mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-04 20:30:38 +09:00
Compare commits
1 Commits
libssh-0.1
...
master-fix
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8daf03c564 |
@@ -1,18 +0,0 @@
|
|||||||
root = true
|
|
||||||
|
|
||||||
[*]
|
|
||||||
charset = utf-8
|
|
||||||
max_line_length = 80
|
|
||||||
end_of_line = lf
|
|
||||||
trim_trailing_whitespace = true
|
|
||||||
insert_final_newline = true
|
|
||||||
|
|
||||||
[*.{c,h}]
|
|
||||||
indent_style = space
|
|
||||||
indent_size = 4
|
|
||||||
tab_width = 4
|
|
||||||
|
|
||||||
[{CMakeLists.txt,*.cmake}]
|
|
||||||
indent_style = space
|
|
||||||
indent_size = 4
|
|
||||||
tab_width = 4
|
|
||||||
3
.gitignore
vendored
3
.gitignore
vendored
@@ -4,9 +4,6 @@
|
|||||||
*.swp
|
*.swp
|
||||||
*~$
|
*~$
|
||||||
cscope.*
|
cscope.*
|
||||||
compile_commands.json
|
|
||||||
/.cache
|
|
||||||
/.clangd
|
|
||||||
tags
|
tags
|
||||||
/build
|
/build
|
||||||
/obj*
|
/obj*
|
||||||
|
|||||||
855
.gitlab-ci.yml
855
.gitlab-ci.yml
@@ -1,528 +1,467 @@
|
|||||||
---
|
|
||||||
variables:
|
variables:
|
||||||
BUILD_IMAGES_PROJECT: libssh/build-images
|
BUILD_IMAGES_PROJECT: libssh/build-images
|
||||||
CENTOS7_BUILD: buildenv-centos7
|
|
||||||
CENTOS9_BUILD: buildenv-c9s
|
|
||||||
COVERITY_BUILD: buildenv-coverity
|
|
||||||
FEDORA_BUILD: buildenv-fedora
|
FEDORA_BUILD: buildenv-fedora
|
||||||
MINGW_BUILD: buildenv-mingw
|
CENTOS7_BUILD: buildenv-centos7
|
||||||
TUMBLEWEED_BUILD: buildenv-tumbleweed
|
TUMBLEWEED_BUILD: buildenv-tumbleweed
|
||||||
UBUNTU_BUILD: buildenv-ubuntu
|
MINGW_BUILD: buildenv-mingw
|
||||||
ALPINE_BUILD: buildenv-alpine
|
DEBIAN_CROSS_BUILD: buildenv-debian-cross
|
||||||
|
|
||||||
stages:
|
# torture_auth fails on centos7 docker images, so we don't use -DCLIENT_TESTING=ON
|
||||||
- build
|
centos7/openssl_1.0.x/x86_64:
|
||||||
- test
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$CENTOS7_BUILD
|
||||||
- analysis
|
|
||||||
|
|
||||||
.build:
|
|
||||||
stage: build
|
|
||||||
variables:
|
|
||||||
CMAKE_DEFAULT_OPTIONS: "-DCMAKE_BUILD_TYPE=RelWithDebInfo -DPICKY_DEVELOPER=ON"
|
|
||||||
CMAKE_BUILD_OPTIONS: "-DWITH_BLOWFISH_CIPHER=ON -DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON -DWITH_DEBUG_CRYPTO=ON -DWITH_DEBUG_PACKET=ON -DWITH_DEBUG_CALLTRACE=ON -DWITH_DSA=ON"
|
|
||||||
CMAKE_TEST_OPTIONS: "-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON -DWITH_BENCHMARKS=ON"
|
|
||||||
CMAKE_OPTIONS: $CMAKE_DEFAULT_OPTIONS $CMAKE_BUILD_OPTIONS $CMAKE_TEST_OPTIONS
|
|
||||||
before_script: &build
|
|
||||||
- uname -a
|
|
||||||
- cat /etc/os-release
|
|
||||||
- mount
|
|
||||||
- df -h
|
|
||||||
- cat /proc/swaps
|
|
||||||
- free -h
|
|
||||||
- mkdir -p obj && cd obj
|
|
||||||
script:
|
script:
|
||||||
- cmake $CMAKE_OPTIONS $CMAKE_ADDITIONAL_OPTIONS .. &&
|
- mkdir -p obj && cd obj && cmake3
|
||||||
make -j$(nproc) &&
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
make -j$(nproc) install
|
-DPICKY_DEVELOPER=ON
|
||||||
# Do not use after_script as it does not make the targets fail
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
tags:
|
tags:
|
||||||
- shared
|
- shared
|
||||||
except:
|
except:
|
||||||
- tags
|
- tags
|
||||||
artifacts:
|
artifacts:
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
when: on_failure
|
when: on_failure
|
||||||
paths:
|
paths:
|
||||||
- obj/
|
- obj/
|
||||||
|
|
||||||
.tests:
|
fedora/openssl_1.1.x/x86_64:
|
||||||
extends: .build
|
|
||||||
stage: test
|
|
||||||
# This is needed to prevent passing artifacts from previous stages
|
|
||||||
dependencies: []
|
|
||||||
script:
|
|
||||||
- cmake $CMAKE_OPTIONS $CMAKE_ADDITIONAL_OPTIONS .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
# Do not use after_script as it does not make the targets fail
|
|
||||||
|
|
||||||
.fedora:
|
|
||||||
extends: .tests
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: -DWITH_PKCS11_URI=ON
|
|
||||||
|
|
||||||
.tumbleweed:
|
|
||||||
extends: .tests
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# CentOS builds #
|
|
||||||
###############################################################################
|
|
||||||
# pkd tests fail on CentOS7 docker images, so we don't use -DSERVER_TESTING=ON
|
|
||||||
centos7/openssl_1.0.x/x86_64:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$CENTOS7_BUILD
|
|
||||||
extends: .tests
|
|
||||||
script:
|
|
||||||
- cmake3 $CMAKE_OPTIONS .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
centos9s/openssl_3.0.x/x86_64:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$CENTOS9_BUILD
|
|
||||||
extends: .tests
|
|
||||||
script:
|
|
||||||
- export OPENSSL_ENABLE_SHA1_SIGNATURES=1
|
|
||||||
- cmake3 $CMAKE_OPTIONS .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Fedora builds #
|
|
||||||
###############################################################################
|
|
||||||
fedora/build:
|
|
||||||
extends: .build
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
|
||||||
|
|
||||||
fedora/docs:
|
|
||||||
extends: .build
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
script:
|
script:
|
||||||
- cmake .. && make docs
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
fedora/ninja:
|
-DPICKY_DEVELOPER=ON
|
||||||
extends: .fedora
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
script:
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
- cmake -G Ninja $CMAKE_OPTIONS ../ && ninja && ninja test
|
tags:
|
||||||
|
- shared
|
||||||
fedora/openssl_3.0.x/x86_64:
|
except:
|
||||||
extends: .fedora
|
- tags
|
||||||
|
artifacts:
|
||||||
fedora/openssl_3.0.x/x86_64/fips:
|
expire_in: 1 week
|
||||||
extends: .fedora
|
when: on_failure
|
||||||
before_script:
|
paths:
|
||||||
- echo "# userspace fips" > /etc/system-fips
|
- obj/
|
||||||
# We do not need the kernel part, but in case we ever do:
|
|
||||||
# mkdir -p /var/tmp/userspace-fips
|
|
||||||
# echo 1 > /var/tmp/userspace-fips/fips_enabled
|
|
||||||
# mount --bind /var/tmp/userspace-fips/fips_enabled \
|
|
||||||
# /proc/sys/crypto/fips_enabled
|
|
||||||
- update-crypto-policies --show
|
|
||||||
- update-crypto-policies --set FIPS
|
|
||||||
- update-crypto-policies --show
|
|
||||||
- mkdir -p obj && cd obj && cmake
|
|
||||||
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
|
||||||
-DPICKY_DEVELOPER=ON
|
|
||||||
-DWITH_BLOWFISH_CIPHER=ON
|
|
||||||
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
|
||||||
-DWITH_DEBUG_CRYPTO=ON -DWITH_DEBUG_PACKET=ON -DWITH_DEBUG_CALLTRACE=ON
|
|
||||||
-DWITH_DSA=ON
|
|
||||||
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON ..
|
|
||||||
script:
|
|
||||||
- cmake $CMAKE_OPTIONS .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
OPENSSL_FORCE_FIPS_MODE=1 ctest --output-on-failure
|
|
||||||
|
|
||||||
fedora/openssl_3.0.x/x86_64/minimal:
|
|
||||||
extends: .fedora
|
|
||||||
variables:
|
|
||||||
script:
|
|
||||||
- cmake $CMAKE_DEFAULT_OPTIONS
|
|
||||||
-DWITH_SFTP=OFF
|
|
||||||
-DWITH_SERVER=OFF
|
|
||||||
-DWITH_ZLIB=OFF
|
|
||||||
-DWITH_PCAP=OFF
|
|
||||||
-DWITH_DSA=OFF
|
|
||||||
-DUNIT_TESTING=ON
|
|
||||||
-DCLIENT_TESTING=ON
|
|
||||||
-DWITH_GEX=OFF .. &&
|
|
||||||
make -j$(nproc)
|
|
||||||
|
|
||||||
# Address sanitizer doesn't mix well with LD_PRELOAD used in the testsuite
|
# Address sanitizer doesn't mix well with LD_PRELOAD used in the testsuite
|
||||||
# so, this is only enabled for unit tests right now.
|
# so, this is only enabled for unit tests right now.
|
||||||
# TODO: add -DCLIENT_TESTING=ON -DSERVER_TESTING=ON
|
# TODO: add -DCLIENT_TESTING=ON -DSERVER_TESTING=ON
|
||||||
fedora/address-sanitizer:
|
fedora/address-sanitizer:
|
||||||
extends: .fedora
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
stage: analysis
|
|
||||||
script:
|
script:
|
||||||
- cmake
|
- mkdir -p obj && cd obj && cmake
|
||||||
-DCMAKE_BUILD_TYPE=AddressSanitizer
|
-DCMAKE_BUILD_TYPE=AddressSanitizer
|
||||||
-DCMAKE_C_COMPILER=clang
|
-DPICKY_DEVELOPER=ON
|
||||||
-DCMAKE_CXX_COMPILER=clang++
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
-DPICKY_DEVELOPER=ON
|
-DUNIT_TESTING=ON .. &&
|
||||||
$CMAKE_BUILD_OPTIONS
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
-DUNIT_TESTING=ON
|
tags:
|
||||||
-DFUZZ_TESTING=ON .. &&
|
- shared
|
||||||
make -j$(nproc) &&
|
except:
|
||||||
ctest --output-on-failure
|
- tags
|
||||||
|
artifacts:
|
||||||
# This is disabled as it report OpenSSL issues
|
expire_in: 1 week
|
||||||
# It also has the same issues with cwrap as AddressSanitizer
|
when: on_failure
|
||||||
.fedora/memory-sanitizer:
|
paths:
|
||||||
extends: .fedora
|
- obj/
|
||||||
stage: analysis
|
|
||||||
script:
|
|
||||||
- cmake
|
|
||||||
-DCMAKE_BUILD_TYPE=MemorySanitizer
|
|
||||||
-DCMAKE_C_COMPILER=clang
|
|
||||||
-DCMAKE_CXX_COMPILER=clang++
|
|
||||||
-DPICKY_DEVELOPER=ON
|
|
||||||
$CMAKE_BUILD_OPTIONS
|
|
||||||
-DUNIT_TESTING=ON
|
|
||||||
-DFUZZ_TESTING=ON .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
fedora/undefined-sanitizer:
|
fedora/undefined-sanitizer:
|
||||||
extends: .fedora
|
|
||||||
stage: analysis
|
|
||||||
script:
|
|
||||||
- cmake
|
|
||||||
-DCMAKE_BUILD_TYPE=UndefinedSanitizer
|
|
||||||
-DCMAKE_C_COMPILER=clang
|
|
||||||
-DCMAKE_CXX_COMPILER=clang++
|
|
||||||
-DPICKY_DEVELOPER=ON
|
|
||||||
$CMAKE_BUILD_OPTIONS
|
|
||||||
-DUNIT_TESTING=ON
|
|
||||||
-DFUZZ_TESTING=ON .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
fedora/libgcrypt/x86_64:
|
|
||||||
extends: .fedora
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: "-DWITH_GCRYPT=ON -DWITH_DEBUG_CRYPTO=ON"
|
|
||||||
|
|
||||||
fedora/mbedtls/x86_64:
|
|
||||||
extends: .fedora
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: "-DWITH_MBEDTLS=ON -DWITH_DEBUG_CRYPTO=ON -DWITH_DSA=OFF"
|
|
||||||
|
|
||||||
# Unit testing only, no client and pkd testing, because cwrap is not available
|
|
||||||
# for MinGW
|
|
||||||
fedora/mingw64:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$MINGW_BUILD
|
|
||||||
extends: .tests
|
|
||||||
script:
|
|
||||||
- export WINEPATH=/usr/x86_64-w64-mingw32/sys-root/mingw/bin
|
|
||||||
- export WINEDEBUG=-all
|
|
||||||
- mingw64-cmake $CMAKE_DEFAULT_OPTIONS
|
|
||||||
-DWITH_SFTP=ON
|
|
||||||
-DWITH_SERVER=ON
|
|
||||||
-DWITH_ZLIB=ON
|
|
||||||
-DWITH_PCAP=ON
|
|
||||||
-DUNIT_TESTING=ON .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
# Unit testing only, no client and pkd testing, because cwrap is not available
|
|
||||||
# for MinGW
|
|
||||||
fedora/mingw32:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$MINGW_BUILD
|
|
||||||
extends: .tests
|
|
||||||
script:
|
|
||||||
- export WINEPATH=/usr/i686-w64-mingw32/sys-root/mingw/bin
|
|
||||||
- export WINEDEBUG=-all
|
|
||||||
- mingw32-cmake $CMAKE_DEFAULT_OPTIONS
|
|
||||||
-DWITH_SFTP=ON
|
|
||||||
-DWITH_SERVER=ON
|
|
||||||
-DWITH_ZLIB=ON
|
|
||||||
-DWITH_PCAP=ON
|
|
||||||
-DUNIT_TESTING=ON .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Fedora csbuild #
|
|
||||||
###############################################################################
|
|
||||||
.csbuild:
|
|
||||||
stage: analysis
|
|
||||||
variables:
|
|
||||||
GIT_DEPTH: "100"
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
before_script:
|
script:
|
||||||
- |
|
- mkdir -p obj && cd obj && cmake
|
||||||
if [[ -z "$CI_COMMIT_BEFORE_SHA" ]]; then
|
-DCMAKE_C_FLAGS="-fsanitize=undefined -fsanitize=null -fsanitize=alignment -fno-sanitize-recover"
|
||||||
export CI_COMMIT_BEFORE_SHA=$(git rev-parse "${CI_COMMIT_SHA}~20")
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
fi
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON ..
|
||||||
|
&& make -j$(nproc) && ctest --output-on-failure
|
||||||
# Check if the commit exists in this branch
|
|
||||||
# This is not the case for a force push
|
|
||||||
git branch --contains $CI_COMMIT_BEFORE_SHA 2>/dev/null || export CI_COMMIT_BEFORE_SHA=$(git rev-parse "${CI_COMMIT_SHA}~20")
|
|
||||||
|
|
||||||
export CI_COMMIT_RANGE="$CI_COMMIT_BEFORE_SHA..$CI_COMMIT_SHA"
|
|
||||||
tags:
|
tags:
|
||||||
- shared
|
- shared
|
||||||
except:
|
except:
|
||||||
- tags
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
fedora/csbuild:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
if [[ -z "$CI_COMMIT_BEFORE_SHA" ]]; then
|
||||||
|
export CI_COMMIT_BEFORE_SHA=$(git rev-parse "${CI_COMMIT_SHA}~20")
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check if the commit exists in this branch
|
||||||
|
# This is not the case for a force push
|
||||||
|
git branch --contains $CI_COMMIT_BEFORE_SHA 2>/dev/null || export CI_COMMIT_BEFORE_SHA=$(git rev-parse "${CI_COMMIT_SHA}~20")
|
||||||
|
|
||||||
|
export CI_COMMIT_RANGE="$CI_COMMIT_BEFORE_SHA..$CI_COMMIT_SHA"
|
||||||
|
|
||||||
|
- csbuild
|
||||||
|
--build-dir=obj-csbuild
|
||||||
|
--prep-cmd="cmake -DCMAKE_BUILD_TYPE=Debug -DPICKY_DEVELOPER=ON -DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON -DFUZZ_TESTING=ON @SRCDIR@"
|
||||||
|
--build-cmd "make clean && make -j$(nproc)"
|
||||||
|
--git-commit-range $CI_COMMIT_RANGE
|
||||||
|
--color
|
||||||
|
--print-current --print-fixed
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
artifacts:
|
artifacts:
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
when: on_failure
|
when: on_failure
|
||||||
paths:
|
paths:
|
||||||
- obj-csbuild/
|
- obj-csbuild/
|
||||||
|
|
||||||
fedora/csbuild/openssl_3.0.x:
