pubdev/dartssh/protocol
library
Classes
-
BinaryPacket
-
SSH protocol frame.
-
MSG_CHANNEL_CLOSE
-
When either party wishes to terminate the channel, it sends SSH_MSG_CHANNEL_CLOSE.
https://tools.ietf.org/html/rfc4254#section-5.3
-
MSG_CHANNEL_DATA
-
https://tools.ietf.org/html/rfc4254#section-5.2
-
MSG_CHANNEL_EOF
-
When a party will no longer send more data to a channel, it SHOULD send SSH_MSG_CHANNEL_EOF.
-
MSG_CHANNEL_FAILURE
-
These messages do not consume window space and can be sent even if no window space is available.
-
MSG_CHANNEL_OPEN
-
https://tools.ietf.org/html/rfc4254#section-5.1
-
MSG_CHANNEL_OPEN_CONFIRMATION
-
The remote side then decides whether it can open the channel, and
responds with either SSH_MSG_CHANNEL_OPEN_CONFIRMATION or SSH_MSG_CHANNEL_OPEN_FAILURE.
-
MSG_CHANNEL_OPEN_FAILURE
-
The client MAY show the 'description' string to the user.
-
MSG_CHANNEL_OPEN_TCPIP
-
https://tools.ietf.org/html/rfc4254#section-7.2
-
MSG_CHANNEL_REQUEST
-
Channel-Specific Requests https://tools.ietf.org/html/rfc4254#section-5.4
-
MSG_CHANNEL_SUCCESS
-
If 'want reply' is FALSE, no response will be sent to the request. Otherwise,
the recipient responds with either SSH_MSG_CHANNEL_SUCCESS, or SSH_MSG_CHANNEL_FAILURE.
-
MSG_CHANNEL_WINDOW_ADJUST
-
The window size specifies how many bytes the other party can send
before it must wait for the window to be adjusted.
-
MSG_DEBUG
-
This message is used to transmit information that may help debugging.
-
MSG_DISCONNECT
-
This message causes immediate termination of the connection.
-
MSG_GLOBAL_REQUEST
-
https://tools.ietf.org/html/rfc4254#section-4
-
MSG_GLOBAL_REQUEST_TCPIP
-
https://tools.ietf.org/html/rfc4254#section-7.1
-
MSG_IGNORE
-
All implementations MUST understand (and ignore) this message at any
time (after receiving the identification string).
-
MSG_KEX_DH_GEX_GROUP
-
S finds a group that best matches the client's request, and sends "p || g" to C.
-
MSG_KEX_DH_GEX_INIT
-
C generates a random number x, where 1 < x < (p-1)/2.
It computes e = g^x mod p, and sends "e" to S.
-
MSG_KEX_DH_GEX_REPLY
-
S generates a random number y, where 0 < y < (p-1)/2, and computes
f = g^y mod p. S receives "e". It computes K = e^y mod p, and H.
-
MSG_KEX_DH_GEX_REQUEST
-
C sends "min || n || max" to S, indicating the minimal acceptable group size, the
preferred size of the group, and the maximal group size in bits the client will accept.
https://tools.ietf.org/html/rfc4419
-
MSG_KEX_ECDH_INIT
-
Client generates ephemeral key pair.
https://tools.ietf.org/html/rfc5656#section-4
-
MSG_KEX_ECDH_REPLY
-
Server generates ephemeral key pair, computes shared secret, and
generate and signs exchange hash.
-
MSG_KEXDH_INIT
-
C generates a random number x (1 < x < q) and computes e = g^x mod p. C sends e to S.
https://tools.ietf.org/html/rfc4253#section-8
-
MSG_KEXDH_REPLY
-
S generates a random number y (0 < y < q) and computes f = g^y mod p.
S receives e. It computes K = e^y mod p and H.
-
MSG_KEXINIT
-
Key exchange begins by each side sending the following packet.
https://tools.ietf.org/html/rfc4253#section-7.1
-
MSG_NEWKEYS
-
Key exchange ends by each side sending an SSH_MSG_NEWKEYS message.
This message is sent with the old keys and algorithms. All messages
sent after this message MUST use the new keys and algorithms.
https://tools.ietf.org/html/rfc4253#section-7.3
-
MSG_SERVICE_ACCEPT
-
If the server supports the service (and permits the client to use it),
it MUST respond with the following.
-
MSG_SERVICE_REQUEST
-
After the key exchange, the client requests a service.
The service is identified by a name.
-
MSG_USERAUTH_FAILURE
-
If the server rejects the authentication request, it MUST respond with the following:
https://tools.ietf.org/html/rfc4252#section-5.1
-
MSG_USERAUTH_INFO_REQUEST
-
https://tools.ietf.org/html/rfc4256#section-3.1
-
MSG_USERAUTH_INFO_RESPONSE
-
https://tools.ietf.org/html/rfc4256#section-3.4
-
MSG_USERAUTH_REQUEST
-
https://tools.ietf.org/html/rfc4252#section-5
-
MSG_USERAUTH_SUCCESS
-
When the server accepts authentication, it MUST respond with the following:
-
SSHMessage
-
Binary Packet Protocol. https://tools.ietf.org/html/rfc4253#section-6