Blame src/bind.c

Packit Service 31306d
/*
Packit Service 31306d
 * bind.c : all ssh_bind functions
Packit Service 31306d
 *
Packit Service 31306d
 * This file is part of the SSH Library
Packit Service 31306d
 *
Packit Service 31306d
 * Copyright (c) 2004-2005 by Aris Adamantiadis
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is free software; you can redistribute it and/or modify
Packit Service 31306d
 * it under the terms of the GNU Lesser General Public License as published by
Packit Service 31306d
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit Service 31306d
 * option) any later version.
Packit Service 31306d
 *
Packit Service 31306d
 * The SSH Library is distributed in the hope that it will be useful, but
Packit Service 31306d
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit Service 31306d
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit Service 31306d
 * License for more details.
Packit Service 31306d
 *
Packit Service 31306d
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 31306d
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit Service 31306d
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit Service 31306d
 * MA 02111-1307, USA.
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
#include "config.h"
Packit Service 31306d
Packit Service 31306d
#include <errno.h>
Packit Service 31306d
#include <fcntl.h>
Packit Service 31306d
#include <stdio.h>
Packit Service 31306d
#include <string.h>
Packit Service 31306d
#include <stdlib.h>
Packit Service 31306d
Packit Service 31306d
#include "libssh/priv.h"
Packit Service 31306d
#include "libssh/bind.h"
Packit Service 31306d
#include "libssh/libssh.h"
Packit Service 31306d
#include "libssh/server.h"
Packit Service 31306d
#include "libssh/pki.h"
Packit Service 31306d
#include "libssh/buffer.h"
Packit Service 31306d
#include "libssh/socket.h"
Packit Service 31306d
#include "libssh/session.h"
Packit Service 31306d
#include "libssh/token.h"
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @addtogroup libssh_server
Packit Service 31306d
 *
Packit Service 31306d
 * @{
Packit Service 31306d
 */
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
#ifdef _WIN32
Packit Service 31306d
#include <io.h>
Packit Service 31306d
#include <winsock2.h>
Packit Service 31306d
#include <ws2tcpip.h>
Packit Service 31306d
Packit Service 31306d
/*
Packit Service 31306d
 * <wspiapi.h> is necessary for getaddrinfo before Windows XP, but it isn't
Packit Service 31306d
 * available on some platforms like MinGW.
Packit Service 31306d
 */
Packit Service 31306d
#ifdef HAVE_WSPIAPI_H
Packit Service 31306d
# include <wspiapi.h>
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
#define SOCKOPT_TYPE_ARG4 char
Packit Service 31306d
Packit Service 31306d
#else /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
#include <sys/socket.h>
Packit Service 31306d
#include <netinet/in.h>
Packit Service 31306d
#include <netdb.h>
Packit Service 31306d
#define SOCKOPT_TYPE_ARG4 int
Packit Service 31306d
Packit Service 31306d
#endif /* _WIN32 */
Packit Service 31306d
Packit Service 31306d
static socket_t bind_socket(ssh_bind sshbind, const char *hostname,
Packit Service 31306d
    int port) {
Packit Service 31306d
    char port_c[6];
Packit Service 31306d
    struct addrinfo *ai;
Packit Service 31306d
    struct addrinfo hints;
Packit Service 31306d
    int opt = 1;
Packit Service 31306d
    socket_t s;
Packit Service 31306d
    int rc;
Packit Service 31306d
Packit Service 31306d
    ZERO_STRUCT(hints);
Packit Service 31306d
Packit Service 31306d
    hints.ai_flags = AI_PASSIVE;
Packit Service 31306d
    hints.ai_socktype = SOCK_STREAM;
Packit Service 31306d
Packit Service 31306d
    snprintf(port_c, 6, "%d", port);
Packit Service 31306d
    rc = getaddrinfo(hostname, port_c, &hints, &ai;;
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        ssh_set_error(sshbind,
Packit Service 31306d
                      SSH_FATAL,
Packit Service 31306d
                      "Resolving %s: %s", hostname, gai_strerror(rc));
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    s = socket (ai->ai_family,
Packit Service 31306d
                           ai->ai_socktype,
Packit Service 31306d
                           ai->ai_protocol);
Packit Service 31306d
    if (s == SSH_INVALID_SOCKET) {
Packit Service 31306d
        ssh_set_error(sshbind, SSH_FATAL, "%s", strerror(errno));