|
# That is a specific runner that we cannot enable universally.
|
||||||
extends: .csbuild
|
# We restrict it to builds under the $BUILD_IMAGES_PROJECT project.
|
||||||
|
freebsd/x86_64:
|
||||||
|
image:
|
||||||
script:
|
script:
|
||||||
- csbuild
|
- mkdir -p obj && cd obj && cmake
|
||||||
--build-dir=obj-csbuild
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
--build-cmd "rm -rf CMakeFiles CMakeCache.txt && cmake -DCMAKE_BUILD_TYPE=Debug -DPICKY_DEVELOPER=ON -DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON -DFUZZ_TESTING=ON -DWITH_DSA=ON @SRCDIR@ && make clean && make -j$(nproc)"
|
-DPICKY_DEVELOPER=ON
|
||||||
--git-commit-range $CI_COMMIT_RANGE
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
--color
|
-DUNIT_TESTING=ON .. &&
|
||||||
--print-current --print-fixed
|
make && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- freebsd
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
only:
|
||||||
|
- branches@libssh/libssh-mirror
|
||||||
|
- branches@cryptomilk/libssh-mirror
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
fedora/csbuild/libgcrypt:
|
fedora/libgcrypt/x86_64:
|
||||||
extends: .csbuild
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
script:
|
script:
|
||||||
- csbuild
|
- mkdir -p obj && cd obj && cmake
|
||||||
--build-dir=obj-csbuild
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
--build-cmd "rm -rf CMakeFiles CMakeCache.txt && cmake -DCMAKE_BUILD_TYPE=Debug -DPICKY_DEVELOPER=ON -DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON -DFUZZ_TESTING=ON -DWITH_GCRYPT=ON -DWITH_DSA=ON @SRCDIR@ && make clean && make -j$(nproc)"
|
-DPICKY_DEVELOPER=ON
|
||||||
--git-commit-range $CI_COMMIT_RANGE
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
--color
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON
|
||||||
--print-current --print-fixed
|
-DWITH_GCRYPT=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
fedora/csbuild/mbedtls:
|
fedora/mbedtls/x86_64:
|
||||||
extends: .csbuild
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$FEDORA_BUILD
|
||||||
script:
|
script:
|
||||||
- csbuild
|
- mkdir -p obj && cd obj && cmake
|
||||||
--build-dir=obj-csbuild
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
--build-cmd "rm -rf CMakeFiles CMakeCache.txt && cmake -DCMAKE_BUILD_TYPE=Debug -DPICKY_DEVELOPER=ON -DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON -DFUZZ_TESTING=ON -DWITH_MBEDTLS=ON @SRCDIR@ && make clean && make -j$(nproc)"
|
-DPICKY_DEVELOPER=ON
|
||||||
--git-commit-range $CI_COMMIT_RANGE
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
--color
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON
|
||||||
--print-current --print-fixed
|
-DWITH_MBEDTLS=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
# Unit testing only, no client and pkd testing, because cwrap is not available
|
||||||
###############################################################################
|
# for MinGW
|
||||||
# Ubuntu builds #
|
fedora/mingw64:
|
||||||
###############################################################################
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$MINGW_BUILD
|
||||||
ubuntu/openssl_1.1.x/x86_64:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$UBUNTU_BUILD
|
|
||||||
extends: .tests
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Alpine builds #
|
|
||||||
###############################################################################
|
|
||||||
alpine/musl:
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$ALPINE_BUILD
|
|
||||||
extends: .tests
|
|
||||||
script:
|
script:
|
||||||
- cmake $CMAKE_DEFAULT_OPTIONS
|
- export WINEPATH=/usr/x86_64-w64-mingw32/sys-root/mingw/bin
|
||||||
-DWITH_SFTP=ON
|
- export WINEDEBUG=-all
|
||||||
-DWITH_SERVER=ON
|
- mkdir -p obj && cd obj && mingw64-cmake
|
||||||
-DWITH_ZLIB=ON
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
-DWITH_PCAP=ON
|
-DPICKY_DEVELOPER=ON
|
||||||
-DUNIT_TESTING=ON .. &&
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
make -j$(nproc) &&
|
-DUNIT_TESTING=ON .. &&
|
||||||
ctest --output-on-failure
|
make -j$(nproc) &&
|
||||||
|
ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
# Unit testing only, no client and pkd testing, because cwrap is not available
|
||||||
|
# for MinGW
|
||||||
|
fedora/mingw32:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$MINGW_BUILD
|
||||||
|
script:
|
||||||
|
- export WINEPATH=/usr/i686-w64-mingw32/sys-root/mingw/bin
|
||||||
|
- export WINEDEBUG=-all
|
||||||
|
- mkdir -p obj && cd obj && mingw32-cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) &&
|
||||||
|
ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
.Debian.cross.template: &Debian_cross_template
|
||||||
|
stage: test
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$DEBIAN_CROSS_BUILD
|
||||||
|
script:
|
||||||
|
- build=$(dpkg-architecture -qDEB_HOST_GNU_TYPE)
|
||||||
|
- host="${CI_JOB_NAME#*.cross.}"
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_C_COMPILER="$(which $host-gcc)"
|
||||||
|
-DCMAKE_CXX_COMPILER="$(which $host-g++)"
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DUNIT_TESTING=ON -DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON
|
||||||
|
-DWITH_PCAP=ON .. &&
|
||||||
|
make -j$(nproc) &&
|
||||||
|
ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
Debian.cross.mips-linux-gnu:
|
||||||
|
<<: *Debian_cross_template
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Tumbleweed builds #
|
|
||||||
###############################################################################
|
|
||||||
tumbleweed/openssl_1.1.x/x86_64/gcc:
|
tumbleweed/openssl_1.1.x/x86_64/gcc:
|
||||||
extends: .tumbleweed
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: "-DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config"
|
|
||||||
|
|
||||||
tumbleweed/openssl_1.1.x/x86/gcc:
|
|
||||||
extends: .tumbleweed
|
|
||||||
script:
|
|
||||||
- cmake
|
|
||||||
-DCMAKE_TOOLCHAIN_FILE=../cmake/Toolchain-cross-m32.cmake
|
|
||||||
$CMAKE_DEFAULT_OPTIONS
|
|
||||||
-DWITH_SFTP=ON
|
|
||||||
-DWITH_SERVER=ON
|
|
||||||
-DWITH_ZLIB=ON
|
|
||||||
-DWITH_PCAP=ON
|
|
||||||
-DWITH_DSA=ON
|
|
||||||
-DUNIT_TESTING=ON ..
|
|
||||||
|
|
||||||
tumbleweed/openssl_1.1.x/x86_64/gcc7:
|
|
||||||
extends: .tumbleweed
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: "-DCMAKE_C_COMPILER=gcc-7 -DCMAKE_CXX_COMPILER=g++-7 -DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config"
|
|
||||||
|
|
||||||
tumbleweed/openssl_1.1.x/x86/gcc7:
|
|
||||||
extends: .tumbleweed
|
|
||||||
script:
|
|
||||||
- cmake
|
|
||||||
-DCMAKE_TOOLCHAIN_FILE=../cmake/Toolchain-cross-m32.cmake
|
|
||||||
-DCMAKE_C_COMPILER=gcc-7 -DCMAKE_CXX_COMPILER=g++-7
|
|
||||||
$CMAKE_DEFAULT_OPTIONS
|
|
||||||
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
|
||||||
-DWITH_DSA=ON
|
|
||||||
-DUNIT_TESTING=ON .. &&
|
|
||||||
make -j$(nproc) &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
|
|
||||||
tumbleweed/openssl_1.1.x/x86_64/clang:
|
|
||||||
extends: .tumbleweed
|
|
||||||
variables:
|
|
||||||
CMAKE_ADDITIONAL_OPTIONS: "-DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config"
|
|
||||||
|
|
||||||
tumbleweed/static-analysis:
|
|
||||||
extends: .tests
|
|
||||||
stage: analysis
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
script:
|
script:
|
||||||
- export CCC_CC=clang
|
- mkdir -p obj && cd obj && cmake
|
||||||
- export CCC_CXX=clang++
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
- scan-build cmake
|
-DPICKY_DEVELOPER=ON
|
||||||
-DCMAKE_BUILD_TYPE=Debug
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
-DCMAKE_C_COMPILER=clang
|
-DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config
|
||||||
-DCMAKE_CXX_COMPILER=clang++
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
-DPICKY_DEVELOPER=ON
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
$CMAKE_BUILD_OPTIONS
|
tags:
|
||||||
$CMAKE_TEST_OPTIONS .. &&
|
- shared
|
||||||
scan-build --status-bugs -o scan make -j$(nproc)
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/openssl_1.1.x/x86/gcc:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_TOOLCHAIN_FILE=../cmake/Toolchain-cross-m32.cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/openssl_1.1.x/x86_64/gcc7:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_C_COMPILER=gcc-7 -DCMAKE_CXX_COMPILER=g++-7
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config
|
||||||
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/openssl_1.1.x/x86/gcc7:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_TOOLCHAIN_FILE=../cmake/Toolchain-cross-m32.cmake
|
||||||
|
-DCMAKE_C_COMPILER=gcc-7 -DCMAKE_CXX_COMPILER=g++-7
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/openssl_1.1.x/x86_64/clang:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
||||||
|
-DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DKRB5_CONFIG=/usr/lib/mit/bin/krb5-config
|
||||||
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/docs:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake .. && make docs
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/undefined-sanitizer:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- mkdir -p obj && cd obj && cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=UndefinedSanitizer
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
|
make -j$(nproc) && ctest --output-on-failure
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
|
artifacts:
|
||||||
|
expire_in: 1 week
|
||||||
|
when: on_failure
|
||||||
|
paths:
|
||||||
|
- obj/
|
||||||
|
|
||||||
|
tumbleweed/static-analysis:
|
||||||
|
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$TUMBLEWEED_BUILD
|
||||||
|
script:
|
||||||
|
- export CCC_CC=clang
|
||||||
|
- export CCC_CXX=clang++
|
||||||
|
- mkdir -p obj && cd obj && scan-build cmake
|
||||||
|
-DCMAKE_BUILD_TYPE=Debug
|
||||||
|
-DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++
|
||||||
|
-DPICKY_DEVELOPER=ON
|
||||||
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
|
-DUNIT_TESTING=ON -DCLIENT_TESTING=ON -DSERVER_TESTING=ON .. &&
|
||||||
|
scan-build --status-bugs -o scan make -j$(nproc)
|
||||||
|
tags:
|
||||||
|
- shared
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
artifacts:
|
artifacts:
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
when: on_failure
|
when: on_failure
|
||||||
paths:
|
paths:
|
||||||
- obj/scan
|
- obj/scan
|
||||||
|
|
||||||
|
visualstudio/x86_64:
|
||||||
###############################################################################
|
script:
|
||||||
# FreeBSD builds #
|
- $env:VCPKG_DEFAULT_TRIPLET="x64-windows"
|
||||||
###############################################################################
|
- cd obj
|
||||||
# That is a specific runner that we cannot enable universally.
|
- cmake
|
||||||
# We restrict it to builds under the $BUILD_IMAGES_PROJECT project.
|
-A x64
|
||||||
freebsd/x86_64:
|
-DCMAKE_TOOLCHAIN_FILE="$env:VCPKG_TOOLCHAIN_FILE"
|
||||||
image:
|
|
||||||
extends: .tests
|
|
||||||
before_script:
|
|
||||||
- mkdir -p obj && cd obj && cmake
|
|
||||||
-DCMAKE_BUILD_TYPE=RelWithDebInfo
|
|
||||||
-DPICKY_DEVELOPER=ON
|
-DPICKY_DEVELOPER=ON
|
||||||
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
-DUNIT_TESTING=ON ..
|
-DUNIT_TESTING=ON ..
|
||||||
script:
|
- cmake --build .
|
||||||
- cmake $CMAKE_DEFAULT_OPTIONS
|
- ctest --output-on-failure
|
||||||
-DWITH_SFTP=ON
|
|
||||||
-DWITH_SERVER=ON
|
|
||||||
-DWITH_ZLIB=ON
|
|
||||||
-DWITH_PCAP=ON
|
|
||||||
-DUNIT_TESTING=ON .. &&
|
|
||||||
make &&
|
|
||||||
ctest --output-on-failure
|
|
||||||
tags:
|
tags:
|
||||||
- private
|
- vs2017
|
||||||
- freebsd
|
- windows
|
||||||
only:
|
|
||||||
- branches@libssh/libssh-mirror
|
|
||||||
- branches@cryptomilk/libssh-mirror
|
|
||||||
- branches@jjelen/libssh-mirror
|
|
||||||
- branches@marco.fortina/libssh-mirror
|
|
||||||
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Visual Studio builds #
|
|
||||||
###############################################################################
|
|
||||||
.vs:
|
|
||||||
stage: test
|
|
||||||
cache:
|
|
||||||
key: vcpkg.${CI_JOB_NAME}
|
|
||||||
paths:
|
|
||||||
- .vcpkg
|
|
||||||
variables:
|
|
||||||
ErrorActionPreference: STOP
|
|
||||||
script:
|
|
||||||
- cmake --build .
|
|
||||||
- ctest --output-on-failure
|
|
||||||
tags:
|
|
||||||
- windows
|
|
||||||
- shared-windows
|
|
||||||
except:
|
except:
|
||||||
- tags
|
- tags
|
||||||
|
only:
|
||||||
|
- branches@libssh/libssh-mirror
|
||||||
|
- branches@ansasaki/libssh-mirror
|
||||||
|
- branches@cryptomilk/libssh-mirror
|
||||||
artifacts:
|
artifacts:
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
when: on_failure
|
when: on_failure
|
||||||
paths:
|
paths:
|
||||||
- obj/
|
- obj/
|
||||||
before_script:
|
|
||||||
- choco install --no-progress -y cmake
|
|
||||||
- $env:Path += ';C:\Program Files\CMake\bin'
|
|
||||||
- If (!(test-path .vcpkg\archives)) { mkdir -p .vcpkg\archives }
|
|
||||||
- $env:VCPKG_DEFAULT_BINARY_CACHE="$PWD\.vcpkg\archives"
|
|
||||||
- echo $env:VCPKG_DEFAULT_BINARY_CACHE
|
|
||||||
- $env:VCPKG_DEFAULT_TRIPLET="$TRIPLET-windows"
|
|
||||||
- vcpkg install cmocka
|
|
||||||
- vcpkg install openssl
|
|
||||||
- vcpkg install zlib
|
|
||||||
- vcpkg integrate install
|
|
||||||
- mkdir -p obj; if ($?) {cd obj}; if (! $?) {exit 1}
|
|
||||||
- cmake
|
|
||||||
-A $PLATFORM
|
|
||||||
-DCMAKE_TOOLCHAIN_FILE=C:/vcpkg/scripts/buildsystems/vcpkg.cmake
|
|
||||||
-DPICKY_DEVELOPER=ON
|
|
||||||
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
|
||||||
-DUNIT_TESTING=ON ..
|
|
||||||
|
|
||||||
visualstudio/x86_64:
|
|
||||||
extends: .vs
|
|
||||||
variables:
|
|
||||||
PLATFORM: "x64"
|
|
||||||
TRIPLET: "x64"
|
|
||||||
|
|
||||||
visualstudio/x86:
|
visualstudio/x86:
|
||||||
extends: .vs
|
|
||||||
variables:
|
|
||||||
PLATFORM: "win32"
|
|
||||||
TRIPLET: "x86"
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# Coverity #
|
|
||||||
###############################################################################
|
|
||||||
#
|
|
||||||
# git push -o ci.variable="COVERITY_SCAN_TOKEN=XXXXXX" \
|
|
||||||
# -o ci.variable="COVERITY_SCAN_PROJECT_NAME=XXXXXX" \
|
|
||||||
# -o ci.variable="COVERITY_SCAN_EMAIL=XXXXXX" \
|
|
||||||
# -f gitlab
|
|
||||||
|
|
||||||
coverity:
|
|
||||||
stage: analysis
|
|
||||||
image: $CI_REGISTRY/$BUILD_IMAGES_PROJECT:$COVERITY_BUILD
|
|
||||||
script:
|
script:
|
||||||
- mkdir obj && cd obj
|
- $env:VCPKG_DEFAULT_TRIPLET="x86-windows"
|
||||||
- wget https://scan.coverity.com/download/linux64 --post-data "token=$COVERITY_SCAN_TOKEN&project=$COVERITY_SCAN_PROJECT_NAME" -O /tmp/coverity_tool.tgz
|
- cd obj
|
||||||
- tar xf /tmp/coverity_tool.tgz
|
- cmake
|
||||||
- cmake -DCMAKE_BUILD_TYPE=Debug $CMAKE_BUILD_OPTIONS $CMAKE_TEST_OPTIONS ..
|
-DCMAKE_TOOLCHAIN_FILE="$env:VCPKG_TOOLCHAIN_FILE"
|
||||||
- cov-analysis-linux64-*/bin/cov-build --dir cov-int make -j$(nproc)
|
-DPICKY_DEVELOPER=ON
|
||||||
- tar czf cov-int.tar.gz cov-int
|
-DWITH_SFTP=ON -DWITH_SERVER=ON -DWITH_ZLIB=ON -DWITH_PCAP=ON
|
||||||
- curl
|
-DUNIT_TESTING=ON ..
|
||||||
--form token=$COVERITY_SCAN_TOKEN
|
- cmake --build .
|
||||||
--form email=$COVERITY_SCAN_EMAIL
|
- ctest --output-on-failure
|
||||||
--form file=@cov-int.tar.gz
|
|
||||||
--form version="`git describe --tags`"
|
|
||||||
--form description="CI build"
|
|
||||||
https://scan.coverity.com/builds?project=$COVERITY_SCAN_PROJECT_NAME
|
|
||||||
tags:
|
tags:
|
||||||
- shared
|
- vs2017
|
||||||
|
- windows
|
||||||
|
except:
|
||||||
|
- tags
|
||||||
only:
|
only:
|
||||||
refs:
|
- branches@libssh/libssh-mirror
|
||||||
- master
|
- branches@ansasaki/libssh-mirror
|
||||||
- schedules
|
- branches@cryptomilk/libssh-mirror
|
||||||
variables:
|
|
||||||
- $COVERITY_SCAN_TOKEN != null
|
|
||||||
- $COVERITY_SCAN_PROJECT_NAME != null
|
|
||||||
- $COVERITY_SCAN_EMAIL != null
|
|
||||||
artifacts:
|
artifacts:
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
when: on_failure
|
when: on_failure
|
||||||
paths:
|
paths:
|
||||||
- obj/cov-int/*.txt
|
- obj/
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
cmake_minimum_required(VERSION 3.3.0)
|
cmake_minimum_required(VERSION 3.3.0)
|
||||||
cmake_policy(SET CMP0048 NEW)
|
cmake_policy(SET CMP0048 NEW)
|
||||||
|
|
||||||
# Specify search path for CMake modules to be loaded by include()
|
# Specify search path for CMake modules to be loaded by include()
|
||||||
# and find_package()
|
# and find_package()
|
||||||
list(APPEND CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake/Modules")
|
list(APPEND CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake/Modules")
|
||||||
|
|
||||||
@@ -10,7 +10,7 @@ list(APPEND CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake/Modules")
|
|||||||
include(DefineCMakeDefaults)
|
include(DefineCMakeDefaults)
|
||||||
include(DefineCompilerFlags)
|
include(DefineCompilerFlags)
|
||||||
|
|
||||||
project(libssh VERSION 0.10.2 LANGUAGES C)
|
project(libssh VERSION 0.8.90 LANGUAGES C)
|
||||||
|
|
||||||
# global needed variable
|
# global needed variable
|
||||||
set(APPLICATION_NAME ${PROJECT_NAME})
|
set(APPLICATION_NAME ${PROJECT_NAME})
|
||||||
@@ -22,16 +22,16 @@ set(APPLICATION_NAME ${PROJECT_NAME})
|
|||||||
# Increment AGE. Set REVISION to 0
|
# Increment AGE. Set REVISION to 0
|
||||||
# If the source code was changed, but there were no interface changes:
|
# If the source code was changed, but there were no interface changes:
|
||||||
# Increment REVISION.
|
# Increment REVISION.
|
||||||
set(LIBRARY_VERSION "4.9.2")
|
set(LIBRARY_VERSION "4.7.2")
|
||||||
set(LIBRARY_SOVERSION "4")
|
set(LIBRARY_SOVERSION "4")
|
||||||
|
|
||||||
# where to look first for cmake modules, before ${CMAKE_ROOT}/Modules/ is checked
|
# where to look first for cmake modules, before ${CMAKE_ROOT}/Modules/ is checked
|
||||||
|
|
||||||
# add definitions
|
# add definitions
|
||||||
include(DefinePlatformDefaults)
|
include(DefinePlatformDefaults)
|
||||||
|
include(DefineInstallationPaths)
|
||||||
include(DefineOptions.cmake)
|
include(DefineOptions.cmake)
|
||||||
include(CPackConfig.cmake)
|
include(CPackConfig.cmake)
|
||||||
include(GNUInstallDirs)
|
|
||||||
|
|
||||||
include(CompilerChecks.cmake)
|
include(CompilerChecks.cmake)
|
||||||
|
|
||||||
@@ -58,14 +58,8 @@ elseif(WITH_MBEDTLS)
|
|||||||
message(FATAL_ERROR "Could not find mbedTLS")
|
message(FATAL_ERROR "Could not find mbedTLS")
|
||||||
endif (NOT MBEDTLS_FOUND)
|
endif (NOT MBEDTLS_FOUND)
|
||||||
else (WITH_GCRYPT)
|
else (WITH_GCRYPT)
|
||||||
find_package(OpenSSL 1.0.1)
|
find_package(OpenSSL)
|
||||||
if (OPENSSL_FOUND)
|
if (NOT OPENSSL_FOUND)
|
||||||
# On CMake < 3.16, OPENSSL_CRYPTO_LIBRARIES is usually a synonym for OPENSSL_CRYPTO_LIBRARY, but is not defined
|
|
||||||
# when building on Windows outside of Cygwin. We provide the synonym here, if FindOpenSSL didn't define it already.
|
|
||||||
if (NOT DEFINED OPENSSL_CRYPTO_LIBRARIES)
|
|
||||||
set(OPENSSL_CRYPTO_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
|
||||||
endif (NOT DEFINED OPENSSL_CRYPTO_LIBRARIES)
|
|
||||||
else (OPENSSL_FOUND)
|
|
||||||
find_package(GCrypt)
|
find_package(GCrypt)
|
||||||
if (NOT GCRYPT_FOUND)
|
if (NOT GCRYPT_FOUND)
|
||||||
find_package(MbedTLS)
|
find_package(MbedTLS)
|
||||||
@@ -73,7 +67,7 @@ else (WITH_GCRYPT)
|
|||||||
message(FATAL_ERROR "Could not find OpenSSL, GCrypt or mbedTLS")
|
message(FATAL_ERROR "Could not find OpenSSL, GCrypt or mbedTLS")
|
||||||
endif (NOT MBEDTLS_FOUND)
|
endif (NOT MBEDTLS_FOUND)
|
||||||
endif (NOT GCRYPT_FOUND)
|
endif (NOT GCRYPT_FOUND)
|
||||||
endif (OPENSSL_FOUND)
|
endif (NOT OPENSSL_FOUND)
|
||||||
endif(WITH_GCRYPT)
|
endif(WITH_GCRYPT)
|
||||||
|
|
||||||
if (UNIT_TESTING)
|
if (UNIT_TESTING)
|
||||||
@@ -89,13 +83,6 @@ if (WITH_GSSAPI)
|
|||||||
find_package(GSSAPI)
|
find_package(GSSAPI)
|
||||||
endif (WITH_GSSAPI)
|
endif (WITH_GSSAPI)
|
||||||
|
|
||||||
if (WITH_PKCS11_URI)
|
|
||||||
find_package(softhsm)
|
|
||||||
if (NOT SOFTHSM_FOUND)
|
|
||||||
message(SEND_ERROR "Could not find softhsm module!")
