
*/
ssh_service_request_callback service_request_function;
- /** This functions gets called when a new channel request is issued by
+
+ /** This function gets called when a new channel request is issued by
* the client
*/
ssh_channel_open_request_session_callback channel_open_request_session_function;
+
+ /** This function gets called when a new direct tcpip channel request is issued by
+ * the client
+ */
+ ssh_channel_open_request_direct_tcpip_callback channel_open_request_direct_tcpip_function;
+
+ /** This function gets called when a new forwarded tcpip channel request is issued by
+ * the client
+ */
+ ssh_channel_open_request_forwarded_tcpip_callback channel_open_request_forwarded_tcpip_function;
+
/** This function will be called when a new gssapi authentication is attempted.
*/
ssh_gssapi_select_oid_callback gssapi_select_oid_function;
+
/** This function will be called when a gssapi token comes in.
*/
ssh_gssapi_accept_sec_ctx_callback gssapi_accept_sec_ctx_function;
+
/* This function will be called when a MIC needs to be verified.
*/
ssh_gssapi_verify_mic_callback gssapi_verify_mic_function;
diff --git a/src/messages.c b/src/messages.c
index 4246c63..71971de 100644
--- a/src/messages.c
+++ b/src/messages.c
@@ -162,6 +162,38 @@ static int ssh_execute_server_request(ssh_session session, ssh_message msg)
return SSH_OK;
}
+ else if (msg->channel_request_open.type == SSH_CHANNEL_DIRECT_TCPIP &&
+ ssh_callbacks_exists(session->server_callbacks, channel_open_request_direct_tcpip_function)) {
+ channel = session->server_callbacks->channel_open_request_direct_tcpip_function(session,
+ msg->channel_request_open.destination,
+ msg->channel_request_open.destination_port,
+ msg->channel_request_open.originator,
+ msg->channel_request_open.originator_port,
+ session->server_callbacks->userdata);
+ if (channel != NULL) {
+ rc = ssh_message_channel_request_open_reply_accept_channel(msg, channel);
+ return SSH_OK;
+ } else {
+ ssh_message_reply_default(msg);
+ }
+ return SSH_OK;
+ }
+ else if (msg->channel_request_open.type == SSH_CHANNEL_FORWARDED_TCPIP &&
+ ssh_callbacks_exists(session->server_callbacks, channel_open_request_forwarded_tcpip_function)) {
+ channel = session->server_callbacks->channel_open_request_forwarded_tcpip_function(session,
+ msg->channel_request_open.destination,
+ msg->channel_request_open.destination_port,
+ msg->channel_request_open.originator,
+ msg->channel_request_open.originator_port,
+ session->server_callbacks->userdata);
+ if (channel != NULL) {
+ rc = ssh_message_channel_request_open_reply_accept_channel(msg, channel);
+ return SSH_OK;
+ } else {
+ ssh_message_reply_default(msg);
+ }
+ return SSH_OK;
+ }
break;
case SSH_REQUEST_CHANNEL:
channel = msg->channel_request.channel;
--
1.7.10.4
Archive administrator: postmaster@lists.cynapses.org