Packit Service 31306d
        freeaddrinfo (ai);
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
Packit Service 31306d
                   (char *)&opt, sizeof(opt)) < 0) {
Packit Service 31306d
        ssh_set_error(sshbind,
Packit Service 31306d
                      SSH_FATAL,
Packit Service 31306d
                      "Setting socket options failed: %s",
Packit Service 31306d
                      strerror(errno));
Packit Service 31306d
        freeaddrinfo (ai);
Packit Service 31306d
        CLOSE_SOCKET(s);
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (bind(s, ai->ai_addr, ai->ai_addrlen) != 0) {
Packit Service 31306d
        ssh_set_error(sshbind,
Packit Service 31306d
                      SSH_FATAL,
Packit Service 31306d
                      "Binding to %s:%d: %s",
Packit Service 31306d
                      hostname,
Packit Service 31306d
                      port,
Packit Service 31306d
                      strerror(errno));
Packit Service 31306d
        freeaddrinfo (ai);
Packit Service 31306d
        CLOSE_SOCKET(s);
Packit Service 31306d
        return -1;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    freeaddrinfo (ai);
Packit Service 31306d
    return s;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
ssh_bind ssh_bind_new(void) {
Packit Service 31306d
    ssh_bind ptr;
Packit Service 31306d
Packit Service 31306d
    ptr = calloc(1, sizeof(struct ssh_bind_struct));
Packit Service 31306d
    if (ptr == NULL) {
Packit Service 31306d
        return NULL;
Packit Service 31306d
    }
Packit Service 31306d
    ptr->bindfd = SSH_INVALID_SOCKET;
Packit Service 31306d
    ptr->bindport = 22;
Packit Service 31306d
    ptr->common.log_verbosity = 0;
Packit Service 31306d
Packit Service 31306d
    return ptr;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
static int ssh_bind_import_keys(ssh_bind sshbind) {
Packit Service 31306d
  int rc;
Packit Service 31306d
Packit Service 31306d
  if (sshbind->ecdsakey == NULL &&
Packit Service 31306d
      sshbind->dsakey == NULL &&
Packit Service 31306d
      sshbind->rsakey == NULL &&
Packit Service 31306d
      sshbind->ed25519key == NULL) {
Packit Service 31306d
      ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                    "ECDSA, ED25519, DSA, or RSA host key file must be set");
Packit Service 31306d
      return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_ECC
Packit Service 31306d
  if (sshbind->ecdsa == NULL && sshbind->ecdsakey != NULL) {
Packit Service 31306d
      rc = ssh_pki_import_privkey_file(sshbind->ecdsakey,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       &sshbind->ecdsa);
Packit Service 31306d
      if (rc == SSH_ERROR || rc == SSH_EOF) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "Failed to import private ECDSA host key");
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      if (!is_ecdsa_key_type(ssh_key_type(sshbind->ecdsa))) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "The ECDSA host key has the wrong type");
Packit Service 31306d
          ssh_key_free(sshbind->ecdsa);
Packit Service 31306d
          sshbind->ecdsa = NULL;
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
  }
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
  if (sshbind->dsa == NULL && sshbind->dsakey != NULL) {
Packit Service 31306d
      rc = ssh_pki_import_privkey_file(sshbind->dsakey,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       &sshbind->dsa);
Packit Service 31306d
      if (rc == SSH_ERROR || rc == SSH_EOF) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "Failed to import private DSA host key");
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      if (ssh_key_type(sshbind->dsa) != SSH_KEYTYPE_DSS) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "The DSA host key has the wrong type: %d",
Packit Service 31306d
                  ssh_key_type(sshbind->dsa));
Packit Service 31306d
          ssh_key_free(sshbind->dsa);
Packit Service 31306d
          sshbind->dsa = NULL;
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
  }
Packit Service 31306d
#endif
Packit Service 31306d
Packit Service 31306d
  if (sshbind->rsa == NULL && sshbind->rsakey != NULL) {
Packit Service 31306d
      rc = ssh_pki_import_privkey_file(sshbind->rsakey,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       &sshbind->rsa);
Packit Service 31306d