|
|
||||||
endif (NOT SOFTHSM_FOUND)
|
|
||||||
endif (WITH_PKCS11_URI)
|
|
||||||
|
|
||||||
if (WITH_NACL)
|
if (WITH_NACL)
|
||||||
find_package(NaCl)
|
find_package(NaCl)
|
||||||
if (NOT NACL_FOUND)
|
if (NOT NACL_FOUND)
|
||||||
@@ -103,9 +90,9 @@ if (WITH_NACL)
|
|||||||
endif (NOT NACL_FOUND)
|
endif (NOT NACL_FOUND)
|
||||||
endif (WITH_NACL)
|
endif (WITH_NACL)
|
||||||
|
|
||||||
if (BSD OR SOLARIS OR OSX OR CYGWIN)
|
if (BSD OR SOLARIS OR OSX)
|
||||||
find_package(Argp)
|
find_package(Argp)
|
||||||
endif (BSD OR SOLARIS OR OSX OR CYGWIN)
|
endif (BSD OR SOLARIS OR OSX)
|
||||||
|
|
||||||
# Disable symbol versioning in non UNIX platforms
|
# Disable symbol versioning in non UNIX platforms
|
||||||
if (UNIX)
|
if (UNIX)
|
||||||
@@ -124,17 +111,17 @@ add_subdirectory(include)
|
|||||||
add_subdirectory(src)
|
add_subdirectory(src)
|
||||||
|
|
||||||
# pkg-config file
|
# pkg-config file
|
||||||
if (UNIX OR MINGW)
|
if (UNIX)
|
||||||
configure_file(libssh.pc.cmake ${CMAKE_CURRENT_BINARY_DIR}/libssh.pc)
|
configure_file(libssh.pc.cmake ${CMAKE_CURRENT_BINARY_DIR}/libssh.pc)
|
||||||
install(
|
install(
|
||||||
FILES
|
FILES
|
||||||
${CMAKE_CURRENT_BINARY_DIR}/libssh.pc
|
${CMAKE_CURRENT_BINARY_DIR}/libssh.pc
|
||||||
DESTINATION
|
DESTINATION
|
||||||
${CMAKE_INSTALL_LIBDIR}/pkgconfig
|
${LIB_INSTALL_DIR}/pkgconfig
|
||||||
COMPONENT
|
COMPONENT
|
||||||
pkgconfig
|
pkgconfig
|
||||||
)
|
)
|
||||||
endif (UNIX OR MINGW)
|
endif (UNIX)
|
||||||
|
|
||||||
# CMake config files
|
# CMake config files
|
||||||
include(CMakePackageConfigHelpers)
|
include(CMakePackageConfigHelpers)
|
||||||
@@ -146,13 +133,21 @@ write_basic_package_version_file(libssh-config-version.cmake
|
|||||||
VERSION ${PROJECT_VERSION}
|
VERSION ${PROJECT_VERSION}
|
||||||
COMPATIBILITY SameMajorVersion)
|
COMPATIBILITY SameMajorVersion)
|
||||||
|
|
||||||
|
# libssh-config.cmake
|
||||||
|
configure_package_config_file(${PROJECT_NAME}-config.cmake.in
|
||||||
|
${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config.cmake
|
||||||
|
INSTALL_DESTINATION ${CMAKE_INSTALL_DIR}/${PROJECT_NAME}
|
||||||
|
PATH_VARS INCLUDE_INSTALL_DIR LIB_INSTALL_DIR)
|
||||||
|
|
||||||
install(
|
install(
|
||||||
FILES
|
FILES
|
||||||
|
${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config.cmake
|
||||||
${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config-version.cmake
|
${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config-version.cmake
|
||||||
DESTINATION
|
DESTINATION
|
||||||
${CMAKE_INSTALL_LIBDIR}/cmake/${PROJECT_NAME}
|
${CMAKE_INSTALL_DIR}/${PROJECT_NAME}
|
||||||
COMPONENT
|
COMPONENT
|
||||||
devel)
|
devel
|
||||||
|
)
|
||||||
|
|
||||||
if (WITH_EXAMPLES)
|
if (WITH_EXAMPLES)
|
||||||
add_subdirectory(examples)
|
add_subdirectory(examples)
|
||||||
@@ -216,12 +211,7 @@ if (WITH_SYMBOL_VERSIONING AND ABIMAP_FOUND)
|
|||||||
endif(UPDATE_ABI)
|
endif(UPDATE_ABI)
|
||||||
endif (WITH_SYMBOL_VERSIONING AND ABIMAP_FOUND)
|
endif (WITH_SYMBOL_VERSIONING AND ABIMAP_FOUND)
|
||||||
|
|
||||||
add_custom_target(dist COMMAND ${CMAKE_MAKE_PROGRAM} package_source DEPENDS ${_SYMBOL_TARGET} VERBATIM)
|
add_custom_target(dist COMMAND ${CMAKE_MAKE_PROGRAM} package_source DEPENDS ${_SYMBOL_TARGET})
|
||||||
|
|
||||||
# Link compile database for clangd
|
|
||||||
execute_process(COMMAND ${CMAKE_COMMAND} -E create_symlink
|
|
||||||
"${CMAKE_BINARY_DIR}/compile_commands.json"
|
|
||||||
"${CMAKE_SOURCE_DIR}/compile_commands.json")
|
|
||||||
|
|
||||||
message(STATUS "********************************************")
|
message(STATUS "********************************************")
|
||||||
message(STATUS "********** ${PROJECT_NAME} build options : **********")
|
message(STATUS "********** ${PROJECT_NAME} build options : **********")
|
||||||
@@ -233,15 +223,10 @@ message(STATUS "libnacl support: ${WITH_NACL}")
|
|||||||
message(STATUS "SFTP support: ${WITH_SFTP}")
|
message(STATUS "SFTP support: ${WITH_SFTP}")
|
||||||
message(STATUS "Server support : ${WITH_SERVER}")
|
message(STATUS "Server support : ${WITH_SERVER}")
|
||||||
message(STATUS "GSSAPI support : ${WITH_GSSAPI}")
|
message(STATUS "GSSAPI support : ${WITH_GSSAPI}")
|
||||||
message(STATUS "GEX support : ${WITH_GEX}")
|
|
||||||
message(STATUS "Support insecure none cipher and MAC : ${WITH_INSECURE_NONE}")
|
|
||||||
message(STATUS "Pcap debugging support : ${WITH_PCAP}")
|
message(STATUS "Pcap debugging support : ${WITH_PCAP}")
|
||||||
message(STATUS "Build shared library: ${BUILD_SHARED_LIBS}")
|
message(STATUS "With static library: ${WITH_STATIC_LIB}")
|
||||||
message(STATUS "Unit testing: ${UNIT_TESTING}")
|
message(STATUS "Unit testing: ${UNIT_TESTING}")
|
||||||
message(STATUS "Client code testing: ${CLIENT_TESTING}")
|
message(STATUS "Client code testing: ${CLIENT_TESTING}")
|
||||||
message(STATUS "Blowfish cipher support: ${WITH_BLOWFISH_CIPHER}")
|
|
||||||
message(STATUS "PKCS #11 URI support: ${WITH_PKCS11_URI}")
|
|
||||||
message(STATUS "DSA support: ${WITH_DSA}")
|
|
||||||
set(_SERVER_TESTING OFF)
|
set(_SERVER_TESTING OFF)
|
||||||
if (WITH_SERVER)
|
if (WITH_SERVER)
|
||||||
set(_SERVER_TESTING ${SERVER_TESTING})
|
set(_SERVER_TESTING ${SERVER_TESTING})
|
||||||
@@ -256,9 +241,5 @@ message(STATUS "Benchmarks: ${WITH_BENCHMARKS}")
|
|||||||
message(STATUS "Symbol versioning: ${WITH_SYMBOL_VERSIONING}")
|
message(STATUS "Symbol versioning: ${WITH_SYMBOL_VERSIONING}")
|
||||||
message(STATUS "Allow ABI break: ${WITH_ABI_BREAK}")
|
message(STATUS "Allow ABI break: ${WITH_ABI_BREAK}")
|
||||||
message(STATUS "Release is final: ${WITH_FINAL}")
|
message(STATUS "Release is final: ${WITH_FINAL}")
|
||||||
message(STATUS "Global client config: ${GLOBAL_CLIENT_CONFIG}")
|
|
||||||
if (WITH_SERVER)
|
|
||||||
message(STATUS "Global bind config: ${GLOBAL_BIND_CONFIG}")
|
|
||||||
endif()
|
|
||||||
message(STATUS "********************************************")
|
message(STATUS "********************************************")
|
||||||
|
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ set(CPACK_PACKAGE_VERSION ${PROJECT_VERSION})
|
|||||||
|
|
||||||
# SOURCE GENERATOR
|
# SOURCE GENERATOR
|
||||||
set(CPACK_SOURCE_GENERATOR "TXZ")
|
set(CPACK_SOURCE_GENERATOR "TXZ")
|
||||||
set(CPACK_SOURCE_IGNORE_FILES "~$;[.]swp$;/[.]git/;/[.]clangd/;/[.]cache/;.gitignore;/build*;/obj*;tags;cscope.*;compile_commands.json;.*\.patch")
|
set(CPACK_SOURCE_IGNORE_FILES "~$;[.]swp$;/[.]git/;.gitignore;/build*;/obj*;tags;cscope.*")
|
||||||
set(CPACK_SOURCE_PACKAGE_FILE_NAME "${CPACK_PACKAGE_NAME}-${CPACK_PACKAGE_VERSION}")
|
set(CPACK_SOURCE_PACKAGE_FILE_NAME "${CPACK_PACKAGE_NAME}-${CPACK_PACKAGE_VERSION}")
|
||||||
|
|
||||||
### NSIS INSTALLER
|
### NSIS INSTALLER
|
||||||
@@ -23,7 +23,7 @@ if (WIN32)
|
|||||||
set(CPACK_GENERATOR "${CPACK_GENERATOR};NSIS")
|
set(CPACK_GENERATOR "${CPACK_GENERATOR};NSIS")
|
||||||
set(CPACK_NSIS_DISPLAY_NAME "The SSH Library")
|
set(CPACK_NSIS_DISPLAY_NAME "The SSH Library")
|
||||||
set(CPACK_NSIS_COMPRESSOR "/SOLID zlib")
|
set(CPACK_NSIS_COMPRESSOR "/SOLID zlib")
|
||||||
set(CPACK_NSIS_MENU_LINKS "https://www.libssh.org/" "libssh homepage")
|
set(CPACK_NSIS_MENU_LINKS "http://www.libssh.org/" "libssh homepage")
|
||||||
endif (NSIS_MAKE)
|
endif (NSIS_MAKE)
|
||||||
endif (WIN32)
|
endif (WIN32)
|
||||||
|
|
||||||
|
|||||||
@@ -1,124 +1,5 @@
|
|||||||
CHANGELOG
|
ChangeLog
|
||||||
=========
|
==========
|
||||||
|
|
||||||
version 0.10.2 (released 2022-09-02)
|
|
||||||
* Fixed tilde expansion when handling include directives
|
|
||||||
* Fixed building the shared torture library
|
|
||||||
* Made rekey test more robust (fixes running on i586 build systems e.g koji)
|
|
||||||
|
|
||||||
version 0.10.1 (released 2022-08-30)
|
|
||||||
* Fixed proxycommand support
|
|
||||||
* Fixed musl libc support
|
|
||||||
|
|
||||||
version 0.10.0 (released 2022-08-26)
|
|
||||||
* Added support for OpenSSL 3.0
|
|
||||||
* Added support for mbedTLS 3
|
|
||||||
* Added support for Smart Cards (through openssl pkcs11 engine)
|
|
||||||
* Added support for chacha20-poly1305@openssh.com with libgcrypt
|
|
||||||
* Added support ed25519 keys in PEM files
|
|
||||||
* Added support for sk-ecdsa and sk-ed25519 (server side)
|
|
||||||
* Added support for limiting RSA key sizes and not accepting small one by
|
|
||||||
default
|
|
||||||
* Added support for ssh-agent on Windows
|
|
||||||
* Added ssh_userauth_publickey_auto_get_current_identity() API
|
|
||||||
* Added ssh_vlog() API
|
|
||||||
* Added ssh_send_issue_banner() API
|
|
||||||
* Added ssh_session_set_disconnect_message() API
|
|
||||||
* Added new configuration options:
|
|
||||||
+ IdentityAgent
|
|
||||||
+ ModuliFile
|
|
||||||
* Provided X11 client example
|
|
||||||
* Disabled DSA support at build time by default (will be removed in the next
|
|
||||||
release)
|
|
||||||
* Deprecated the SCP API!
|
|
||||||
* Deprecated old pubkey, privatekey API
|
|
||||||
* Avoided some needless large stack buffers to minimize memory footprint
|
|
||||||
* Removed support for OpenSSL < 1.0.1
|
|
||||||
* Fixed parsing username@host in login name
|
|
||||||
* Free global init mutex in the destructor on Windows
|
|
||||||
* Fixed PEM parsing in mbedtls to support both legacy and new PKCS8 formats
|
|
||||||
|
|
||||||
version 0.9.6 (released 2021-08-26)
|
|
||||||
* CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with
|
|
||||||
different key exchange mechanism
|
|
||||||
* Fix several memory leaks on error paths
|
|
||||||
* Reset pending_call_state on disconnect
|
|
||||||
* Fix handshake bug with AEAD ciphers and no HMAC overlap
|
|
||||||
* Use OPENSSL_CRYPTO_LIBRARIES in CMake
|
|
||||||
* Ignore request success and failure message if they are not expected
|
|
||||||
* Support more identity files in configuration
|
|
||||||
* Avoid setting compiler flags directly in CMake
|
|
||||||
* Support build directories with special characters
|
|
||||||
* Include stdlib.h to avoid crash in Windows
|
|
||||||
* Fix sftp_new_channel constructs an invalid object
|
|
||||||
* Fix Ninja multiple rules error
|
|
||||||
* Several tests fixes
|
|
||||||
|
|
||||||
version 0.9.5 (released 2020-09-10)
|
|
||||||
* CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
|
|
||||||
* Improve handling of library initialization (T222)
|
|
||||||
* Fix parsing of subsecond times in SFTP (T219)
|
|
||||||
* Make the documentation reproducible
|
|
||||||
* Remove deprecated API usage in OpenSSL
|
|
||||||
* Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
|
|
||||||
* Define version in one place (T226)
|
|
||||||
* Prevent invalid free when using different C runtimes than OpenSSL (T229)
|
|
||||||
* Compatibility improvements to testsuite
|
|
||||||
|
|
||||||
version 0.9.4 (released 2020-04-09)
|
|
||||||
* Fixed CVE-2020-1730 - Possible DoS in client and server when handling
|
|
||||||
AES-CTR keys with OpenSSL
|
|
||||||
* Added diffie-hellman-group14-sha256
|
|
||||||
* Fixed serveral possible memory leaks
|
|
||||||
|
|
||||||
version 0.9.3 (released 2019-12-10)
|
|
||||||
* Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution
|
|
||||||
* SSH-01-003 Client: Missing NULL check leads to crash in erroneous state
|
|
||||||
* SSH-01-006 General: Various unchecked Null-derefs cause DOS
|
|
||||||
* SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys
|
|
||||||
* SSH-01-010 SSH: Deprecated hash function in fingerprinting
|
|
||||||
* SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS
|
|
||||||
* SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access
|
|
||||||
* SSH-01-001 State Machine: Initial machine states should be set explicitly
|
|
||||||
* SSH-01-002 Kex: Differently bound macros used to iterate same array
|
|
||||||
* SSH-01-005 Code-Quality: Integer sign confusion during assignments
|
|
||||||
* SSH-01-008 SCP: Protocol Injection via unescaped File Names
|
|
||||||
* SSH-01-009 SSH: Update documentation which RFCs are implemented
|
|
||||||
* SSH-01-012 PKI: Information leak via uninitialized stack buffer
|
|
||||||
|
|
||||||
version 0.9.2 (released 2019-11-07)
|
|
||||||
* Fixed libssh-config.cmake
|
|
||||||
* Fixed issues with rsa algorithm negotiation (T191)
|
|
||||||
* Fixed detection of OpenSSL ed25519 support (T197)
|
|
||||||
|
|
||||||
version 0.9.1 (released 2019-10-25)
|
|
||||||
* Added support for Ed25519 via OpenSSL
|
|
||||||
* Added support for X25519 via OpenSSL
|
|
||||||
* Added support for localuser in Match keyword
|
|
||||||
* Fixed Match keyword to be case sensitive
|
|
||||||
* Fixed compilation with LibreSSL
|
|
||||||
* Fixed error report of channel open (T75)
|
|
||||||
* Fixed sftp documentation (T137)
|
|
||||||
* Fixed known_hosts parsing (T156)
|
|
||||||
* Fixed build issue with MinGW (T157)
|
|
||||||
* Fixed build with gcc 9 (T164)
|
|
||||||
* Fixed deprecation issues (T165)
|
|
||||||
* Fixed known_hosts directory creation (T166)
|
|
||||||
|
|
||||||
version 0.9.0 (released 2019-02-xx)
|
|
||||||
* Added support for AES-GCM
|
|
||||||
* Added improved rekeying support
|
|
||||||
* Added performance improvements
|
|
||||||
* Disabled blowfish support by default
|
|
||||||
* Fixed several ssh config parsing issues
|
|
||||||
* Added support for DH Group Exchange KEX
|
|
||||||
* Added support for Encrypt-then-MAC mode
|
|
||||||
* Added support for parsing server side configuration file
|
|
||||||
* Added support for ECDSA/Ed25519 certificates
|
|
||||||
* Added FIPS 140-2 compatibility
|
|
||||||
* Improved known_hosts parsing
|
|
||||||
* Improved documentation
|
|
||||||
* Improved OpenSSL API usage for KEX, DH, and signatures
|
|
||||||
|
|
||||||
version 0.8.0 (released 2018-08-10)
|
version 0.8.0 (released 2018-08-10)
|
||||||
* Removed support for deprecated SSHv1 protocol
|
* Removed support for deprecated SSHv1 protocol
|
||||||
@@ -454,6 +335,14 @@ version 0.3.2 (released 2009-08-05)
|
|||||||
* Fixed compilation on Solaris.
