зеркало из https://github.com/github/putty.git
351 строка
9.7 KiB
C
351 строка
9.7 KiB
C
/*
|
|
* General mechanism for wrapping up reading/writing of Windows
|
|
* HANDLEs into a PuTTY Socket abstraction.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <assert.h>
|
|
#include <limits.h>
|
|
|
|
#define DEFINE_PLUG_METHOD_MACROS
|
|
#include "tree234.h"
|
|
#include "putty.h"
|
|
#include "network.h"
|
|
|
|
typedef struct Socket_handle_tag *Handle_Socket;
|
|
|
|
struct Socket_handle_tag {
|
|
const struct socket_function_table *fn;
|
|
/* the above variable absolutely *must* be the first in this structure */
|
|
|
|
HANDLE send_H, recv_H, stderr_H;
|
|
struct handle *send_h, *recv_h, *stderr_h;
|
|
|
|
/*
|
|
* Freezing one of these sockets is a slightly fiddly business,
|
|
* because the reads from the handle are happening in a separate
|
|
* thread as blocking system calls and so once one is in progress
|
|
* it can't sensibly be interrupted. Hence, after the user tries
|
|
* to freeze one of these sockets, it's unavoidable that we may
|
|
* receive one more load of data before we manage to get
|
|
* winhandl.c to stop reading.
|
|
*/
|
|
enum {
|
|
UNFROZEN, /* reading as normal */
|
|
FREEZING, /* have been set to frozen but winhandl is still reading */
|
|
FROZEN, /* really frozen - winhandl has been throttled */
|
|
THAWING /* we're gradually releasing our remaining data */
|
|
} frozen;
|
|
/* We buffer data here if we receive it from winhandl while frozen. */
|
|
bufchain inputdata;
|
|
|
|
/* Data received from stderr_H, if we have one. */
|
|
bufchain stderrdata;
|
|
|
|
int defer_close, deferred_close; /* in case of re-entrance */
|
|
|
|
char *error;
|
|
|
|
Plug plug;
|
|
};
|
|
|
|
static int handle_gotdata(struct handle *h, void *data, int len)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
|
|
|
|
if (len < 0) {
|
|
plug_closing(ps->plug, "Read error from handle", 0, 0);
|
|
return 0;
|
|
} else if (len == 0) {
|
|
plug_closing(ps->plug, NULL, 0, 0);
|
|
return 0;
|
|
} else {
|
|
assert(ps->frozen != FROZEN && ps->frozen != THAWING);
|
|
if (ps->frozen == FREEZING) {
|
|
/*
|
|
* If we've received data while this socket is supposed to
|
|
* be frozen (because the read winhandl.c started before
|
|
* sk_set_frozen was called has now returned) then buffer
|
|
* the data for when we unfreeze.
|
|
*/
|
|
bufchain_add(&ps->inputdata, data, len);
|
|
ps->frozen = FROZEN;
|
|
|
|
/*
|
|
* And return a very large backlog, to prevent further
|
|
* data arriving from winhandl until we unfreeze.