      if (rc == SSH_ERROR || rc == SSH_EOF) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "Failed to import private RSA host key");
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      if (ssh_key_type(sshbind->rsa) != SSH_KEYTYPE_RSA) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "The RSA host key has the wrong type");
Packit Service 31306d
          ssh_key_free(sshbind->rsa);
Packit Service 31306d
          sshbind->rsa = NULL;
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  if (sshbind->ed25519 == NULL && sshbind->ed25519key != NULL) {
Packit Service 31306d
      rc = ssh_pki_import_privkey_file(sshbind->ed25519key,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       NULL,
Packit Service 31306d
                                       &sshbind->ed25519);
Packit Service 31306d
      if (rc == SSH_ERROR || rc == SSH_EOF) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "Failed to import private ED25519 host key");
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      if (ssh_key_type(sshbind->ed25519) != SSH_KEYTYPE_ED25519) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "The ED25519 host key has the wrong type");
Packit Service 31306d
          ssh_key_free(sshbind->ed25519);
Packit Service 31306d
          sshbind->ed25519 = NULL;
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_bind_listen(ssh_bind sshbind) {
Packit Service 31306d
  const char *host;
Packit Service 31306d
  socket_t fd;
Packit Service 31306d
  int rc;
Packit Service 31306d
Packit Service 31306d
  if (sshbind->rsa == NULL &&
Packit Service 31306d
      sshbind->dsa == NULL &&
Packit Service 31306d
      sshbind->ecdsa == NULL &&
Packit Service 31306d
      sshbind->ed25519 == NULL) {
Packit Service 31306d
      rc = ssh_bind_import_keys(sshbind);
Packit Service 31306d
      if (rc != SSH_OK) {
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  if (sshbind->bindfd == SSH_INVALID_SOCKET) {
Packit Service 31306d
      host = sshbind->bindaddr;
Packit Service 31306d
      if (host == NULL) {
Packit Service 31306d
          host = "0.0.0.0";
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      fd = bind_socket(sshbind, host, sshbind->bindport);
Packit Service 31306d
      if (fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
          ssh_key_free(sshbind->dsa);
Packit Service 31306d
          sshbind->dsa = NULL;
Packit Service 31306d
          ssh_key_free(sshbind->rsa);
Packit Service 31306d
          sshbind->rsa = NULL;
Packit Service 31306d
          /* XXX should this clear also other structures that were allocated */
Packit Service 31306d
          return -1;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      if (listen(fd, 10) < 0) {
Packit Service 31306d
          ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
                  "Listening to socket %d: %s",
Packit Service 31306d
                  fd, strerror(errno));
Packit Service 31306d
          CLOSE_SOCKET(fd);
Packit Service 31306d
          ssh_key_free(sshbind->dsa);
Packit Service 31306d
          sshbind->dsa = NULL;
Packit Service 31306d
          ssh_key_free(sshbind->rsa);
Packit Service 31306d
          sshbind->rsa = NULL;
Packit Service 31306d
          /* XXX should this clear also other structures that were allocated */
Packit Service 31306d
          return -1;
Packit Service 31306d
      }
Packit Service 31306d
Packit Service 31306d
      sshbind->bindfd = fd;
Packit Service 31306d
  } else {
Packit Service 31306d
      SSH_LOG(SSH_LOG_INFO, "Using app-provided bind socket");
Packit Service 31306d
  }
Packit Service 31306d
  return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_bind_set_callbacks(ssh_bind sshbind, ssh_bind_callbacks callbacks,
Packit Service 31306d
    void *userdata){
Packit Service 31306d
  if (sshbind == NULL) {
Packit Service 31306d
    return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
  if (callbacks == NULL) {
Packit Service 31306d
    ssh_set_error_invalid(sshbind);
Packit Service 31306d
    return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
  if(callbacks->size <= 0 || callbacks->size > 1024 * sizeof(void *)){
Packit Service 31306d
    ssh_set_error(sshbind,SSH_FATAL,
Packit Service 31306d
        "Invalid callback passed in (badly initialized)");
Packit Service 31306d
    return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