|
* Fixed compilation on Solaris.
|
||||||
* Fixed SSHv1 compilation.
|
* Fixed SSHv1 compilation.
|
||||||
|
|
||||||
|
version 0.3.1 (released 2009-07-14)
|
||||||
|
* Added return code SSH_SERVER_FILE_NOT_FOUND.
|
||||||
|
* Fixed compilation of SSHv1.
|
||||||
|
* Fixed several memory leaks.
|
||||||
|
* Fixed possible infinite loops.
|
||||||
|
* Fixed a possible crash bug.
|
||||||
|
* Fixed build warnings.
|
||||||
|
* Fixed cmake on BSD.
|
||||||
version 0.3.1 (released 2009-07-14)
|
version 0.3.1 (released 2009-07-14)
|
||||||
* Added return code SSH_SERVER_FILE_NOT_FOUND.
|
* Added return code SSH_SERVER_FILE_NOT_FOUND.
|
||||||
* Fixed compilation of SSHv1.
|
* Fixed compilation of SSHv1.
|
||||||
@@ -503,7 +392,7 @@ version 0.2 (released 2007-11-29)
|
|||||||
version 0.11-dev
|
version 0.11-dev
|
||||||
* Server implementation development.
|
* Server implementation development.
|
||||||
* Small bug corrected when connecting to sun ssh servers.
|
* Small bug corrected when connecting to sun ssh servers.
|
||||||
* Channel weirdness corrected (writing huge data packets)
|
* Channel wierdness corrected (writing huge data packets)
|
||||||
* Channel_read_nonblocking added
|
* Channel_read_nonblocking added
|
||||||
* Channel bug where stderr wasn't correctly read fixed.
|
* Channel bug where stderr wasn't correctly read fixed.
|
||||||
* Added sftp_file_set_nonblocking(), which is nonblocking SFTP IO
|
* Added sftp_file_set_nonblocking(), which is nonblocking SFTP IO
|
||||||
@@ -41,8 +41,6 @@ if (UNIX)
|
|||||||
add_c_compiler_flag("-Werror=strict-overflow" SUPPORTED_COMPILER_FLAGS)
|
add_c_compiler_flag("-Werror=strict-overflow" SUPPORTED_COMPILER_FLAGS)
|
||||||
add_c_compiler_flag("-Wstrict-overflow=2" SUPPORTED_COMPILER_FLAGS)
|
add_c_compiler_flag("-Wstrict-overflow=2" SUPPORTED_COMPILER_FLAGS)
|
||||||
add_c_compiler_flag("-Wno-format-zero-length" SUPPORTED_COMPILER_FLAGS)
|
add_c_compiler_flag("-Wno-format-zero-length" SUPPORTED_COMPILER_FLAGS)
|
||||||
add_c_compiler_flag("-Wmissing-field-initializers" SUPPORTED_COMPILER_FLAGS)
|
|
||||||
add_c_compiler_flag("-Wsign-compare" SUPPORTED_COMPILER_FLAGS)
|
|
||||||
|
|
||||||
check_c_compiler_flag("-Wformat" REQUIRED_FLAGS_WFORMAT)
|
check_c_compiler_flag("-Wformat" REQUIRED_FLAGS_WFORMAT)
|
||||||
if (REQUIRED_FLAGS_WFORMAT)
|
if (REQUIRED_FLAGS_WFORMAT)
|
||||||
@@ -85,11 +83,9 @@ if (UNIX)
|
|||||||
endif()
|
endif()
|
||||||
endif (WITH_STACK_PROTECTOR_STRONG)
|
endif (WITH_STACK_PROTECTOR_STRONG)
|
||||||
|
|
||||||
if (NOT WINDOWS AND NOT CYGWIN)
|
check_c_compiler_flag_ssp("-fstack-clash-protection" WITH_STACK_CLASH_PROTECTION)
|
||||||
check_c_compiler_flag_ssp("-fstack-clash-protection" WITH_STACK_CLASH_PROTECTION)
|
if (WITH_STACK_CLASH_PROTECTION)
|
||||||
if (WITH_STACK_CLASH_PROTECTION)
|
list(APPEND SUPPORTED_COMPILER_FLAGS "-fstack-clash-protection")
|
||||||
list(APPEND SUPPORTED_COMPILER_FLAGS "-fstack-clash-protection")
|
|
||||||
endif()
|
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if (PICKY_DEVELOPER)
|
if (PICKY_DEVELOPER)
|
||||||
|
|||||||
@@ -9,7 +9,10 @@ include(TestBigEndian)
|
|||||||
|
|
||||||
set(PACKAGE ${PROJECT_NAME})
|
set(PACKAGE ${PROJECT_NAME})
|
||||||
set(VERSION ${PROJECT_VERSION})
|
set(VERSION ${PROJECT_VERSION})
|
||||||
set(SYSCONFDIR ${CMAKE_INSTALL_SYSCONFDIR})
|
set(DATADIR ${DATA_INSTALL_DIR})
|
||||||
|
set(LIBDIR ${LIB_INSTALL_DIR})
|
||||||
|
set(PLUGINDIR "${PLUGIN_INSTALL_DIR}-${LIBRARY_SOVERSION}")
|
||||||
|
set(SYSCONFDIR ${SYSCONF_INSTALL_DIR})
|
||||||
|
|
||||||
set(BINARYDIR ${CMAKE_BINARY_DIR})
|
set(BINARYDIR ${CMAKE_BINARY_DIR})
|
||||||
set(SOURCEDIR ${CMAKE_SOURCE_DIR})
|
set(SOURCEDIR ${CMAKE_SOURCE_DIR})
|
||||||
@@ -86,10 +89,8 @@ if (OPENSSL_FOUND)
|
|||||||
message(FATAL_ERROR "Could not detect openssl/aes.h")
|
message(FATAL_ERROR "Could not detect openssl/aes.h")
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if (WITH_BLOWFISH_CIPHER)
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
check_include_file(openssl/blowfish.h HAVE_OPENSSL_BLOWFISH_H)
|
||||||
check_include_file(openssl/blowfish.h HAVE_OPENSSL_BLOWFISH_H)
|
|
||||||
endif()
|
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
check_include_file(openssl/ecdh.h HAVE_OPENSSL_ECDH_H)
|
check_include_file(openssl/ecdh.h HAVE_OPENSSL_ECDH_H)
|
||||||
@@ -101,52 +102,35 @@ if (OPENSSL_FOUND)
|
|||||||
check_include_file(openssl/ecdsa.h HAVE_OPENSSL_ECDSA_H)
|
check_include_file(openssl/ecdsa.h HAVE_OPENSSL_ECDSA_H)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
check_function_exists(EVP_KDF_CTX_new_id HAVE_OPENSSL_EVP_KDF_CTX_NEW_ID)
|
check_function_exists(EVP_aes_128_ctr HAVE_OPENSSL_EVP_AES_CTR)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
check_function_exists(EVP_KDF_CTX_new HAVE_OPENSSL_EVP_KDF_CTX_NEW)
|
check_function_exists(EVP_aes_128_cbc HAVE_OPENSSL_EVP_AES_CBC)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
check_function_exists(FIPS_mode HAVE_OPENSSL_FIPS_MODE)
|
check_function_exists(EVP_aes_128_gcm HAVE_OPENSSL_EVP_AES_GCM)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
|
check_function_exists(CRYPTO_THREADID_set_callback HAVE_OPENSSL_CRYPTO_THREADID_SET_CALLBACK)
|
||||||
|
|
||||||
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
|
check_function_exists(CRYPTO_ctr128_encrypt HAVE_OPENSSL_CRYPTO_CTR128_ENCRYPT)
|
||||||
|
|
||||||
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
|
check_function_exists(EVP_CIPHER_CTX_new HAVE_OPENSSL_EVP_CIPHER_CTX_NEW)
|
||||||
|
|
||||||
|
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
||||||
|
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARY})
|
||||||
check_function_exists(RAND_priv_bytes HAVE_OPENSSL_RAND_PRIV_BYTES)
|
check_function_exists(RAND_priv_bytes HAVE_OPENSSL_RAND_PRIV_BYTES)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_function_exists(EVP_DigestSign HAVE_OPENSSL_EVP_DIGESTSIGN)
|
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_function_exists(EVP_DigestVerify HAVE_OPENSSL_EVP_DIGESTVERIFY)
|
|
||||||
|
|
||||||
check_function_exists(OPENSSL_ia32cap_loc HAVE_OPENSSL_IA32CAP_LOC)
|
check_function_exists(OPENSSL_ia32cap_loc HAVE_OPENSSL_IA32CAP_LOC)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_symbol_exists(EVP_PKEY_ED25519 "openssl/evp.h" FOUND_OPENSSL_ED25519)
|
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_function_exists(EVP_chacha20 HAVE_OPENSSL_EVP_CHACHA20)
|
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_symbol_exists(EVP_PKEY_POLY1305 "openssl/evp.h" HAVE_OPENSSL_EVP_POLY1305)
|
|
||||||
|
|
||||||
if (HAVE_OPENSSL_EVP_DIGESTSIGN AND HAVE_OPENSSL_EVP_DIGESTVERIFY AND
|
|
||||||
FOUND_OPENSSL_ED25519)
|
|
||||||
set(HAVE_OPENSSL_ED25519 1)
|
|
||||||
endif()
|
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES ${OPENSSL_INCLUDE_DIR})
|
|
||||||
set(CMAKE_REQUIRED_LIBRARIES ${OPENSSL_CRYPTO_LIBRARIES})
|
|
||||||
check_symbol_exists(EVP_PKEY_X25519 "openssl/evp.h" HAVE_OPENSSL_X25519)
|
|
||||||
|
|
||||||
unset(CMAKE_REQUIRED_INCLUDES)
|
unset(CMAKE_REQUIRED_INCLUDES)
|
||||||
unset(CMAKE_REQUIRED_LIBRARIES)
|
unset(CMAKE_REQUIRED_LIBRARIES)
|
||||||
endif()
|
endif()
|
||||||
@@ -163,18 +147,11 @@ if (NOT WITH_GCRYPT AND NOT WITH_MBEDTLS)
|
|||||||
if (HAVE_OPENSSL_ECC)
|
if (HAVE_OPENSSL_ECC)
|
||||||
set(HAVE_ECC 1)
|
set(HAVE_ECC 1)
|
||||||
endif (HAVE_OPENSSL_ECC)
|
endif (HAVE_OPENSSL_ECC)
|
||||||
|
|
||||||
if (HAVE_OPENSSL_EVP_KDF_CTX_NEW_ID OR HAVE_OPENSSL_EVP_KDF_CTX_NEW)
|
|
||||||
set(HAVE_OPENSSL_EVP_KDF_CTX 1)
|
|
||||||
endif (HAVE_OPENSSL_EVP_KDF_CTX_NEW_ID OR HAVE_OPENSSL_EVP_KDF_CTX_NEW)
|
|
||||||
|
|
||||||
endif ()
|
endif ()
|
||||||
|
|
||||||
if (WITH_DSA)
|
if (NOT WITH_MBEDTLS)
|
||||||
if (NOT WITH_MBEDTLS)
|
set(HAVE_DSA 1)
|
||||||
set(HAVE_DSA 1)
|
endif (NOT WITH_MBEDTLS)
|
||||||
endif (NOT WITH_MBEDTLS)
|
|
||||||
endif()
|
|
||||||
|
|
||||||
# FUNCTIONS
|
# FUNCTIONS
|
||||||
|
|
||||||
@@ -273,20 +250,11 @@ if (GCRYPT_FOUND)
|
|||||||
set(HAVE_GCRYPT_ECC 1)
|
set(HAVE_GCRYPT_ECC 1)
|
||||||
set(HAVE_ECC 1)
|
set(HAVE_ECC 1)
|
||||||
endif (GCRYPT_VERSION VERSION_GREATER "1.4.6")
|
endif (GCRYPT_VERSION VERSION_GREATER "1.4.6")
|
||||||
if (NOT GCRYPT_VERSION VERSION_LESS "1.7.0")
|
|
||||||
set(HAVE_GCRYPT_CHACHA_POLY 1)
|
|
||||||
endif (NOT GCRYPT_VERSION VERSION_LESS "1.7.0")
|
|
||||||
endif (GCRYPT_FOUND)
|
endif (GCRYPT_FOUND)
|
||||||
|
|
||||||
if (MBEDTLS_FOUND)
|
if (MBEDTLS_FOUND)
|
||||||
set(HAVE_LIBMBEDCRYPTO 1)
|
set(HAVE_LIBMBEDCRYPTO 1)
|
||||||
set(HAVE_ECC 1)
|
set(HAVE_ECC 1)
|
||||||
|
|
||||||
set(CMAKE_REQUIRED_INCLUDES "${MBEDTLS_INCLUDE_DIR}/mbedtls")
|
|
||||||
check_include_file(chacha20.h HAVE_MBEDTLS_CHACHA20_H)
|
|
||||||
check_include_file(poly1305.h HAVE_MBEDTLS_POLY1305_H)
|
|
||||||
unset(CMAKE_REQUIRED_INCLUDES)
|
|
||||||
|
|
||||||
endif (MBEDTLS_FOUND)
|
endif (MBEDTLS_FOUND)
|
||||||
|
|
||||||
if (CMAKE_USE_PTHREADS_INIT)
|
if (CMAKE_USE_PTHREADS_INIT)
|
||||||
@@ -375,23 +343,6 @@ int main(void) {
|
|||||||
return 0;
|
return 0;
|
||||||
}" HAVE_FALLTHROUGH_ATTRIBUTE)
|
}" HAVE_FALLTHROUGH_ATTRIBUTE)
|
||||||
|
|
||||||
check_c_source_compiles("
|
|
||||||
#define WEAK __attribute__((weak))
|
|
||||||
|
|
||||||
WEAK int sum(int a, int b)
|
|
||||||
{
|
|
||||||
return a + b;
|
|
||||||
}
|
|
||||||
|
|
||||||
int main(void)
|
|
||||||
{
|
|
||||||
int i = sum(2, 2);
|
|
||||||
|
|
||||||
(void)i;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}" HAVE_WEAK_ATTRIBUTE)
|
|
||||||
|
|
||||||
if (NOT WIN32)
|
if (NOT WIN32)
|
||||||
check_c_source_compiles("
|
check_c_source_compiles("
|
||||||
#define __unused __attribute__((unused))
|
#define __unused __attribute__((unused))
|
||||||
@@ -426,6 +377,18 @@ int main(void)
|
|||||||
return 0;
|
return 0;
|
||||||
}" HAVE_GCC_VOLATILE_MEMORY_PROTECTION)
|
}" HAVE_GCC_VOLATILE_MEMORY_PROTECTION)
|
||||||
|
|
||||||
|
check_c_source_compiles("
|
||||||
|
#include <stdio.h>
|
||||||
|
#define __VA_NARG__(...) (__VA_NARG_(_0, ## __VA_ARGS__, __RSEQ_N()) - 1)
|
||||||
|
#define __VA_NARG_(...) __VA_ARG_N(__VA_ARGS__)
|
||||||
|
#define __VA_ARG_N( _1, _2, _3, _4, _5, _6, _7, _8, _9,_10,N,...) N
|
||||||
|
#define __RSEQ_N() 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0
|
||||||
|
#define myprintf(format, ...) printf((format), __VA_NARG__(__VA_ARGS__), __VA_ARGS__)
|
||||||
|
int main(void) {
|
||||||
|
myprintf(\"%d %d %d %d\",1,2,3);
|
||||||
|
return 0;
|
||||||
|
}" HAVE_GCC_NARG_MACRO)
|
||||||
|
|
||||||
check_c_source_compiles("
|
check_c_source_compiles("
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
int main(void) {
|
int main(void) {
|
||||||
@@ -485,28 +448,6 @@ if (WITH_GSSAPI AND NOT GSSAPI_FOUND)
|
|||||||
set(WITH_GSSAPI 0)
|
set(WITH_GSSAPI 0)
|
||||||
endif (WITH_GSSAPI AND NOT GSSAPI_FOUND)
|
endif (WITH_GSSAPI AND NOT GSSAPI_FOUND)
|
||||||
|
|
||||||
if (WITH_PKCS11_URI)
|
|
||||||
if (WITH_GCRYPT)
|
|
||||||
message(FATAL_ERROR "PKCS #11 is not supported for gcrypt.")
