1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
|
/*
* ProFTPD - mod_proxy SSH session
* Copyright (c) 2021 TJ Saunders
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Suite 500, Boston, MA 02110-1335, USA.
*
* As a special exemption, TJ Saunders and other respective copyright holders
* give permission to link this program with OpenSSL, and distribute the
* resulting executable, without including the source code for OpenSSL in the
* source distribution.
*/
#include "mod_proxy.h"
#include "proxy/ssh/session.h"
#if defined(PR_USE_OPENSSL)
#include <openssl/rand.h>
static unsigned char *session_id = NULL;
static uint32_t session_idlen = 0;
uint32_t proxy_ssh_session_get_id(const unsigned char **buf) {
if (session_id != NULL) {
*buf = session_id;
return session_idlen;
}
return 0;
}
int proxy_ssh_session_set_id(pool *p, const unsigned char *hash,
uint32_t hashlen) {
/* The session ID is only set once, regardless of how many times
* (re)keying occurs during the course of a session.
*/
if (session_id == NULL) {
session_id = palloc(p, hashlen);
memcpy(session_id, hash, hashlen);
session_idlen = hashlen;
#if OPENSSL_VERSION_NUMBER >= 0x000905000L
/* Since the session ID contains unknown information from the client,
* it can be used as a source of additional entropy. The amount
* of entropy is a rough guess.
*/
RAND_add(hash, hashlen, hashlen * 0.5);
#endif
return 0;
}
errno = EEXIST;
return -1;
}
#endif /* PR_USE_OPENSSL */
|