1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98
|
/*
* ProFTPD - mod_sftp interoperability
* Copyright (c) 2008-2011 TJ Saunders
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Suite 500, Boston, MA 02110-1335, USA.
*
* As a special exemption, TJ Saunders and other respective copyright holders
* give permission to link this program with OpenSSL, and distribute the
* resulting executable, without including the source code for OpenSSL in the
* source distribution.
*
* $Id: interop.h,v 1.6 2011/05/23 20:40:13 castaglia Exp $
*/
#include "mod_sftp.h"
#ifndef MOD_SFTP_INTEROP_H
#define MOD_SFTP_INTEROP_H
/* For clients which do not support IGNORE packets */
#define SFTP_SSH2_FEAT_IGNORE_MSG 0x0001
/* For clients which always truncate the HMAC len to 16 bits, regardless
* of the actual HMAC len.
*/
#define SFTP_SSH2_FEAT_MAC_LEN 0x0002
/* For clients which do not include K when deriving cipher keys. */
#define SFTP_SSH2_FEAT_CIPHER_USE_K 0x0004
/* For clients which do not support rekeying */
#define SFTP_SSH2_FEAT_REKEYING 0x0008
/* For clients which do not support USERAUTH_BANNER packets */
#define SFTP_SSH2_FEAT_USERAUTH_BANNER 0x0010
/* For clients which do not send a string indicating the public key
* algorithm in their publickey authentication requests. This also
* includes clients which do not use the string "publickey", and the
* string for the public key algorithm, in the public key signature
* (as dictated by Section 7 of RFC4252).
*/
#define SFTP_SSH2_FEAT_HAVE_PUBKEY_ALGO 0x0020
/* For clients whose publickey signatures always use a service name of
* "ssh-userauth", regardless of the actual service name included in the
* USERAUTH_REQUEST packet.
*/
#define SFTP_SSH2_FEAT_SERVICE_IN_PUBKEY_SIG 0x0040
/* For clients whose DSA publickey signatures do not include the string
* "ssh-dss".
*/
#define SFTP_SSH2_FEAT_HAVE_PUBKEY_ALGO_IN_DSA_SIG 0x0080
/* For clients whose hostbased signatures always use a service name of
* "ssh-userauth", regardless of the actual service name included in the
* USERAUTH_REQUEST packet.
*/
#define SFTP_SSH2_FEAT_SERVICE_IN_HOST_SIG 0x0100
/* For clients that want the server to pessimistically send its NEWKEYS message
* after they send their NEWKEYS message.
*/
#define SFTP_SSH2_FEAT_PESSIMISTIC_NEWKEYS 0x0200
/* For scanners. */
#define SFTP_SSH2_FEAT_SCANNER 0xfffe
/* For probes. */
#define SFTP_SSH2_FEAT_PROBE 0xffff
/* Compares the given client version string against a table of known client
* client versions and their interoperability/compatibility issues.
*/
int sftp_interop_handle_version(const char *);
/* Returns TRUE if the client supports the requested feature, FALSE
* otherwise.
*/
int sftp_interop_supports_feature(int);
int sftp_interop_init(void);
int sftp_interop_free(void);
#endif
|