|
|
||||||
set(WITH_PKCS11_URI 0)
|
|
||||||
endif()
|
|
||||||
if (WITH_MBEDTLS)
|
|
||||||
message(FATAL_ERROR "PKCS #11 is not supported for mbedcrypto")
|
|
||||||
set(WITH_PKCS11_URI 0)
|
|
||||||
endif()
|
|
||||||
if (HAVE_OPENSSL AND NOT OPENSSL_VERSION VERSION_GREATER_EQUAL "1.1.1")
|
|
||||||
message(FATAL_ERROR "PKCS #11 requires at least OpenSSL 1.1.1")
|
|
||||||
set(WITH_PKCS11_URI 0)
|
|
||||||
endif()
|
|
||||||
endif()
|
|
||||||
|
|
||||||
if (WITH_MBEDTLS)
|
|
||||||
if (WITH_DSA)
|
|
||||||
message(FATAL_ERROR "DSA is not supported with mbedTLS crypto")
|
|
||||||
set(HAVE_DSA 0)
|
|
||||||
endif()
|
|
||||||
endif()
|
|
||||||
|
|
||||||
# ENDIAN
|
# ENDIAN
|
||||||
if (NOT WIN32)
|
if (NOT WIN32)
|
||||||
test_big_endian(WORDS_BIGENDIAN)
|
test_big_endian(WORDS_BIGENDIAN)
|
||||||
|
|||||||
@@ -2,17 +2,14 @@ option(WITH_GSSAPI "Build with GSSAPI support" ON)
|
|||||||
option(WITH_ZLIB "Build with ZLIB support" ON)
|
option(WITH_ZLIB "Build with ZLIB support" ON)
|
||||||
option(WITH_SFTP "Build with SFTP support" ON)
|
option(WITH_SFTP "Build with SFTP support" ON)
|
||||||
option(WITH_SERVER "Build with SSH server support" ON)
|
option(WITH_SERVER "Build with SSH server support" ON)
|
||||||
|
option(WITH_STATIC_LIB "Build with a static library" OFF)
|
||||||
option(WITH_DEBUG_CRYPTO "Build with cryto debug output" OFF)
|
option(WITH_DEBUG_CRYPTO "Build with cryto debug output" OFF)
|
||||||
option(WITH_DEBUG_PACKET "Build with packet debug output" OFF)
|
option(WITH_DEBUG_PACKET "Build with packet debug output" OFF)
|
||||||
option(WITH_DEBUG_CALLTRACE "Build with calltrace debug output" ON)
|
option(WITH_DEBUG_CALLTRACE "Build with calltrace debug output" ON)
|
||||||
option(WITH_DSA "Build with DSA" OFF)
|
|
||||||
option(WITH_GCRYPT "Compile against libgcrypt" OFF)
|
option(WITH_GCRYPT "Compile against libgcrypt" OFF)
|
||||||
option(WITH_MBEDTLS "Compile against libmbedtls" OFF)
|
option(WITH_MBEDTLS "Compile against libmbedtls" OFF)
|
||||||
option(WITH_BLOWFISH_CIPHER "Compile with blowfish support" OFF)
|
|
||||||
option(WITH_PCAP "Compile with Pcap generation support" ON)
|
option(WITH_PCAP "Compile with Pcap generation support" ON)
|
||||||
option(WITH_INTERNAL_DOC "Compile doxygen internal documentation" OFF)
|
option(WITH_INTERNAL_DOC "Compile doxygen internal documentation" OFF)
|
||||||
option(BUILD_SHARED_LIBS "Build shared libraries" ON)
|
|
||||||
option(WITH_PKCS11_URI "Build with PKCS#11 URI support" OFF)
|
|
||||||
option(UNIT_TESTING "Build with unit tests" OFF)
|
option(UNIT_TESTING "Build with unit tests" OFF)
|
||||||
option(CLIENT_TESTING "Build with client tests; requires openssh" OFF)
|
option(CLIENT_TESTING "Build with client tests; requires openssh" OFF)
|
||||||
option(SERVER_TESTING "Build with server tests; requires openssh and dropbear" OFF)
|
option(SERVER_TESTING "Build with server tests; requires openssh and dropbear" OFF)
|
||||||
@@ -21,9 +18,7 @@ option(WITH_EXAMPLES "Build examples" ON)
|
|||||||
option(WITH_NACL "Build with libnacl (curve25519)" ON)
|
option(WITH_NACL "Build with libnacl (curve25519)" ON)
|
||||||
option(WITH_SYMBOL_VERSIONING "Build with symbol versioning" ON)
|
option(WITH_SYMBOL_VERSIONING "Build with symbol versioning" ON)
|
||||||
option(WITH_ABI_BREAK "Allow ABI break" OFF)
|
option(WITH_ABI_BREAK "Allow ABI break" OFF)
|
||||||
option(WITH_GEX "Enable DH Group exchange mechanisms" ON)
|
option(FUZZ_TESTING "Build with fuzzer for the server" OFF)
|
||||||
option(WITH_INSECURE_NONE "Enable insecure none cipher and MAC algorithms (not suitable for production!)" OFF)
|
|
||||||
option(FUZZ_TESTING "Build with fuzzer for the server and client (automatically enables none cipher!)" OFF)
|
|
||||||
option(PICKY_DEVELOPER "Build with picky developer flags" OFF)
|
option(PICKY_DEVELOPER "Build with picky developer flags" OFF)
|
||||||
|
|
||||||
if (WITH_ZLIB)
|
if (WITH_ZLIB)
|
||||||
@@ -37,9 +32,13 @@ if (WITH_BENCHMARKS)
|
|||||||
set(CLIENT_TESTING ON)
|
set(CLIENT_TESTING ON)
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if (UNIT_TESTING OR CLIENT_TESTING OR SERVER_TESTING)
|
if (WITH_STATIC_LIB)
|
||||||
|
set(BUILD_STATIC_LIB ON)
|
||||||
|
endif (WITH_STATIC_LIB)
|
||||||
|
|
||||||
|
if (UNIT_TESTING)
|
||||||
set(BUILD_STATIC_LIB ON)
|
set(BUILD_STATIC_LIB ON)
|
||||||
endif()
|
endif (UNIT_TESTING)
|
||||||
|
|
||||||
if (WITH_NACL)
|
if (WITH_NACL)
|
||||||
set(WITH_NACL ON)
|
set(WITH_NACL ON)
|
||||||
@@ -48,15 +47,3 @@ endif (WITH_NACL)
|
|||||||
if (WITH_ABI_BREAK)
|
if (WITH_ABI_BREAK)
|
||||||
set(WITH_SYMBOL_VERSIONING ON)
|
set(WITH_SYMBOL_VERSIONING ON)
|
||||||
endif (WITH_ABI_BREAK)
|
endif (WITH_ABI_BREAK)
|
||||||
|
|
||||||
if (NOT GLOBAL_BIND_CONFIG)
|
|
||||||
set(GLOBAL_BIND_CONFIG "/etc/ssh/libssh_server_config")
|
|
||||||
endif (NOT GLOBAL_BIND_CONFIG)
|
|
||||||
|
|
||||||
if (NOT GLOBAL_CLIENT_CONFIG)
|
|
||||||
set(GLOBAL_CLIENT_CONFIG "/etc/ssh/ssh_config")
|
|
||||||
endif (NOT GLOBAL_CLIENT_CONFIG)
|
|
||||||
|
|
||||||
if (FUZZ_TESTING)
|
|
||||||
set(WITH_INSECURE_NONE ON)
|
|
||||||
endif (FUZZ_TESTING)
|
|
||||||
|
|||||||
13
INSTALL
13
INSTALL
@@ -7,14 +7,13 @@
|
|||||||
In order to build libssh, you need to install several components:
|
In order to build libssh, you need to install several components:
|
||||||
|
|
||||||
- A C compiler
|
- A C compiler
|
||||||
- [CMake](https://www.cmake.org) >= 3.3.0
|
- [CMake](http://www.cmake.org) >= 2.6.0.
|
||||||
- [openssl](https://www.openssl.org) >= 1.0.1
|
- [openssl](http://www.openssl.org) >= 0.9.8
|
||||||
or
|
or
|
||||||
- [gcrypt](https://www.gnu.org/directory/Security/libgcrypt.html) >= 1.4
|
- [gcrypt](http://www.gnu.org/directory/Security/libgcrypt.html) >= 1.4
|
||||||
- [libz](https://www.zlib.net) >= 1.2
|
|
||||||
|
|
||||||
optional:
|
optional:
|
||||||
- [cmocka](https://cmocka.org/) >= 1.1.0
|
- [libz](http://www.zlib.net) >= 1.2
|
||||||
- [socket_wrapper](https://cwrap.org/) >= 1.1.5
|
- [socket_wrapper](https://cwrap.org/) >= 1.1.5
|
||||||
- [nss_wrapper](https://cwrap.org/) >= 1.1.2
|
- [nss_wrapper](https://cwrap.org/) >= 1.1.2
|
||||||
- [uid_wrapper](https://cwrap.org/) >= 1.2.0
|
- [uid_wrapper](https://cwrap.org/) >= 1.2.0
|
||||||
@@ -27,7 +26,7 @@ For Windows use vcpkg:
|
|||||||
|
|
||||||
https://github.com/Microsoft/vcpkg
|
https://github.com/Microsoft/vcpkg
|
||||||
|
|
||||||
which you can use to install openssl and zlib. libssh itself is also part of
|
which you can use to install openssl and zilib. libssh itself is also part of
|
||||||
vcpkg!
|
vcpkg!
|
||||||
|
|
||||||
## Building
|
## Building
|
||||||
@@ -117,4 +116,4 @@ This document is written using [Markdown][] syntax, making it possible to
|
|||||||
provide usable information in both plain text and HTML format. Whenever
|
provide usable information in both plain text and HTML format. Whenever
|
||||||
modifying this document please use [Markdown][] syntax.
|
modifying this document please use [Markdown][] syntax.
|
||||||
|
|
||||||
[markdown]: https://www.daringfireball.net/projects/markdown
|
[markdown]: http://www.daringfireball.net/projects/markdown
|
||||||
|
|||||||
4
README
4
README
@@ -31,12 +31,12 @@ If you ask yourself how to compile libssh, please read INSTALL before anything.
|
|||||||
3* Where ?
|
3* Where ?
|
||||||
-_-_-_-_-_-_
|
-_-_-_-_-_-_
|
||||||
|
|
||||||
https://www.libssh.org
|
http://www.libssh.org
|
||||||
|
|
||||||
4* Contributing
|
4* Contributing
|
||||||
-_-_-_-_-_-_-_-_-_
|
-_-_-_-_-_-_-_-_-_
|
||||||
|
|
||||||
Please read the file 'CONTRIBUTING.md' next to this README file. It explains
|
Please read the file 'SubmittingPatches' next to this README file. It explains
|
||||||
our copyright policy and how you should send patches for upstream inclusion.
|
our copyright policy and how you should send patches for upstream inclusion.
|
||||||
|
|
||||||
Have fun and happy libssh hacking!
|
Have fun and happy libssh hacking!
|
||||||
|
|||||||
@@ -1,126 +1,9 @@
|
|||||||
# How to contribute a patch to libssh
|
Coding conventions in the libssh tree
|
||||||
|
======================================
|
||||||
|
|
||||||
Please checkout the libssh source code using git.
|
===========
|
||||||
|
Quick Start
|
||||||
For contributions we prefer Merge Requests on Gitlab:
|
===========
|
||||||
|
|
||||||
https://gitlab.com/libssh/libssh-mirror/
|
|
||||||
|
|
||||||
This way you get continuous integration which runs the complete libssh
|
|
||||||
testsuite for you.
|
|
||||||
|
|
||||||
For larger code changes, breaking the changes up into a set of simple
|
|
||||||
patches, each of which does a single thing, are much easier to review.
|
|
||||||
Patch sets like that will most likely have an easier time being merged
|
|
||||||
into the libssh code than large single patches that make lots of
|
|
||||||
changes in one large diff.
|
|
||||||
|
|
||||||
Also bugfixes and new features should be covered by tests. We use the cmocka
|
|
||||||
and cwrap framework for our testing and you can simply run it locally by
|
|
||||||
calling `make test`.
|
|
||||||
|
|
||||||
## Ownership of the contributed code
|
|
||||||
|
|
||||||
libssh is a project with distributed copyright ownership, which means
|
|
||||||
we prefer the copyright on parts of libssh to be held by individuals
|
|
||||||
rather than corporations if possible. There are historical legal
|
|
||||||
reasons for this, but one of the best ways to explain it is that it's
|
|
||||||
much easier to work with individuals who have ownership than corporate
|
|
||||||
legal departments if we ever need to make reasonable compromises with
|
|
||||||
people using and working with libssh.
|
|
||||||
|
|
||||||
We track the ownership of every part of libssh via https://git.libssh.org,
|
|
||||||
our source code control system, so we know the provenance of every piece
|
|
||||||
of code that is committed to libssh.
|
|
||||||
|
|
||||||
So if possible, if you're doing libssh changes on behalf of a company
|
|
||||||
who normally owns all the work you do please get them to assign
|
|
||||||
personal copyright ownership of your changes to you as an individual,
|
|
||||||
that makes things very easy for us to work with and avoids bringing
|
|
||||||
corporate legal departments into the picture.
|
|
||||||
|
|
||||||
If you can't do this we can still accept patches from you owned by
|
|
||||||
your employer under a standard employment contract with corporate
|
|
||||||
copyright ownership. It just requires a simple set-up process first.
|
|
||||||
|
|
||||||
We use a process very similar to the way things are done in the Linux
|
|
||||||
Kernel community, so it should be very easy to get a sign off from
|
|
||||||
your corporate legal department. The only changes we've made are to
|
|
||||||
accommodate the license we use, which is LGPLv2 (or later) whereas the
|
|
||||||
Linux kernel uses GPLv2.
|
|
||||||
|
|
||||||
The process is called signing.
|
|
||||||
|
|
||||||
## How to sign your work
|
|
||||||
|
|
||||||
Once you have permission to contribute to libssh from your employer, simply
|
|
||||||
email a copy of the following text from your corporate email address to:
|
|
||||||
|
|
||||||
contributing@libssh.org
|
|
||||||
|
|
||||||
|
|
||||||
```
|
|
||||||
libssh Developer's Certificate of Origin. Version 1.0
|
|
||||||
|
|
||||||
|
|
||||||
By making a contribution to this project, I certify that:
|
|
||||||
|
|
||||||
(a) The contribution was created in whole or in part by me and I
|
|
||||||
have the right to submit it under the appropriate
|
|
||||||
version of the GNU General Public License; or
|
|
||||||
|
|
||||||
(b) The contribution is based upon previous work that, to the best of
|
|
||||||
my knowledge, is covered under an appropriate open source license
|
|
||||||
and I have the right under that license to submit that work with
|
|
||||||
modifications, whether created in whole or in part by me, under
|
|
||||||
the GNU General Public License, in the appropriate version; or
|
|
||||||
|
|
||||||
(c) The contribution was provided directly to me by some other
|
|
||||||
person who certified (a) or (b) and I have not modified it.
|
|
||||||
|
|
||||||
(d) I understand and agree that this project and the contribution are
|
|
||||||
public and that a record of the contribution (including all
|
|
||||||
metadata and personal information I submit with it, including my
|
|
||||||
sign-off) is maintained indefinitely and may be redistributed
|
|
||||||
consistent with the libssh Team's policies and the requirements of
|
|
||||||
the GNU GPL where they are relevant.
|
|
||||||
|
|
||||||
(e) I am granting this work to this project under the terms of the
|
|
||||||
GNU Lesser General Public License as published by the
|
|
||||||
Free Software Foundation; either version 2.1 of
|
|
||||||
the License, or (at the option of the project) any later version.
|
|
||||||
|
|
||||||
https://www.gnu.org/licenses/lgpl-2.1.html
|
|
||||||
```
|
|
||||||
|
|
||||||
We will maintain a copy of that email as a record that you have the
|
|
||||||
rights to contribute code to libssh under the required licenses whilst
|
|
||||||
working for the company where the email came from.
|
|
||||||
|
|
||||||
Then when sending in a patch via the normal mechanisms described
|
|
||||||
above, add a line that states:
|
|
||||||
|
|
||||||
Signed-off-by: Random J Developer <random@developer.example.org>
|
|
||||||
|
|
||||||
using your real name and the email address you sent the original email
|
|
||||||
you used to send the libssh Developer's Certificate of Origin to us
|
|
||||||
(sorry, no pseudonyms or anonymous contributions.)
|
|
||||||
|
|
||||||
That's it! Such code can then quite happily contain changes that have
|
|
||||||
copyright messages such as:
|
|
||||||
|
|
||||||
(c) Example Corporation.
|
|
||||||
|
|
||||||
and can be merged into the libssh codebase in the same way as patches
|
|
||||||
from any other individual. You don't need to send in a copy of the
|
|
||||||
libssh Developer's Certificate of Origin for each patch, or inside each
|
|
||||||
patch. Just the sign-off message is all that is required once we've
|
|
||||||
received the initial email.
|
|
||||||
|
|
||||||
|
|
||||||
# Coding conventions in the libssh tree
|
|
||||||
|
|
||||||
## Quick Start
|
|
||||||
|
|
||||||
Coding style guidelines are about reducing the number of unnecessary
|
Coding style guidelines are about reducing the number of unnecessary
|
||||||
reformatting patches and making things easier for developers to work together.
|
reformatting patches and making things easier for developers to work together.
|
||||||
@@ -153,28 +36,31 @@ are the highlights.
|
|||||||
have a copy of "The C Programming Language" anyways right?
|
have a copy of "The C Programming Language" anyways right?
|
||||||
|
|
||||||
|
|
||||||
## Editor Hints
|
=============
|
||||||
|
Editor Hints
|
||||||
### Emacs
|
=============
|
||||||
|
|
||||||
|
Emacs
|
||||||
|
------
|
||||||
Add the follow to your $HOME/.emacs file:
|
Add the follow to your $HOME/.emacs file:
|
||||||
|
|
||||||
(add-hook 'c-mode-hook
|
(add-hook 'c-mode-hook
|
||||||
(lambda ()
|
(lambda ()
|
||||||
(c-set-style "linux")
|
(c-set-style "linux")
|
||||||
(c-toggle-auto-state)))
|
(c-toggle-auto-state)))
|
||||||
|
|
||||||
|
|
||||||
## Neovim/VIM
|
Vim
|
||||||
|
----
|
||||||
|
|
||||||
For the basic vi editor included with all variants of \*nix, add the
|
For the basic vi editor included with all variants of \*nix, add the
|
||||||
following to ~/.config/nvim/init.rc or ~/.vimrc:
|
following to $HOME/.vimrc:
|
||||||
|
|
||||||
set ts=4 sw=4 et cindent
|
set ts=4 sw=4 et cindent
|
||||||
|
|
||||||
You can use the Vim gitmodline plugin to store this in the git config:
|
You can use the Vim gitmodline plugin to store this in the git config:
|
||||||
|
|
||||||
https://git.cryptomilk.org/projects/vim-gitmodeline.git/
|
http://git.cryptomilk.org/projects/vim-gitmodeline.git/
|
||||||
|
|
||||||
For Vim, the following settings in $HOME/.vimrc will also deal with
|
For Vim, the following settings in $HOME/.vimrc will also deal with
|
||||||
displaying trailing whitespace:
|
displaying trailing whitespace:
|
||||||
@@ -195,9 +81,12 @@ displaying trailing whitespace:
|
|||||||
autocmd BufNewFile,BufRead *.c,*.h exec 'match Todo /\%>' . &textwidth . 'v.\+/'
|
autocmd BufNewFile,BufRead *.c,*.h exec 'match Todo /\%>' . &textwidth . 'v.\+/'
|
||||||
|
|
||||||
|
|
||||||
## FAQ & Statement Reference
|
==========================
|
||||||
|
FAQ & Statement Reference
|
||||||
|
==========================
|
||||||
|
|
||||||
### Comments
|
Comments
|
||||||
|
---------
|
||||||
|
|
||||||
Comments should always use the standard C syntax. C++ style comments are not
|
Comments should always use the standard C syntax. C++ style comments are not
|
||||||
currently allowed.
|
currently allowed.