  sshbind->bind_callbacks = callbacks;
Packit Service 31306d
  sshbind->bind_callbacks_userdata=userdata;
Packit Service 31306d
  return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** @internal
Packit Service 31306d
 * @brief callback being called by poll when an event happens
Packit Service 31306d
 *
Packit Service 31306d
 */
Packit Service 31306d
static int ssh_bind_poll_callback(ssh_poll_handle sshpoll,
Packit Service 31306d
    socket_t fd, int revents, void *user){
Packit Service 31306d
  ssh_bind sshbind=(ssh_bind)user;
Packit Service 31306d
  (void)sshpoll;
Packit Service 31306d
  (void)fd;
Packit Service 31306d
Packit Service 31306d
  if(revents & POLLIN){
Packit Service 31306d
    /* new incoming connection */
Packit Service 31306d
    if(ssh_callbacks_exists(sshbind->bind_callbacks,incoming_connection)){
Packit Service 31306d
      sshbind->bind_callbacks->incoming_connection(sshbind,
Packit Service 31306d
          sshbind->bind_callbacks_userdata);
Packit Service 31306d
    }
Packit Service 31306d
  }
Packit Service 31306d
  return 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
/** @internal
Packit Service 31306d
 * @brief returns the current poll handle, or create it
Packit Service 31306d
 * @param sshbind the ssh_bind object
Packit Service 31306d
 * @returns a ssh_poll handle suitable for operation
Packit Service 31306d
 */
Packit Service 31306d
ssh_poll_handle ssh_bind_get_poll(ssh_bind sshbind)
Packit Service 31306d
{
Packit Service 31306d
    short events = POLLIN;
Packit Service 31306d
Packit Service 31306d
    if (sshbind->poll) {
Packit Service 31306d
        return sshbind->poll;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
#ifdef POLLRDHUP
Packit Service 31306d
    events |= POLLRDHUP;
Packit Service 31306d
#endif /* POLLRDHUP */
Packit Service 31306d
Packit Service 31306d
    sshbind->poll = ssh_poll_new(sshbind->bindfd,
Packit Service 31306d
                                 events,
Packit Service 31306d
                                 ssh_bind_poll_callback,
Packit Service 31306d
                                 sshbind);
Packit Service 31306d
Packit Service 31306d
    return sshbind->poll;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_bind_set_blocking(ssh_bind sshbind, int blocking) {
Packit Service 31306d
  sshbind->blocking = blocking ? 1 : 0;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
socket_t ssh_bind_get_fd(ssh_bind sshbind) {
Packit Service 31306d
  return sshbind->bindfd;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_bind_set_fd(ssh_bind sshbind, socket_t fd) {
Packit Service 31306d
  sshbind->bindfd = fd;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_bind_fd_toaccept(ssh_bind sshbind) {
Packit Service 31306d
  sshbind->toaccept = 1;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
void ssh_bind_free(ssh_bind sshbind){
Packit Service 31306d
  int i;
Packit Service 31306d
Packit Service 31306d
  if (sshbind == NULL) {
Packit Service 31306d
    return;
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  if (sshbind->bindfd >= 0) {
Packit Service 31306d
      CLOSE_SOCKET(sshbind->bindfd);
Packit Service 31306d
  }
Packit Service 31306d
  sshbind->bindfd = SSH_INVALID_SOCKET;
Packit Service 31306d
Packit Service 31306d
  /* options */
Packit Service 31306d
  SAFE_FREE(sshbind->banner);
Packit Service 31306d
  SAFE_FREE(sshbind->bindaddr);
Packit Service 31306d
  SAFE_FREE(sshbind->config_dir);
Packit Service 31306d
  SAFE_FREE(sshbind->pubkey_accepted_key_types);
Packit Service 31306d
Packit Service 31306d
  SAFE_FREE(sshbind->dsakey);
Packit Service 31306d
  SAFE_FREE(sshbind->rsakey);
Packit Service 31306d
  SAFE_FREE(sshbind->ecdsakey);
Packit Service 31306d
  SAFE_FREE(sshbind->ed25519key);
Packit Service 31306d
Packit Service 31306d
  ssh_key_free(sshbind->dsa);
Packit Service 31306d
  sshbind->dsa = NULL;
Packit Service 31306d
  ssh_key_free(sshbind->rsa);
Packit Service 31306d
  sshbind->rsa = NULL;
Packit Service 31306d
  ssh_key_free(sshbind->ecdsa);
Packit Service 31306d
  sshbind->ecdsa = NULL;
Packit Service 31306d
  ssh_key_free(sshbind->ed25519);
Packit Service 31306d
  sshbind->ed25519 = NULL;
Packit Service 31306d
Packit Service 31306d
  for (i = 0; i < SSH_KEX_METHODS; i++) {
Packit Service 31306d
    if (sshbind->wanted_methods[i]) {
Packit Service 31306d
      SAFE_FREE(sshbind->wanted_methods[i]);