|
|
*/
|
|
return INT_MAX;
|
|
} else {
|
|
plug_receive(ps->plug, 0, data, len);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int handle_stderr(struct handle *h, void *data, int len)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
|
|
|
|
if (len > 0)
|
|
log_proxy_stderr(ps->plug, &ps->stderrdata, data, len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void handle_sentdata(struct handle *h, int new_backlog)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) handle_get_privdata(h);
|
|
|
|
if (new_backlog < 0) {
|
|
/* Special case: this is actually reporting an error writing
|
|
* to the underlying handle, and our input value is the error
|
|
* code itself, negated. */
|
|
plug_closing(ps->plug, win_strerror(-new_backlog), -new_backlog, 0);
|
|
return;
|
|
}
|
|
|
|
plug_sent(ps->plug, new_backlog);
|
|
}
|
|
|
|
static Plug sk_handle_plug(Socket s, Plug p)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
Plug ret = ps->plug;
|
|
if (p)
|
|
ps->plug = p;
|
|
return ret;
|
|
}
|
|
|
|
static void sk_handle_close(Socket s)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
|
|
if (ps->defer_close) {
|
|
ps->deferred_close = TRUE;
|
|
return;
|
|
}
|
|
|
|
handle_free(ps->send_h);
|
|
handle_free(ps->recv_h);
|
|
CloseHandle(ps->send_H);
|
|
if (ps->recv_H != ps->send_H)
|
|
CloseHandle(ps->recv_H);
|
|
bufchain_clear(&ps->inputdata);
|
|
bufchain_clear(&ps->stderrdata);
|
|
|
|
sfree(ps);
|
|
}
|
|
|
|
static int sk_handle_write(Socket s, const char *data, int len)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
|
|
return handle_write(ps->send_h, data, len);
|
|
}
|
|
|
|
static int sk_handle_write_oob(Socket s, const char *data, int len)
|
|
{
|
|
/*
|
|
* oob data is treated as inband; nasty, but nothing really
|
|
* better we can do
|
|
*/
|
|
return sk_handle_write(s, data, len);
|
|
}
|
|
|
|
static void sk_handle_write_eof(Socket s)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
|
|
handle_write_eof(ps->send_h);
|
|
}
|
|
|
|
static void sk_handle_flush(Socket s)
|
|
{
|
|
/* Handle_Socket ps = (Handle_Socket) s; */
|
|
/* do nothing */
|
|
}
|
|
|
|
static void handle_socket_unfreeze(void *psv)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) psv;
|
|
void *data;
|
|
int len;
|
|
|
|
/*
|
|
* If we've been put into a state other than THAWING since the
|
|
* last callback, then we're done.
|
|
*/
|
|
if (ps->frozen != THAWING)
|
|
return;
|
|
|
|
/*
|
|
* Get some of the data we've buffered.
|
|
*/
|
|
bufchain_prefix(&ps->inputdata, &data, &len);
|
|
assert(len > 0);
|
|
|
|
/*
|
|
* Hand it off to the plug. Be careful of re-entrance - that might
|
|
* have the effect of trying to close this socket.
|
|
*/
|
|
ps->defer_close = TRUE;
|
|
plug_receive(ps->plug, 0, data, len);
|
|
bufchain_consume(&ps->inputdata, len);
|
|
ps->defer_close = FALSE;
|
|
if (ps->deferred_close) {
|
|
sk_handle_close((Socket)ps);
|
|
return;
|
|
}
|
|
|
|
if (bufchain_size(&ps->inputdata) > 0) {
|
|
/*
|
|
* If there's still data in our buffer, stay in THAWING state,
|
|
* and reschedule ourself.
|
|
*/
|
|
queue_toplevel_callback(handle_socket_unfreeze, ps);
|
|
} else {
|
|
/*
|
|
* Otherwise, we've successfully thawed!
|
|
*/
|
|
ps->frozen = UNFROZEN;
|
|
handle_unthrottle(ps->recv_h, 0);
|
|
}
|
|
}
|
|
|
|
static void sk_handle_set_frozen(Socket s, int is_frozen)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
|
|
if (is_frozen) {
|
|
switch (ps->frozen) {
|
|
case FREEZING:
|
|
case FROZEN:
|
|
return; /* nothing to do */
|
|
|
|
case THAWING:
|
|
/*
|
|
* We were in the middle of emptying our bufchain, and got
|
|
* frozen again. In that case, winhandl.c is already
|
|
* throttled, so just return to FROZEN state. The toplevel
|
|
* callback will notice and disable itself.
|
|
*/
|
|
ps->frozen = FROZEN;
|
|
break;
|
|
|
|
case UNFROZEN:
|
|
/*
|
|
* The normal case. Go to FREEZING, and expect one more
|
|
* load of data from winhandl if we're unlucky.
|
|
*/
|
|
ps->frozen = FREEZING;
|
|
break;
|
|
}
|
|
} else {
|
|
switch (ps->frozen) {
|
|
case UNFROZEN:
|
|
case THAWING:
|
|
return; /* nothing to do */
|
|
|
|
case FREEZING:
|
|
/*
|
|
* If winhandl didn't send us any data throughout the time
|
|
* we were frozen, then we'll still be in this state and
|
|
* can just unfreeze in the trivial way.