|
||||||
@@ -274,7 +163,8 @@ This is bad:
|
|||||||
* This is a multi line comment,
|
* This is a multi line comment,
|
||||||
* with some more words...*/
|
* with some more words...*/
|
||||||
|
|
||||||
### Indention & Whitespace & 80 columns
|
Indention & Whitespace & 80 columns
|
||||||
|
------------------------------------
|
||||||
|
|
||||||
To avoid confusion, indentations have to be 4 spaces. Do not use tabs!. When
|
To avoid confusion, indentations have to be 4 spaces. Do not use tabs!. When
|
||||||
wrapping parameters for function calls, align the parameter list with the first
|
wrapping parameters for function calls, align the parameter list with the first
|
||||||
@@ -290,7 +180,8 @@ splitting. Never split a line before columns 70 - 79 unless you
|
|||||||
have a really good reason. Be smart about formatting.
|
have a really good reason. Be smart about formatting.
|
||||||
|
|
||||||
|
|
||||||
### If, switch, & Code blocks
|
If, switch, & Code blocks
|
||||||
|
--------------------------
|
||||||
|
|
||||||
Always follow an 'if' keyword with a space but don't include additional
|
Always follow an 'if' keyword with a space but don't include additional
|
||||||
spaces following or preceding the parentheses in the conditional.
|
spaces following or preceding the parentheses in the conditional.
|
||||||
@@ -316,7 +207,7 @@ invoking functions.
|
|||||||
Braces for code blocks used by for, if, switch, while, do..while, etc. should
|
Braces for code blocks used by for, if, switch, while, do..while, etc. should
|
||||||
begin on the same line as the statement keyword and end on a line of their own.
|
begin on the same line as the statement keyword and end on a line of their own.
|
||||||
You should always include braces, even if the block only contains one
|
You should always include braces, even if the block only contains one
|
||||||
statement. **NOTE**: Functions are different and the beginning left brace should
|
statement. NOTE: Functions are different and the beginning left brace should
|
||||||
be located in the first column on the next line.
|
be located in the first column on the next line.
|
||||||
|
|
||||||
If the beginning statement has to be broken across lines due to length, the
|
If the beginning statement has to be broken across lines due to length, the
|
||||||
@@ -363,7 +254,8 @@ Bad examples:
|
|||||||
print("I should be in braces.\n");
|
print("I should be in braces.\n");
|
||||||
|
|
||||||
|
|
||||||
### Goto
|
Goto
|
||||||
|
-----
|
||||||
|
|
||||||
While many people have been academically taught that "goto"s are fundamentally
|
While many people have been academically taught that "goto"s are fundamentally
|
||||||
evil, they can greatly enhance readability and reduce memory leaks when used as
|
evil, they can greatly enhance readability and reduce memory leaks when used as
|
||||||
@@ -395,13 +287,14 @@ Good Examples:
|
|||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
### Initialize pointers
|
Initialize pointers
|
||||||
|
-------------------
|
||||||
|
|
||||||
All pointer variables **MUST** be initialized to `NULL`. History has
|
All pointer variables MUST be initialized to NULL. History has
|
||||||
demonstrated that uninitialized pointer variables have lead to various
|
demonstrated that uninitialized pointer variables have lead to various
|
||||||
bugs and security issues.
|
bugs and security issues.
|
||||||
|
|
||||||
Pointers **MUST** be initialized even if the assignment directly follows
|
Pointers MUST be initialized even if the assignment directly follows
|
||||||
the declaration, like pointer2 in the example below, because the
|
the declaration, like pointer2 in the example below, because the
|
||||||
instructions sequence may change over time.
|
instructions sequence may change over time.
|
||||||
|
|
||||||
@@ -416,13 +309,15 @@ Good Example:
|
|||||||
|
|
||||||
pointer1 = some_func1();
|
pointer1 = some_func1();
|
||||||
|
|
||||||
### Typedefs
|
Typedefs
|
||||||
|
---------
|
||||||
|
|
||||||
libssh tries to avoid `typedef struct { .. } x_t;` so we do always try to use
|
libssh tries to avoid "typedef struct { .. } x_t;" so we do always try to use
|
||||||
`struct x { .. };`. We know there are still such typedefs in the code, but for
|
"struct x { .. };". We know there are still such typedefs in the code, but for
|
||||||
new code, please don't do that anymore.
|
new code, please don't do that anymore.
|
||||||
|
|
||||||
### Make use of helper variables
|
Make use of helper variables
|
||||||
|
-----------------------------
|
||||||
|
|
||||||
Please try to avoid passing function calls as function parameters in new code.
|
Please try to avoid passing function calls as function parameters in new code.
|
||||||
This makes the code much easier to read and it's also easier to use the "step"
|
This makes the code much easier to read and it's also easier to use the "step"
|
||||||
@@ -472,13 +367,9 @@ an iterator style:
|
|||||||
But in general, please try to avoid this pattern.
|
But in general, please try to avoid this pattern.
|
||||||
|
|
||||||
|
|
||||||
### Control-Flow changing macros
|
Control-Flow changing macros
|
||||||
|
-----------------------------
|
||||||
|
|
||||||
Macros like `STATUS_NOT_OK_RETURN` that change control flow (return/goto/etc)
|
Macros like STATUS_NOT_OK_RETURN that change control flow (return/goto/etc)
|
||||||
from within the macro are considered bad, because they look like function calls
|
from within the macro are considered bad, because they look like function calls
|
||||||
that never change control flow. Please do not introduce them.
|
that never change control flow. Please do not introduce them.
|
||||||
|
|
||||||
|
|
||||||
Have fun and happy libssh hacking!
|
|
||||||
|
|
||||||
The libssh Team
|
|
||||||
@@ -1,5 +1,4 @@
|
|||||||
[](https://gitlab.com/libssh/libssh-mirror/commits/master)
|
[](https://gitlab.com/libssh/libssh-mirror/commits/master)
|
||||||
[](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:libssh)
|
|
||||||
|
|
||||||
```
|
```
|
||||||
_ _ _ _
|
_ _ _ _
|
||||||
@@ -37,7 +36,7 @@ https://www.libssh.org
|
|||||||
|
|
||||||
# Contributing
|
# Contributing
|
||||||
|
|
||||||
Please read the file 'CONTRIBUTING.md' next to this README file. It explains
|
Please read the file 'SubmittingPatches' next to this README file. It explains
|
||||||
our copyright policy and how you should send patches for upstream inclusion.
|
our copyright policy and how you should send patches for upstream inclusion.
|
||||||
|
|
||||||
Have fun and happy libssh hacking!
|
Have fun and happy libssh hacking!
|
||||||
|
|||||||
118
SubmittingPatches
Normal file
118
SubmittingPatches
Normal file
@@ -0,0 +1,118 @@
|
|||||||
|
How to contribute a patch to libssh
|
||||||
|
====================================
|
||||||
|
|
||||||
|
Please checkout the libssh source code using git. Change the code and then
|
||||||
|
use "git format-patch" to create a patch. The patch should be signed (see
|
||||||
|
below) and send it to libssh@libssh.org, or attach it to a bug report at
|
||||||
|
https://red.libssh.org/
|
||||||
|
|
||||||
|
For larger code changes, breaking the changes up into a set of simple
|
||||||
|
patches, each of which does a single thing, are much easier to review.
|
||||||
|
Patch sets like that will most likely have an easier time being merged
|
||||||
|
into the libssh code than large single patches that make lots of
|
||||||
|
changes in one large diff.
|
||||||
|
|
||||||
|
Ownership of the contributed code
|
||||||
|
==================================
|
||||||
|
|
||||||
|
libssh is a project with distributed copyright ownership, which means
|
||||||
|
we prefer the copyright on parts of libssh to be held by individuals
|
||||||
|
rather than corporations if possible. There are historical legal
|
||||||
|
reasons for this, but one of the best ways to explain it is that it's
|
||||||
|
much easier to work with individuals who have ownership than corporate
|
||||||
|
legal departments if we ever need to make reasonable compromises with
|
||||||
|
people using and working with libssh.
|
||||||
|
|
||||||
|
We track the ownership of every part of libssh via http://git.libssh.org,
|
||||||
|
our source code control system, so we know the provenance of every piece
|
||||||
|
of code that is committed to libssh.
|
||||||
|
|
||||||
|
So if possible, if you're doing libssh changes on behalf of a company
|
||||||
|
who normally owns all the work you do please get them to assign
|
||||||
|
personal copyright ownership of your changes to you as an individual,
|
||||||
|
that makes things very easy for us to work with and avoids bringing
|
||||||
|
corporate legal departments into the picture.
|
||||||
|
|
||||||
|
If you can't do this we can still accept patches from you owned by
|
||||||
|
your employer under a standard employment contract with corporate
|
||||||
|
copyright ownership. It just requires a simple set-up process first.
|
||||||
|
|
||||||
|
We use a process very similar to the way things are done in the Linux
|
||||||
|
Kernel community, so it should be very easy to get a sign off from
|
||||||
|
your corporate legal department. The only changes we've made are to
|
||||||
|
accommodate the license we use, which is LGPLv2 (or later) whereas the
|
||||||
|
Linux kernel uses GPLv2.
|
||||||
|
|
||||||
|
The process is called signing.
|
||||||
|
|
||||||
|
How to sign your work
|
||||||
|
----------------------
|
||||||
|
|
||||||
|
Once you have permission to contribute to libssh from your employer, simply
|
||||||
|
email a copy of the following text from your corporate email address to:
|
||||||
|
|
||||||
|
contributing@libssh.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
libssh Developer's Certificate of Origin. Version 1.0
|
||||||
|
|
||||||
|
|
||||||
|
By making a contribution to this project, I certify that:
|
||||||
|
|
||||||
|
(a) The contribution was created in whole or in part by me and I
|
||||||
|
have the right to submit it under the appropriate
|
||||||
|
version of the GNU General Public License; or
|
||||||
|
|
||||||
|
(b) The contribution is based upon previous work that, to the best of
|
||||||
|
my knowledge, is covered under an appropriate open source license
|
||||||
|
and I have the right under that license to submit that work with
|
||||||
|
modifications, whether created in whole or in part by me, under
|
||||||
|
the GNU General Public License, in the appropriate version; or
|
||||||
|
|
||||||
|
(c) The contribution was provided directly to me by some other
|
||||||
|
person who certified (a) or (b) and I have not modified it.
|
||||||
|
|
||||||
|
(d) I understand and agree that this project and the contribution are
|
||||||
|
public and that a record of the contribution (including all
|
||||||
|
metadata and personal information I submit with it, including my
|
||||||
|
sign-off) is maintained indefinitely and may be redistributed
|
||||||
|
consistent with the libssh Team's policies and the requirements of
|
||||||
|
the GNU GPL where they are relevant.
|
||||||
|
|
||||||
|
(e) I am granting this work to this project under the terms of the
|
||||||
|
GNU Lesser General Public License as published by the
|
||||||
|
Free Software Foundation; either version 2.1 of
|
||||||
|
the License, or (at the option of the project) any later version.
|
||||||
|
|
||||||
|
http://www.gnu.org/licenses/lgpl-2.1.html
|
||||||
|
|
||||||
|
|
||||||
|
We will maintain a copy of that email as a record that you have the
|
||||||
|
rights to contribute code to libssh under the required licenses whilst
|
||||||
|
working for the company where the email came from.
|
||||||
|
|
||||||
|
Then when sending in a patch via the normal mechanisms described
|
||||||
|
above, add a line that states:
|
||||||
|
|
||||||
|
Signed-off-by: Random J Developer <random@developer.example.org>
|
||||||
|
|
||||||
|
using your real name and the email address you sent the original email
|
||||||
|
you used to send the libssh Developer's Certificate of Origin to us
|
||||||
|
(sorry, no pseudonyms or anonymous contributions.)
|
||||||
|
|
||||||
|
That's it! Such code can then quite happily contain changes that have
|
||||||
|
copyright messages such as:
|
||||||
|
|
||||||
|
(c) Example Corporation.
|
||||||
|
|
||||||
|
and can be merged into the libssh codebase in the same way as patches
|
||||||
|
from any other individual. You don't need to send in a copy of the
|
||||||
|
libssh Developer's Certificate of Origin for each patch, or inside each
|
||||||
|
patch. Just the sign-off message is all that is required once we've
|
||||||
|
received the initial email.
|
||||||
|
|
||||||
|
Have fun and happy libssh hacking !
|
||||||
|
|
||||||
|
The libssh Team
|
||||||
|
|
||||||
@@ -23,22 +23,10 @@ if (UNIX AND NOT WIN32)
|
|||||||
set(CMAKE_EXEC_LINKER_FLAGS_ADDRESSSANITIZER "-fsanitize=address"
|
set(CMAKE_EXEC_LINKER_FLAGS_ADDRESSSANITIZER "-fsanitize=address"
|
||||||
CACHE STRING "Flags used by the linker during ADDRESSSANITIZER builds.")
|
CACHE STRING "Flags used by the linker during ADDRESSSANITIZER builds.")
|
||||||
|
|
||||||
# Activate with: -DCMAKE_BUILD_TYPE=MemorySanitizer
|
|
||||||
set(CMAKE_C_FLAGS_MEMORYSANITIZER "-g -O2 -fsanitize=memory -fsanitize-memory-track-origins=2 -fno-omit-frame-pointer"
|
|
||||||
CACHE STRING "Flags used by the C compiler during MEMORYSANITIZER builds.")
|
|
||||||
set(CMAKE_CXX_FLAGS_MEMORYSANITIZER "-g -O2 -fsanitize=memory -fsanitize-memory-track-origins=2 -fno-omit-frame-pointer"
|
|
||||||
CACHE STRING "Flags used by the CXX compiler during MEMORYSANITIZER builds.")
|
|
||||||
set(CMAKE_SHARED_LINKER_FLAGS_MEMORYSANITIZER "-fsanitize=memory"
|
|
||||||
CACHE STRING "Flags used by the linker during the creation of shared libraries during MEMORYSANITIZER builds.")
|
|
||||||
set(CMAKE_MODULE_LINKER_FLAGS_MEMORYSANITIZER "-fsanitize=memory"
|
|
||||||
CACHE STRING "Flags used by the linker during the creation of shared libraries during MEMORYSANITIZER builds.")
|
|
||||||
set(CMAKE_EXEC_LINKER_FLAGS_MEMORYSANITIZER "-fsanitize=memory"
|
|
||||||
CACHE STRING "Flags used by the linker during MEMORYSANITIZER builds.")
|
|
||||||
|
|
||||||
# Activate with: -DCMAKE_BUILD_TYPE=UndefinedSanitizer
|
# Activate with: -DCMAKE_BUILD_TYPE=UndefinedSanitizer
|
||||||
set(CMAKE_C_FLAGS_UNDEFINEDSANITIZER "-g -O1 -fsanitize=undefined -fsanitize=null -fsanitize=alignment -fno-sanitize-recover=undefined,integer"
|
set(CMAKE_C_FLAGS_UNDEFINEDSANITIZER "-g -O1 -fsanitize=undefined -fsanitize=null -fsanitize=alignment -fno-sanitize-recover"
|
||||||
CACHE STRING "Flags used by the C compiler during UNDEFINEDSANITIZER builds.")
|
CACHE STRING "Flags used by the C compiler during UNDEFINEDSANITIZER builds.")
|
||||||
set(CMAKE_CXX_FLAGS_UNDEFINEDSANITIZER "-g -O1 -fsanitize=undefined -fsanitize=null -fsanitize=alignment -fno-sanitize-recover=undefined,integer"
|
set(CMAKE_CXX_FLAGS_UNDEFINEDSANITIZER "-g -O1 -fsanitize=undefined -fsanitize=null -fsanitize=alignment -fno-sanitize-recover"
|
||||||
CACHE STRING "Flags used by the CXX compiler during UNDEFINEDSANITIZER builds.")
|
CACHE STRING "Flags used by the CXX compiler during UNDEFINEDSANITIZER builds.")
|
||||||
set(CMAKE_SHARED_LINKER_FLAGS_UNDEFINEDSANITIZER "-fsanitize=undefined"
|
set(CMAKE_SHARED_LINKER_FLAGS_UNDEFINEDSANITIZER "-fsanitize=undefined"
|
||||||
CACHE STRING "Flags used by the linker during the creation of shared libraries during UNDEFINEDSANITIZER builds.")
|
CACHE STRING "Flags used by the linker during the creation of shared libraries during UNDEFINEDSANITIZER builds.")