Packit Service 31306d
    }
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  SAFE_FREE(sshbind);
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_bind_accept_fd(ssh_bind sshbind, ssh_session session, socket_t fd){
Packit Service 31306d
    int i, rc;
Packit Service 31306d
Packit Service 31306d
    if (sshbind == NULL) {
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (session == NULL){
Packit Service 31306d
        ssh_set_error(sshbind, SSH_FATAL,"session is null");
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* Apply global bind configurations, if it hasn't been applied before */
Packit Service 31306d
    rc = ssh_bind_options_parse_config(sshbind, NULL);
Packit Service 31306d
    if (rc != 0) {
Packit Service 31306d
        ssh_set_error(sshbind, SSH_FATAL,"Could not parse global config");
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    session->server = 1;
Packit Service 31306d
Packit Service 31306d
    /* Copy options from bind to session */
Packit Service 31306d
    for (i = 0; i < SSH_KEX_METHODS; i++) {
Packit Service 31306d
      if (sshbind->wanted_methods[i]) {
Packit Service 31306d
        session->opts.wanted_methods[i] = strdup(sshbind->wanted_methods[i]);
Packit Service 31306d
        if (session->opts.wanted_methods[i] == NULL) {
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
      }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (sshbind->bindaddr == NULL)
Packit Service 31306d
      session->opts.bindaddr = NULL;
Packit Service 31306d
    else {
Packit Service 31306d
      SAFE_FREE(session->opts.bindaddr);
Packit Service 31306d
      session->opts.bindaddr = strdup(sshbind->bindaddr);
Packit Service 31306d
      if (session->opts.bindaddr == NULL) {
Packit Service 31306d
        return SSH_ERROR;
Packit Service 31306d
      }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    if (sshbind->pubkey_accepted_key_types != NULL) {
Packit Service 31306d
        if (session->opts.pubkey_accepted_types == NULL) {
Packit Service 31306d
            session->opts.pubkey_accepted_types = strdup(sshbind->pubkey_accepted_key_types);
Packit Service 31306d
            if (session->opts.pubkey_accepted_types == NULL) {
Packit Service 31306d
                ssh_set_error_oom(sshbind);
Packit Service 31306d
                return SSH_ERROR;
Packit Service 31306d
            }
Packit Service 31306d
        } else {
Packit Service 31306d
            char *p;
Packit Service 31306d
            /* If something was set to the session prior to calling this
Packit Service 31306d
             * function, keep only what is allowed by the options set in
Packit Service 31306d
             * sshbind */
Packit Service 31306d
            p = ssh_find_all_matching(sshbind->pubkey_accepted_key_types,
Packit Service 31306d
                                      session->opts.pubkey_accepted_types);
Packit Service 31306d
            if (p == NULL) {
Packit Service 31306d
                return SSH_ERROR;
Packit Service 31306d
            }
Packit Service 31306d
Packit Service 31306d
            SAFE_FREE(session->opts.pubkey_accepted_types);
Packit Service 31306d
            session->opts.pubkey_accepted_types = p;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    session->common.log_verbosity = sshbind->common.log_verbosity;
Packit Service 31306d
    if(sshbind->banner != NULL)
Packit Service 31306d
    	session->opts.custombanner = strdup(sshbind->banner);
Packit Service 31306d
    ssh_socket_free(session->socket);
Packit Service 31306d
    session->socket = ssh_socket_new(session);
Packit Service 31306d
    if (session->socket == NULL) {
Packit Service 31306d
      /* perhaps it may be better to copy the error from session to sshbind */
Packit Service 31306d
      ssh_set_error_oom(sshbind);
Packit Service 31306d
      return SSH_ERROR;
Packit Service 31306d
    }
Packit Service 31306d
    ssh_socket_set_fd(session->socket, fd);
Packit Service 31306d
    ssh_socket_get_poll_handle(session->socket);
Packit Service 31306d
Packit Service 31306d
    /* We must try to import any keys that could be imported in case
Packit Service 31306d
     * we are not using ssh_bind_listen (which is the other place
Packit Service 31306d
     * where keys can be imported) on this ssh_bind and are instead
Packit Service 31306d
     * only using ssh_bind_accept_fd to manage sockets ourselves.