|
|
*/
|
|
assert(bufchain_size(&ps->inputdata) == 0);
|
|
ps->frozen = UNFROZEN;
|
|
break;
|
|
|
|
case FROZEN:
|
|
/*
|
|
* If we have buffered data, go to THAWING and start
|
|
* releasing it in top-level callbacks.
|
|
*/
|
|
ps->frozen = THAWING;
|
|
queue_toplevel_callback(handle_socket_unfreeze, ps);
|
|
}
|
|
}
|
|
}
|
|
|
|
static const char *sk_handle_socket_error(Socket s)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
return ps->error;
|
|
}
|
|
|
|
static char *sk_handle_peer_info(Socket s)
|
|
{
|
|
Handle_Socket ps = (Handle_Socket) s;
|
|
ULONG pid;
|
|
static HMODULE kernel32_module;
|
|
DECL_WINDOWS_FUNCTION(static, BOOL, GetNamedPipeClientProcessId,
|
|
(HANDLE, PULONG));
|
|
|
|
if (!kernel32_module) {
|
|
kernel32_module = load_system32_dll("kernel32.dll");
|
|
#if (defined _MSC_VER && _MSC_VER < 1900) || defined __MINGW32__ || defined COVERITY
|
|
/* For older Visual Studio, and MinGW too (at least as of
|
|
* Ubuntu 16.04), this function isn't available in the header
|
|
* files to type-check. Ditto the toolchain I use for
|
|
* Coveritying the Windows code. */
|
|
GET_WINDOWS_FUNCTION_NO_TYPECHECK(
|
|
kernel32_module, GetNamedPipeClientProcessId);
|
|
#else
|
|
GET_WINDOWS_FUNCTION(
|
|
kernel32_module, GetNamedPipeClientProcessId);
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* Of course, not all handles managed by this module will be
|
|
* server ends of named pipes, but if they are, then it's useful
|
|
* to log what we can find out about the client end.
|
|
*/
|
|
if (p_GetNamedPipeClientProcessId &&
|
|
p_GetNamedPipeClientProcessId(ps->send_H, &pid))
|
|
return dupprintf("process id %lu", (unsigned long)pid);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
Socket make_handle_socket(HANDLE send_H, HANDLE recv_H, HANDLE stderr_H,
|
|
Plug plug, int overlapped)
|
|
{
|
|
static const struct socket_function_table socket_fn_table = {
|
|
sk_handle_plug,
|
|
sk_handle_close,
|
|
sk_handle_write,
|
|
sk_handle_write_oob,
|
|
sk_handle_write_eof,
|
|
sk_handle_flush,
|
|
sk_handle_set_frozen,
|
|
sk_handle_socket_error,
|
|
sk_handle_peer_info,
|
|
};
|
|
|
|
Handle_Socket ret;
|
|
int flags = (overlapped ? HANDLE_FLAG_OVERLAPPED : 0);
|
|
|
|
ret = snew(struct Socket_handle_tag);
|
|
ret->fn = &socket_fn_table;
|
|
ret->plug = plug;
|
|
ret->error = NULL;
|
|
ret->frozen = UNFROZEN;
|
|
bufchain_init(&ret->inputdata);
|
|
bufchain_init(&ret->stderrdata);
|
|
|
|
ret->recv_H = recv_H;
|
|
ret->recv_h = handle_input_new(ret->recv_H, handle_gotdata, ret, flags);
|
|
ret->send_H = send_H;
|
|
ret->send_h = handle_output_new(ret->send_H, handle_sentdata, ret, flags);
|
|
ret->stderr_H = stderr_H;
|
|
if (ret->stderr_H)
|
|
ret->stderr_h = handle_input_new(ret->stderr_H, handle_stderr,
|
|
ret, flags);
|
|
|
|
ret->defer_close = ret->deferred_close = FALSE;
|
|
|
|
return (Socket) ret;
|
|
}
|