|
||||||
|
|||||||
109
cmake/Modules/DefineInstallationPaths.cmake
Normal file
109
cmake/Modules/DefineInstallationPaths.cmake
Normal file
@@ -0,0 +1,109 @@
|
|||||||
|
if (UNIX OR OS2)
|
||||||
|
IF (NOT APPLICATION_NAME)
|
||||||
|
MESSAGE(STATUS "${PROJECT_NAME} is used as APPLICATION_NAME")
|
||||||
|
SET(APPLICATION_NAME ${PROJECT_NAME})
|
||||||
|
ENDIF (NOT APPLICATION_NAME)
|
||||||
|
|
||||||
|
# Suffix for Linux
|
||||||
|
SET(LIB_SUFFIX
|
||||||
|
CACHE STRING "Define suffix of directory name (32/64)"
|
||||||
|
)
|
||||||
|
|
||||||
|
SET(EXEC_INSTALL_PREFIX
|
||||||
|
"${CMAKE_INSTALL_PREFIX}"
|
||||||
|
CACHE PATH "Base directory for executables and libraries"
|
||||||
|
)
|
||||||
|
SET(SHARE_INSTALL_PREFIX
|
||||||
|
"${CMAKE_INSTALL_PREFIX}/share"
|
||||||
|
CACHE PATH "Base directory for files which go to share/"
|
||||||
|
)
|
||||||
|
SET(DATA_INSTALL_PREFIX
|
||||||
|
"${SHARE_INSTALL_PREFIX}/${APPLICATION_NAME}"
|
||||||
|
CACHE PATH "The parent directory where applications can install their data")
|
||||||
|
|
||||||
|
# The following are directories where stuff will be installed to
|
||||||
|
SET(BIN_INSTALL_DIR
|
||||||
|
"${EXEC_INSTALL_PREFIX}/bin"
|
||||||
|
CACHE PATH "The ${APPLICATION_NAME} binary install dir (default prefix/bin)"
|
||||||
|
)
|
||||||
|
SET(SBIN_INSTALL_DIR
|
||||||
|
"${EXEC_INSTALL_PREFIX}/sbin"
|
||||||
|
CACHE PATH "The ${APPLICATION_NAME} sbin install dir (default prefix/sbin)"
|
||||||
|
)
|
||||||
|
SET(LIB_INSTALL_DIR
|
||||||
|
"${EXEC_INSTALL_PREFIX}/lib${LIB_SUFFIX}"
|
||||||
|
CACHE PATH "The subdirectory relative to the install prefix where libraries will be installed (default is prefix/lib)"
|
||||||
|
)
|
||||||
|
SET(LIBEXEC_INSTALL_DIR
|
||||||
|
"${EXEC_INSTALL_PREFIX}/libexec"
|
||||||
|
CACHE PATH "The subdirectory relative to the install prefix where libraries will be installed (default is prefix/libexec)"
|
||||||
|
)
|
||||||
|
SET(PLUGIN_INSTALL_DIR
|
||||||
|
"${LIB_INSTALL_DIR}/${APPLICATION_NAME}"
|
||||||
|
CACHE PATH "The subdirectory relative to the install prefix where plugins will be installed (default is prefix/lib/${APPLICATION_NAME})"
|
||||||
|
)
|
||||||
|
SET(INCLUDE_INSTALL_DIR
|
||||||
|
"${CMAKE_INSTALL_PREFIX}/include"
|
||||||
|
CACHE PATH "The subdirectory to the header prefix (default prefix/include)"
|
||||||
|
)
|
||||||
|
|
||||||
|
set(CMAKE_INSTALL_DIR
|
||||||
|
"${LIB_INSTALL_DIR}/cmake"
|
||||||
|
CACHE PATH "The subdirectory to install cmake config files")
|
||||||
|
|
||||||
|
SET(DATA_INSTALL_DIR
|
||||||
|
"${DATA_INSTALL_PREFIX}"
|
||||||
|
CACHE PATH "The parent directory where applications can install their data (default prefix/share/${APPLICATION_NAME})"
|
||||||
|
)
|
||||||
|
SET(HTML_INSTALL_DIR
|
||||||
|
"${DATA_INSTALL_PREFIX}/doc/HTML"
|
||||||
|
CACHE PATH "The HTML install dir for documentation (default data/doc/html)"
|
||||||
|
)
|
||||||
|
SET(ICON_INSTALL_DIR
|
||||||
|
"${DATA_INSTALL_PREFIX}/icons"
|
||||||
|
CACHE PATH "The icon install dir (default data/icons/)"
|
||||||
|
)
|
||||||
|
SET(SOUND_INSTALL_DIR
|
||||||
|
"${DATA_INSTALL_PREFIX}/sounds"
|
||||||
|
CACHE PATH "The install dir for sound files (default data/sounds)"
|
||||||
|
)
|
||||||
|
|
||||||
|
SET(LOCALE_INSTALL_DIR
|
||||||
|
"${SHARE_INSTALL_PREFIX}/locale"
|
||||||
|
CACHE PATH "The install dir for translations (default prefix/share/locale)"
|
||||||
|
)
|
||||||
|
|
||||||
|
SET(XDG_APPS_DIR
|
||||||
|
"${SHARE_INSTALL_PREFIX}/applications/"
|
||||||
|
CACHE PATH "The XDG apps dir"
|
||||||
|
)
|
||||||
|
SET(XDG_DIRECTORY_DIR
|
||||||
|
"${SHARE_INSTALL_PREFIX}/desktop-directories"
|
||||||
|
CACHE PATH "The XDG directory"
|
||||||
|
)
|
||||||
|
|
||||||
|
SET(SYSCONF_INSTALL_DIR
|
||||||
|
"${EXEC_INSTALL_PREFIX}/etc"
|
||||||
|
CACHE PATH "The ${APPLICATION_NAME} sysconfig install dir (default prefix/etc)"
|
||||||
|
)
|
||||||
|
SET(MAN_INSTALL_DIR
|
||||||
|
"${SHARE_INSTALL_PREFIX}/man"
|
||||||
|
CACHE PATH "The ${APPLICATION_NAME} man install dir (default prefix/man)"
|
||||||
|
)
|
||||||
|
SET(INFO_INSTALL_DIR
|
||||||
|
"${SHARE_INSTALL_PREFIX}/info"
|
||||||
|
CACHE PATH "The ${APPLICATION_NAME} info install dir (default prefix/info)"
|
||||||
|
)
|
||||||
|
else()
|
||||||
|
# Same same
|
||||||
|
set(BIN_INSTALL_DIR "bin" CACHE PATH "-")
|
||||||
|
set(SBIN_INSTALL_DIR "sbin" CACHE PATH "-")
|
||||||
|
set(LIB_INSTALL_DIR "lib${LIB_SUFFIX}" CACHE PATH "-")
|
||||||
|
set(INCLUDE_INSTALL_DIR "include" CACHE PATH "-")
|
||||||
|
set(CMAKE_INSTALL_DIR "CMake" CACHE PATH "-")
|
||||||
|
set(PLUGIN_INSTALL_DIR "plugins" CACHE PATH "-")
|
||||||
|
set(HTML_INSTALL_DIR "doc/HTML" CACHE PATH "-")
|
||||||
|
set(ICON_INSTALL_DIR "icons" CACHE PATH "-")
|
||||||
|
set(SOUND_INSTALL_DIR "soudns" CACHE PATH "-")
|
||||||
|
set(LOCALE_INSTALL_DIR "lang" CACHE PATH "-")
|
||||||
|
endif ()
|
||||||
@@ -302,13 +302,12 @@ function(get_file_list _TARGET_NAME)
|
|||||||
add_custom_target(
|
add_custom_target(
|
||||||
${_TARGET_NAME}_int ALL
|
${_TARGET_NAME}_int ALL
|
||||||
COMMAND ${CMAKE_COMMAND}
|
COMMAND ${CMAKE_COMMAND}
|
||||||
-DOUTPUT_PATH=${_get_files_list_OUTPUT_PATH}
|
-DOUTPUT_PATH="${_get_files_list_OUTPUT_PATH}"
|
||||||
-DDIRECTORIES=${_get_files_list_DIRECTORIES}
|
-DDIRECTORIES="${_get_files_list_DIRECTORIES}"
|
||||||
-DFILES_PATTERNS=${_get_files_list_FILES_PATTERNS}
|
-DFILES_PATTERNS="${_get_files_list_FILES_PATTERNS}"
|
||||||
-P ${_GET_FILES_LIST_SCRIPT}
|
-P ${_GET_FILES_LIST_SCRIPT}
|
||||||
COMMENT
|
COMMENT
|
||||||
"Searching for files"
|
"Searching for files"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
|
|
||||||
if (DEFINED _get_files_list_COPY_TO)
|
if (DEFINED _get_files_list_COPY_TO)
|
||||||
@@ -319,7 +318,6 @@ function(get_file_list _TARGET_NAME)
|
|||||||
${_FILES_LIST_OUTPUT_PATH} ${_get_files_list_COPY_TO}
|
${_FILES_LIST_OUTPUT_PATH} ${_get_files_list_COPY_TO}
|
||||||
DEPENDS ${_TARGET_NAME}_int
|
DEPENDS ${_TARGET_NAME}_int
|
||||||
COMMENT "Copying ${_TARGET_NAME} to ${_get_files_list_COPY_TO}"
|
COMMENT "Copying ${_TARGET_NAME} to ${_get_files_list_COPY_TO}"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
else()
|
else()
|
||||||
add_custom_target(${_TARGET_NAME} ALL
|
add_custom_target(${_TARGET_NAME} ALL
|
||||||
@@ -371,13 +369,12 @@ function(extract_symbols _TARGET_NAME)
|
|||||||
add_custom_target(
|
add_custom_target(
|
||||||
${_TARGET_NAME}_int ALL
|
${_TARGET_NAME}_int ALL
|
||||||
COMMAND ${CMAKE_COMMAND}
|
COMMAND ${CMAKE_COMMAND}
|
||||||
-DOUTPUT_PATH=${_SYMBOLS_OUTPUT_PATH}
|
-DOUTPUT_PATH="${_SYMBOLS_OUTPUT_PATH}"
|
||||||
-DHEADERS_LIST_FILE=${_HEADERS_LIST_FILE}
|
-DHEADERS_LIST_FILE="${_HEADERS_LIST_FILE}"
|
||||||
-DFILTER_PATTERN=${_extract_symbols_FILTER_PATTERN}
|
-DFILTER_PATTERN=${_extract_symbols_FILTER_PATTERN}
|
||||||
-P ${_EXTRACT_SYMBOLS_SCRIPT}
|
-P ${_EXTRACT_SYMBOLS_SCRIPT}
|
||||||
DEPENDS ${_extract_symbols_HEADERS_LIST}
|
DEPENDS ${_extract_symbols_HEADERS_LIST}
|
||||||
COMMENT "Extracting symbols from headers"
|
COMMENT "Extracting symbols from headers"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
|
|
||||||
if (DEFINED _extract_symbols_COPY_TO)
|
if (DEFINED _extract_symbols_COPY_TO)
|
||||||
@@ -388,7 +385,6 @@ function(extract_symbols _TARGET_NAME)
|
|||||||
${_SYMBOLS_OUTPUT_PATH} ${_extract_symbols_COPY_TO}
|
${_SYMBOLS_OUTPUT_PATH} ${_extract_symbols_COPY_TO}
|
||||||
DEPENDS ${_TARGET_NAME}_int
|
DEPENDS ${_TARGET_NAME}_int
|
||||||
COMMENT "Copying ${_TARGET_NAME} to ${_extract_symbols_COPY_TO}"
|
COMMENT "Copying ${_TARGET_NAME} to ${_extract_symbols_COPY_TO}"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
else()
|
else()
|
||||||
add_custom_target(${_TARGET_NAME} ALL
|
add_custom_target(${_TARGET_NAME} ALL
|
||||||
@@ -453,37 +449,35 @@ function(generate_map_file _TARGET_NAME)
|
|||||||
${_TARGET_NAME}_int ALL
|
${_TARGET_NAME}_int ALL
|
||||||
COMMAND ${CMAKE_COMMAND}
|
COMMAND ${CMAKE_COMMAND}
|
||||||
-DABIMAP_EXECUTABLE=${ABIMAP_EXECUTABLE}
|
-DABIMAP_EXECUTABLE=${ABIMAP_EXECUTABLE}
|
||||||
-DSYMBOLS=${_SYMBOLS_FILE}
|
-DSYMBOLS="${_SYMBOLS_FILE}"
|
||||||
-DCURRENT_MAP=${_generate_map_file_CURRENT_MAP}
|
-DCURRENT_MAP=${_generate_map_file_CURRENT_MAP}
|
||||||
-DOUTPUT_PATH=${_MAP_OUTPUT_PATH}
|
-DOUTPUT_PATH="${_MAP_OUTPUT_PATH}"
|
||||||
-DFINAL=${_generate_map_file_FINAL}
|
-DFINAL=${_generate_map_file_FINAL}
|
||||||
-DBREAK_ABI=${_generate_map_file_BREAK_ABI}
|
-DBREAK_ABI=${_generate_map_file_BREAK_ABI}
|
||||||
-DRELEASE_NAME_VERSION=${_generate_map_file_RELEASE_NAME_VERSION}
|
-DRELEASE_NAME_VERSION=${_generate_map_file_RELEASE_NAME_VERSION}
|
||||||
-P ${_GENERATE_MAP_SCRIPT}
|
-P ${_GENERATE_MAP_SCRIPT}
|
||||||
DEPENDS ${_generate_map_file_SYMBOLS}
|
DEPENDS ${_generate_map_file_SYMBOLS}
|
||||||
COMMENT "Generating the map ${_TARGET_NAME}"
|
COMMENT "Generating the map ${_TARGET_NAME}"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
|
|
||||||
# Add a custom command setting the map as OUTPUT to allow it to be added as
|
# Add a custom command setting the map as OUTPUT to allow it to be added as
|
||||||
# a generated source
|
# a generated source
|
||||||
add_custom_command(
|
add_custom_command(
|
||||||
OUTPUT ${_MAP_OUTPUT_PATH}
|
OUTPUT ${_MAP_OUTPUT_PATH}
|
||||||
DEPENDS ${_TARGET_NAME}_copy
|
DEPENDS ${_TARGET_NAME}
|
||||||
)
|
)
|
||||||
|
|
||||||
if (DEFINED _generate_map_file_COPY_TO)
|
if (DEFINED _generate_map_file_COPY_TO)
|
||||||
# Copy the generated map back to the COPY_TO
|
# Copy the generated map back to the COPY_TO
|
||||||
add_custom_target(${_TARGET_NAME}_copy ALL
|
add_custom_target(${_TARGET_NAME} ALL
|
||||||
COMMAND
|
COMMAND
|
||||||
${CMAKE_COMMAND} -E copy_if_different ${_MAP_OUTPUT_PATH}
|
${CMAKE_COMMAND} -E copy_if_different ${_MAP_OUTPUT_PATH}
|
||||||
${_generate_map_file_COPY_TO}
|
${_generate_map_file_COPY_TO}
|
||||||
DEPENDS ${_TARGET_NAME}_int
|
DEPENDS ${_TARGET_NAME}_int
|
||||||
COMMENT "Copying ${_MAP_OUTPUT_PATH} to ${_generate_map_file_COPY_TO}"
|
COMMENT "Copying ${_MAP_OUTPUT_PATH} to ${_generate_map_file_COPY_TO}"
|
||||||
VERBATIM
|
|
||||||
)
|
)
|
||||||
else()
|
else()
|
||||||
add_custom_target(${_TARGET_NAME}_copy ALL
|
add_custom_target(${_TARGET_NAME} ALL
|
||||||
DEPENDS ${_TARGET_NAME}_int
|
DEPENDS ${_TARGET_NAME}_int
|
||||||
)
|
)
|
||||||
endif()
|
endif()
