%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /usr/local/include/proftpd/mod_sftp/
Upload File :
Create Path :
Current File : //usr/local/include/proftpd/mod_sftp/interop.h

/*
 * ProFTPD - mod_sftp interoperability
 * Copyright (c) 2008-2021 TJ Saunders
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Suite 500, Boston, MA 02110-1335, USA.
 *
 * As a special exemption, TJ Saunders and other respective copyright holders
 * give permission to link this program with OpenSSL, and distribute the
 * resulting executable, without including the source code for OpenSSL in the
 * source distribution.
 */

#ifndef MOD_SFTP_INTEROP_H
#define MOD_SFTP_INTEROP_H

#include "mod_sftp.h"

/* For clients which do not support IGNORE packets */
#define SFTP_SSH2_FEAT_IGNORE_MSG			0x0001

/* For clients which always truncate the HMAC len to 16 bits, regardless
 * of the actual HMAC len.
 */
#define SFTP_SSH2_FEAT_MAC_LEN				0x0002

/* For clients which do not include K when deriving cipher keys. */
#define SFTP_SSH2_FEAT_CIPHER_USE_K			0x0004

/* For clients which do not support rekeying */
#define SFTP_SSH2_FEAT_REKEYING				0x0008

/* For clients which do not support USERAUTH_BANNER packets */
#define SFTP_SSH2_FEAT_USERAUTH_BANNER			0x0010

/* For clients which do not send a string indicating the public key
 * algorithm in their publickey authentication requests.  This also
 * includes clients which do not use the string "publickey", and the
 * string for the public key algorithm, in the public key signature
 * (as dictated by Section 7 of RFC4252).
 */
#define SFTP_SSH2_FEAT_HAVE_PUBKEY_ALGO			0x0020

/* For clients whose publickey signatures always use a service name of
 * "ssh-userauth", regardless of the actual service name included in the
 * USERAUTH_REQUEST packet.
 */
#define SFTP_SSH2_FEAT_SERVICE_IN_PUBKEY_SIG		0x0040

/* For clients whose DSA publickey signatures do not include the string
 * "ssh-dss".
 */
#define SFTP_SSH2_FEAT_HAVE_PUBKEY_ALGO_IN_DSA_SIG	0x0080

/* For clients whose hostbased signatures always use a service name of
 * "ssh-userauth", regardless of the actual service name included in the
 * USERAUTH_REQUEST packet.
 */
#define SFTP_SSH2_FEAT_SERVICE_IN_HOST_SIG		0x0100

/* For clients that want the server to pessimistically send its NEWKEYS message
 * after they send their NEWKEYS message.
 */
#define SFTP_SSH2_FEAT_PESSIMISTIC_NEWKEYS		0x0200

/* For clients which cannot/do not tolerate non-kex related packets after a
 * server has requested rekeying.
 */
#define SFTP_SSH2_FEAT_NO_DATA_WHILE_REKEYING		0x0400

/* For clients that support the OpenSSH "hostkeys-00@openssh.com" extensions.
 */
#define SFTP_SSH2_FEAT_HOSTKEYS				0x0800

/* For scanners. */
#define SFTP_SSH2_FEAT_SCANNER				0xfffe

/* For probes. */
#define SFTP_SSH2_FEAT_PROBE				0xffff

/* Compares the given client version string against a table of known client
 * client versions and their interoperability/compatibility issues.
 */
int sftp_interop_handle_version(pool *, const char *);

/* Returns TRUE if the client supports the requested feature, FALSE
 * otherwise.
 */
int sftp_interop_supports_feature(int);

int sftp_interop_init(void);
int sftp_interop_free(void);

#endif /* MOD_SFTP_INTEROP_H */

Zerion Mini Shell 1.0