Packit Service 31306d
     */
Packit Service 31306d
    if (sshbind->rsa == NULL &&
Packit Service 31306d
        sshbind->dsa == NULL &&
Packit Service 31306d
        sshbind->ecdsa == NULL &&
Packit Service 31306d
        sshbind->ed25519 == NULL) {
Packit Service 31306d
        rc = ssh_bind_import_keys(sshbind);
Packit Service 31306d
        if (rc != SSH_OK) {
Packit Service 31306d
            return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
#ifdef HAVE_ECC
Packit Service 31306d
    if (sshbind->ecdsa) {
Packit Service 31306d
        session->srv.ecdsa_key = ssh_key_dup(sshbind->ecdsa);
Packit Service 31306d
        if (session->srv.ecdsa_key == NULL) {
Packit Service 31306d
          ssh_set_error_oom(sshbind);
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
#endif
Packit Service 31306d
#ifdef HAVE_DSA
Packit Service 31306d
    if (sshbind->dsa) {
Packit Service 31306d
        session->srv.dsa_key = ssh_key_dup(sshbind->dsa);
Packit Service 31306d
        if (session->srv.dsa_key == NULL) {
Packit Service 31306d
          ssh_set_error_oom(sshbind);
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
#endif
Packit Service 31306d
    if (sshbind->rsa) {
Packit Service 31306d
        session->srv.rsa_key = ssh_key_dup(sshbind->rsa);
Packit Service 31306d
        if (session->srv.rsa_key == NULL) {
Packit Service 31306d
          ssh_set_error_oom(sshbind);
Packit Service 31306d
          return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
    if (sshbind->ed25519 != NULL) {
Packit Service 31306d
        session->srv.ed25519_key = ssh_key_dup(sshbind->ed25519);
Packit Service 31306d
        if (session->srv.ed25519_key == NULL){
Packit Service 31306d
            ssh_set_error_oom(sshbind);
Packit Service 31306d
            return SSH_ERROR;
Packit Service 31306d
        }
Packit Service 31306d
    }
Packit Service 31306d
Packit Service 31306d
    /* force PRNG to change state in case we fork after ssh_bind_accept */
Packit Service 31306d
    ssh_reseed();
Packit Service 31306d
    return SSH_OK;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
int ssh_bind_accept(ssh_bind sshbind, ssh_session session) {
Packit Service 31306d
  socket_t fd = SSH_INVALID_SOCKET;
Packit Service 31306d
  int rc;
Packit Service 31306d
  if (sshbind->bindfd == SSH_INVALID_SOCKET) {
Packit Service 31306d
    ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
        "Can't accept new clients on a not bound socket.");
Packit Service 31306d
    return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  if (session == NULL){
Packit Service 31306d
      ssh_set_error(sshbind, SSH_FATAL,"session is null");
Packit Service 31306d
      return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
Packit Service 31306d
  fd = accept(sshbind->bindfd, NULL, NULL);
Packit Service 31306d
  if (fd == SSH_INVALID_SOCKET) {
Packit Service 31306d
    ssh_set_error(sshbind, SSH_FATAL,
Packit Service 31306d
        "Accepting a new connection: %s",
Packit Service 31306d
        strerror(errno));
Packit Service 31306d
    return SSH_ERROR;
Packit Service 31306d
  }
Packit Service 31306d
  rc = ssh_bind_accept_fd(sshbind, session, fd);
Packit Service 31306d
Packit Service 31306d
  if(rc == SSH_ERROR){
Packit Service 31306d
      CLOSE_SOCKET(fd);
Packit Service 31306d
      ssh_socket_free(session->socket);
Packit Service 31306d
  }
Packit Service 31306d
  return rc;
Packit Service 31306d
}
Packit Service 31306d
Packit Service 31306d
Packit Service 31306d
/**
Packit Service 31306d
 * @}
Packit Service 31306d
 */