|
||||||
|
|||||||
@@ -1,36 +0,0 @@
|
|||||||
# - Try to find softhsm
|
|
||||||
# Once done this will define
|
|
||||||
#
|
|
||||||
# SOFTHSM_FOUND - system has softhsm
|
|
||||||
# SOFTHSM_LIBRARIES - Link these to use softhsm
|
|
||||||
#
|
|
||||||
#=============================================================================
|
|
||||||
# Copyright (c) 2019 Sahana Prasad <sahana@redhat.com>
|
|
||||||
#
|
|
||||||
# Distributed under the OSI-approved BSD License (the "License");
|
|
||||||
# see accompanying file Copyright.txt for details.
|
|
||||||
#
|
|
||||||
# This software is distributed WITHOUT ANY WARRANTY; without even the
|
|
||||||
# implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
||||||
# See the License for more information.
|
|
||||||
#=============================================================================
|
|
||||||
#
|
|
||||||
|
|
||||||
|
|
||||||
find_library(SOFTHSM2_LIBRARY
|
|
||||||
NAMES
|
|
||||||
softhsm2
|
|
||||||
)
|
|
||||||
|
|
||||||
if (SOFTHSM2_LIBRARY)
|
|
||||||
set(SOFTHSM_LIBRARIES
|
|
||||||
${SOFTHSM_LIBRARIES}
|
|
||||||
${SOFTHSM2_LIBRARY}
|
|
||||||
)
|
|
||||||
endif (SOFTHSM2_LIBRARY)
|
|
||||||
|
|
||||||
include(FindPackageHandleStandardArgs)
|
|
||||||
find_package_handle_standard_args(softhsm DEFAULT_MSG SOFTHSM_LIBRARIES)
|
|
||||||
|
|
||||||
# show the SOFTHSM_INCLUDE_DIR and SOFTHSM_LIBRARIES variables only in the advanced view
|
|
||||||
mark_as_advanced(SOFTHSM_LIBRARIES)
|
|
||||||
@@ -4,16 +4,14 @@
|
|||||||
/* Version number of package */
|
/* Version number of package */
|
||||||
#cmakedefine VERSION "${PROJECT_VERSION}"
|
#cmakedefine VERSION "${PROJECT_VERSION}"
|
||||||
|
|
||||||
|
#cmakedefine LOCALEDIR "${LOCALE_INSTALL_DIR}"
|
||||||
|
#cmakedefine DATADIR "${DATADIR}"
|
||||||
|
#cmakedefine LIBDIR "${LIBDIR}"
|
||||||
|
#cmakedefine PLUGINDIR "${PLUGINDIR}"
|
||||||
#cmakedefine SYSCONFDIR "${SYSCONFDIR}"
|
#cmakedefine SYSCONFDIR "${SYSCONFDIR}"
|
||||||
#cmakedefine BINARYDIR "${BINARYDIR}"
|
#cmakedefine BINARYDIR "${BINARYDIR}"
|
||||||
#cmakedefine SOURCEDIR "${SOURCEDIR}"
|
#cmakedefine SOURCEDIR "${SOURCEDIR}"
|
||||||
|
|
||||||
/* Global bind configuration file path */
|
|
||||||
#cmakedefine GLOBAL_BIND_CONFIG "${GLOBAL_BIND_CONFIG}"
|
|
||||||
|
|
||||||
/* Global client configuration file path */
|
|
||||||
#cmakedefine GLOBAL_CLIENT_CONFIG "${GLOBAL_CLIENT_CONFIG}"
|
|
||||||
|
|
||||||
/************************** HEADER FILES *************************/
|
/************************** HEADER FILES *************************/
|
||||||
|
|
||||||
/* Define to 1 if you have the <argp.h> header file. */
|
/* Define to 1 if you have the <argp.h> header file. */
|
||||||
@@ -97,34 +95,25 @@
|
|||||||
/* Define to 1 if you have gl_flags as a glob_t sturct member */
|
/* Define to 1 if you have gl_flags as a glob_t sturct member */
|
||||||
#cmakedefine HAVE_GLOB_GL_FLAGS_MEMBER 1
|
#cmakedefine HAVE_GLOB_GL_FLAGS_MEMBER 1
|
||||||
|
|
||||||
/* Define to 1 if you have OpenSSL with Ed25519 support */
|
|
||||||
#cmakedefine HAVE_OPENSSL_ED25519 1
|
|
||||||
|
|
||||||
/* Define to 1 if you have OpenSSL with X25519 support */
|
|
||||||
#cmakedefine HAVE_OPENSSL_X25519 1
|
|
||||||
|
|
||||||
/* Define to 1 if you have OpenSSL with Poly1305 support */
|
|
||||||
#cmakedefine HAVE_OPENSSL_EVP_POLY1305 1
|
|
||||||
|
|
||||||
/* Define to 1 if you have gcrypt with ChaCha20/Poly1305 support */
|
|
||||||
#cmakedefine HAVE_GCRYPT_CHACHA_POLY 1
|
|
||||||
|
|
||||||
/*************************** FUNCTIONS ***************************/
|
/*************************** FUNCTIONS ***************************/
|
||||||
|
|
||||||
/* Define to 1 if you have the `EVP_chacha20' function. */
|
/* Define to 1 if you have the `EVP_aes128_ctr' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_EVP_CHACHA20 1
|
#cmakedefine HAVE_OPENSSL_EVP_AES_CTR 1
|
||||||
|
|
||||||
/* Define to 1 if you have the `EVP_KDF_CTX_new_id' or `EVP_KDF_CTX_new` function. */
|
/* Define to 1 if you have the `EVP_aes128_cbc' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_EVP_KDF_CTX 1
|
#cmakedefine HAVE_OPENSSL_EVP_AES_CBC 1
|
||||||
|
|
||||||
/* Define to 1 if you have the `FIPS_mode' function. */
|
/* Define to 1 if you have the `EVP_aes128_gcm' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_FIPS_MODE 1
|
#cmakedefine HAVE_OPENSSL_EVP_AES_GCM 1
|
||||||
|
|
||||||
/* Define to 1 if you have the `EVP_DigestSign' function. */
|
/* Define to 1 if you have the `CRYPTO_THREADID_set_callback' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_EVP_DIGESTSIGN 1
|
#cmakedefine HAVE_OPENSSL_CRYPTO_THREADID_SET_CALLBACK 1
|
||||||
|
|
||||||
/* Define to 1 if you have the `EVP_DigestVerify' function. */
|
/* Define to 1 if you have the `CRYPTO_ctr128_encrypt' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_EVP_DIGESTVERIFY 1
|
#cmakedefine HAVE_OPENSSL_CRYPTO_CTR128_ENCRYPT 1
|
||||||
|
|
||||||
|
/* Define to 1 if you have the `EVP_CIPHER_CTX_new' function. */
|
||||||
|
#cmakedefine HAVE_OPENSSL_EVP_CIPHER_CTX_NEW 1
|
||||||
|
|
||||||
/* Define to 1 if you have the `OPENSSL_ia32cap_loc' function. */
|
/* Define to 1 if you have the `OPENSSL_ia32cap_loc' function. */
|
||||||
#cmakedefine HAVE_OPENSSL_IA32CAP_LOC 1
|
#cmakedefine HAVE_OPENSSL_IA32CAP_LOC 1
|
||||||
@@ -225,12 +214,12 @@
|
|||||||
|
|
||||||
#cmakedefine HAVE_FALLTHROUGH_ATTRIBUTE 1
|
#cmakedefine HAVE_FALLTHROUGH_ATTRIBUTE 1
|
||||||
#cmakedefine HAVE_UNUSED_ATTRIBUTE 1
|
#cmakedefine HAVE_UNUSED_ATTRIBUTE 1
|
||||||
#cmakedefine HAVE_WEAK_ATTRIBUTE 1
|
|
||||||
|
|
||||||
#cmakedefine HAVE_CONSTRUCTOR_ATTRIBUTE 1
|
#cmakedefine HAVE_CONSTRUCTOR_ATTRIBUTE 1
|
||||||
#cmakedefine HAVE_DESTRUCTOR_ATTRIBUTE 1
|
#cmakedefine HAVE_DESTRUCTOR_ATTRIBUTE 1
|
||||||
|
|
||||||
#cmakedefine HAVE_GCC_VOLATILE_MEMORY_PROTECTION 1
|
#cmakedefine HAVE_GCC_VOLATILE_MEMORY_PROTECTION 1
|
||||||
|
#cmakedefine HAVE_GCC_NARG_MACRO 1
|
||||||
|
|
||||||
#cmakedefine HAVE_COMPILER__FUNC__ 1
|
#cmakedefine HAVE_COMPILER__FUNC__ 1
|
||||||
#cmakedefine HAVE_COMPILER__FUNCTION__ 1
|
#cmakedefine HAVE_COMPILER__FUNCTION__ 1
|
||||||
@@ -249,15 +238,6 @@
|
|||||||
/* Define to 1 if you want to enable server support */
|
/* Define to 1 if you want to enable server support */
|
||||||
#cmakedefine WITH_SERVER 1
|
#cmakedefine WITH_SERVER 1
|
||||||
|
|
||||||
/* Define to 1 if you want to enable DH group exchange algorithms */
|
|
||||||
#cmakedefine WITH_GEX 1
|
|
||||||
|
|
||||||
/* Define to 1 if you want to enable none cipher and MAC */
|
|
||||||
#cmakedefine WITH_INSECURE_NONE 1
|
|
||||||
|
|
||||||
/* Define to 1 if you want to enable blowfish cipher support */
|
|
||||||
#cmakedefine WITH_BLOWFISH_CIPHER 1
|
|
||||||
|
|
||||||
/* Define to 1 if you want to enable debug output for crypto functions */
|
/* Define to 1 if you want to enable debug output for crypto functions */
|
||||||
#cmakedefine DEBUG_CRYPTO 1
|
#cmakedefine DEBUG_CRYPTO 1
|
||||||
|
|
||||||
@@ -273,9 +253,6 @@
|
|||||||
/* Define to 1 if you want to enable NaCl support */
|
/* Define to 1 if you want to enable NaCl support */
|
||||||
#cmakedefine WITH_NACL 1
|
#cmakedefine WITH_NACL 1
|
||||||
|
|
||||||
/* Define to 1 if you want to enable PKCS #11 URI support */
|
|
||||||
#cmakedefine WITH_PKCS11_URI 1
|
|
||||||
|
|
||||||
/*************************** ENDIAN *****************************/
|
/*************************** ENDIAN *****************************/
|
||||||
|
|
||||||
/* Define WORDS_BIGENDIAN to 1 if your processor stores words with the most
|
/* Define WORDS_BIGENDIAN to 1 if your processor stores words with the most
|
||||||
|
|||||||
@@ -13,11 +13,8 @@ if (DOXYGEN_FOUND)
|
|||||||
set(DOXYGEN_TAB_SIZE 4)
|
set(DOXYGEN_TAB_SIZE 4)
|
||||||
set(DOXYGEN_OPTIMIZE_OUTPUT_FOR_C YES)
|
set(DOXYGEN_OPTIMIZE_OUTPUT_FOR_C YES)
|
||||||
set(DOXYGEN_MARKDOWN_SUPPORT YES)
|
set(DOXYGEN_MARKDOWN_SUPPORT YES)
|
||||||
set(DOXYGEN_FULL_PATH_NAMES NO)
|
|
||||||
|
|
||||||
set(DOXYGEN_PREDEFINED DOXYGEN
|
set(DOXYGEN_PREDEFINED DOXYGEN
|
||||||
WITH_SERVER
|
|
||||||
WITH_SFTP
|
|
||||||
PRINTF_ATTRIBUTE(x,y))
|
PRINTF_ATTRIBUTE(x,y))
|
||||||
|
|
||||||
set(DOXYGEN_EXCLUDE ${CMAKE_CURRENT_SOURCE_DIR}/that_style)
|
set(DOXYGEN_EXCLUDE ${CMAKE_CURRENT_SOURCE_DIR}/that_style)
|
||||||
|
|||||||
@@ -1,101 +0,0 @@
|
|||||||
# Install a FreeBSD CI instance
|
|
||||||
|
|
||||||
Install the following packages:
|
|
||||||
|
|
||||||
```
|
|
||||||
pkg install -y bash git gmake cmake cmocka openssl wget pkgconf ccache bash
|
|
||||||
```
|
|
||||||
|
|
||||||
Create gitlab-runner user:
|
|
||||||
|
|
||||||
```
|
|
||||||
pw group add -n gitlab-runner
|
|
||||||
pw user add -n gitlab-runner -g gitlab-runner -s /usr/local/bin/bash
|
|
||||||
mkdir /home/gitlab-runner
|
|
||||||
chown gitlab-runner:gitlab-runner /home/gitlab-runner
|
|
||||||
```
|
|
||||||
|
|
||||||
Get the gitlab-runner binary for freebsd:
|
|
||||||
|
|
||||||
```
|
|
||||||
wget -O /usr/local/bin/gitlab-runner https://gitlab-runner-downloads.s3.amazonaws.com/latest/binaries/gitlab-runner-freebsd-amd64
|
|
||||||
chmod +x /usr/local/bin/gitlab-runner
|
|
||||||
```
|
|
||||||
|
|
||||||
Create a log file and allow access:
|
|
||||||
|
|
||||||
```
|
|
||||||
touch /var/log/gitlab_runner.log && chown gitlab-runner:gitlab-runner /var/log/gitlab_runner.log
|
|
||||||
```
|
|
||||||
|
|
||||||
We need a start script to run it on boot:
|
|
||||||
|
|
||||||
```
|
|
||||||
mkdir -p /usr/local/etc/rc.d
|
|
||||||
cat > /usr/local/etc/rc.d/gitlab_runner << EOF
|
|
||||||
#!/usr/local/bin/bash
|
|
||||||
# PROVIDE: gitlab_runner
|
|
||||||
# REQUIRE: DAEMON NETWORKING
|
|
||||||
# BEFORE:
|
|
||||||
# KEYWORD:
|
|
||||||
|
|
||||||
. /etc/rc.subr
|
|
||||||
|
|
||||||
name="gitlab_runner"
|
|
||||||
rcvar="gitlab_runner_enable"
|
|
||||||
|
|
||||||
load_rc_config $name
|
|
||||||
|
|
||||||
user="gitlab-runner"
|
|
||||||
user_home="/home/gitlab-runner"
|
|
||||||
command="/usr/local/bin/gitlab-runner run"
|
|
||||||
pidfile="/var/run/${name}.pid"
|
|
||||||
|
|
||||||
start_cmd="gitlab_runner_start"
|
|
||||||
stop_cmd="gitlab_runner_stop"
|
|
||||||
status_cmd="gitlab_runner_status"
|
|
||||||
|
|
||||||
gitlab_runner_start()
|
|
||||||
{
|
|
||||||
export USER=${user}
|
|
||||||
export HOME=${user_home}
|
|
||||||
|
|
||||||
if checkyesno ${rcvar}; then
|
|
||||||
cd ${user_home}
|
|
||||||
/usr/sbin/daemon -u ${user} -p ${pidfile} ${command} > /var/log/gitlab_runner.log 2>&1
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
gitlab_runner_stop()
|
|
||||||
{
|
|
||||||
if [ -f ${pidfile} ]; then
|
|
||||||
kill `cat ${pidfile}`
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
gitlab_runner_status()
|
|
||||||
{
|
|
||||||
if [ ! -f ${pidfile} ] || kill -0 `cat ${pidfile}`; then
|
|
||||||
echo "Service ${name} is not running."
|
|
||||||
else
|
|
||||||
echo "${name} appears to be running."
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
run_rc_command $1
|
|
||||||
EOF
|
|
||||||
chmod +x /usr/local/etc/rc.d/gitlab_runner
|
|
||||||
```
|
|
||||||
|
|
||||||
Register your gitlab-runner with your gitlab project
|
|
||||||
|
|
||||||
```
|
|
||||||
su gitlab-runner -c 'gitlab-runner register'
|
|
||||||
```
|
|
||||||
|
|
||||||
Start the gitlab runner service:
|
|
||||||
|
|
||||||
```
|
|
||||||
sysrc -f /etc/rc.conf "gitlab_runner_enable=YES"
|
|
||||||
service gitlab_runner start
|
|
||||||
```
|
|
||||||
@@ -33,9 +33,6 @@ The process of authenticating by public key to a server is the following:
|
|||||||
used to authenticate the user).
|
used to authenticate the user).
|
||||||
- then, you retrieve the private key for this key and send a message
|
- then, you retrieve the private key for this key and send a message
|
||||||
proving that you know that private key.
|
proving that you know that private key.
|
||||||
- when several identity files are specified, then the order of processing of
|
|
||||||
these files is from the last-mentioned to the first one
|
|
||||||
(if specified in the ~/.ssh/config, then starting from the bottom to the top).
|
|
||||||
|
|
||||||
The function ssh_userauth_autopubkey() does this using the available keys in
|
The function ssh_userauth_autopubkey() does this using the available keys in
|
||||||
"~/.ssh/". The return values are the following:
|
"~/.ssh/". The return values are the following:
|
||||||
@@ -66,7 +63,7 @@ int authenticate_pubkey(ssh_session session)
|
|||||||
{
|
{
|
||||||
int rc;
|
int rc;
|
||||||
|
|
||||||
rc = ssh_userauth_publickey_auto(session, NULL, NULL);
|
rc = ssh_userauth_publickey_auto(session, NULL);
|
||||||
|
|
||||||
if (rc == SSH_AUTH_ERROR)
|
if (rc == SSH_AUTH_ERROR)
|
||||||
{
|
{
|
||||||
@@ -284,7 +281,7 @@ pass, ssh_userauth_none() might answer SSH_AUTH_SUCCESS.
|
|||||||
The following example shows how to perform "none" authentication:
|
The following example shows how to perform "none" authentication:
|
||||||
|
|
||||||
@code
|
@code
|
||||||
int authenticate_none(ssh_session session)
|
int authenticate_kbdint(ssh_session session)
|
||||||
{
|
{
|
||||||
int rc;
|
int rc;
|
||||||
|
|
||||||
|
|||||||
@@ -112,8 +112,8 @@ This number is calculated using the following procedure:
|
|||||||
This conversion follows the network byte order. This step differs from
|
This conversion follows the network byte order. This step differs from
|
||||||
RFC5656.
|
RFC5656.
|
||||||
|
|
||||||
[RFC5656] https://tools.ietf.org/html/rfc5656
|
[RFC5656] http://tools.ietf.org/html/rfc5656
|
||||||
[SCHNEIER] https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html#c1675929
|
[SCHNEIER] https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html#c1675929
|
||||||
[DJB] https://cr.yp.to/talks/2013.05.31/slides-dan+tanja-20130531-4x3.pdf
|
[DJB] http://cr.yp.to/talks/2013.05.31/slides-dan+tanja-20130531-4x3.pdf
|
||||||
[Curve25519] "Curve25519: new Diffie-Hellman speed records."
|
[Curve25519] "Curve25519: new Diffie-Hellman speed records."
|
||||||
https://cr.yp.to/ecdh/curve25519-20060209.pdf
|
http://cr.yp.to/ecdh/curve25519-20060209.pdf
|
||||||
|
|||||||
@@ -101,7 +101,7 @@ used to retrieve google's home page from the remote SSH server.
|
|||||||
int direct_forwarding(ssh_session session)
|
int direct_forwarding(ssh_session session)
|
||||||
{
|
{
|
||||||
ssh_channel forwarding_channel;
|
ssh_channel forwarding_channel;
|
||||||
int rc = SSH_ERROR;
|
int rc;
|
||||||
char *http_get = "GET / HTTP/1.1\nHost: www.google.com\n\n";
|
char *http_get = "GET / HTTP/1.1\nHost: www.google.com\n\n";
|
||||||
int nbytes, nwritten;
|
int nbytes, nwritten;
|
||||||
|
|
||||||
@@ -165,8 +165,6 @@ int web_server(ssh_session session)
|
|||||||
char buffer[256];
|
char buffer[256];
|
||||||
int nbytes, nwritten;
|
int nbytes, nwritten;
|
||||||
int port = 0;
|
int port = 0;
|
||||||
char *peer_address = NULL;
|
|
||||||
int peer_port = 0;
|
|
||||||
char *helloworld = ""
|
char *helloworld = ""
|
||||||
"HTTP/1.1 200 OK\n"
|
"HTTP/1.1 200 OK\n"
|
||||||
"Content-Type: text/html\n"
|
"Content-Type: text/html\n"
|
||||||
@@ -189,8 +187,7 @@ int web_server(ssh_session session)
|
|||||||
return rc;
|
return rc;
|
||||||
}
|
}
|
||||||
|
|
||||||
channel = ssh_channel_open_forward_port(session, 60000, &port,
|
channel = ssh_channel_accept_forward(session, 60000, &port);
|
||||||
&peer_address, &peer_port);
|
|
||||||
if (channel == NULL)
|
if (channel == NULL)
|
||||||
{
|
{
|
||||||
fprintf(stderr, "Error waiting for incoming connection: %s\n",
|
fprintf(stderr, "Error waiting for incoming connection: %s\n",
|
||||||
@@ -207,7 +204,6 @@ int web_server(ssh_session session)
|
|||||||
ssh_get_error(session));
|
ssh_get_error(session));
|
||||||
ssh_channel_send_eof(channel);
|
ssh_channel_send_eof(channel);
|
||||||
ssh_channel_free(channel);
|
ssh_channel_free(channel);
|
||||||
ssh_string_free_char(peer_address);
|
|
||||||
return SSH_ERROR;
|
return SSH_ERROR;
|
||||||
}
|
}
|
||||||
if (strncmp(buffer, "GET /", 5)) continue;
|
if (strncmp(buffer, "GET /", 5)) continue;
|
||||||
@@ -220,15 +216,13 @@ int web_server(ssh_session session)
|
|||||||
ssh_get_error(session));
|
ssh_get_error(session));
|
||||||
ssh_channel_send_eof(channel);
|
ssh_channel_send_eof(channel);
|
||||||
ssh_channel_free(channel);
|
ssh_channel_free(channel);
|
||||||
ssh_string_free_char(peer_address);
|
|
||||||
return SSH_ERROR;
|
return SSH_ERROR;
|
||||||
}
|
}
|
||||||
printf("Sent answer to %s:%d\n", peer_address, peer_port);
|
printf("Sent answer\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
ssh_channel_send_eof(channel);
|
ssh_channel_send_eof(channel);
|
||||||
ssh_channel_free(channel);
|
ssh_channel_free(channel);
|
||||||
ssh_string_free_char(peer_address);
|
|
||||||
return SSH_OK;
|
return SSH_OK;
|
||||||
}
|
}
|
||||||
@endcode
|
@endcode
|
||||||
|
|||||||
@@ -431,9 +431,6 @@ int show_remote_processes(ssh_session session)
|
|||||||
}
|
}
|
||||||
@endcode
|
@endcode
|
||||||
|
|
||||||
Each ssh_channel_request_exec() needs to be run on freshly created
|
|
||||||
and connected (with ssh_channel_open_session()) channel.
|
|
||||||
|
|
||||||
@see @ref opening_shell
|
@see @ref opening_shell
|
||||||
@see @ref remote_command
|
@see @ref remote_command
|
||||||
@see @ref sftp_subsystem
|
@see @ref sftp_subsystem
|
||||||
|
|||||||
@@ -27,7 +27,4 @@ the dllimport attribute.
|
|||||||
#include <libssh/libssh.h>
|
#include <libssh/libssh.h>
|
||||||
@endcode
|
@endcode
|
||||||
|
|
||||||
If you're are statically linking with OpenSSL, read the "Linking your
|
|
||||||
application" section in the NOTES.[OS] in the OpenSSL source tree!
|
|
||||||
|
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -21,9 +21,9 @@ The libssh library provides:
|
|||||||
|
|
||||||
- <strong>Key Exchange Methods</strong>: <i>curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521</i>, diffie-hellman-group1-sha1, diffie-hellman-group14-sha1
|
- <strong>Key Exchange Methods</strong>: <i>curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521</i>, diffie-hellman-group1-sha1, diffie-hellman-group14-sha1
|
||||||
- <strong>Public Key Algorithms</strong>: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, rsa-sha2-512, rsa-sha2-256,ssh-dss
|
- <strong>Public Key Algorithms</strong>: ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-rsa, rsa-sha2-512, rsa-sha2-256,ssh-dss
|
||||||
- <strong>Ciphers</strong>: <i>aes256-ctr, aes192-ctr, aes128-ctr</i>, aes256-cbc (rijndael-cbc@lysator.liu.se), aes192-cbc, aes128-cbc, 3des-cbc, blowfish-cbc
|
- <strong>Ciphers</strong>: <i>aes256-ctr, aes192-ctr, aes128-ctr</i>, aes256-cbc (rijndael-cbc@lysator.liu.se), aes192-cbc, aes128-cbc, 3des-cbc, blowfish-cbc, none
|
||||||
- <strong>Compression Schemes</strong>: zlib, <i>zlib@openssh.com</i>, none
|
- <strong>Compression Schemes</strong>: zlib, <i>zlib@openssh.com</i>, none
|
||||||
- <strong>MAC hashes</strong>: hmac-sha1, hmac-sha2-256, hmac-sha2-512, hmac-md5
|
- <strong>MAC hashes</strong>: hmac-sha1, hmac-sha2-256, hmac-sha2-384, hmac-sha2-512, hmac-md5, none
|
||||||
- <strong>Authentication</strong>: none, password, public-key, keyboard-interactive, <i>gssapi-with-mic</i>
|
- <strong>Authentication</strong>: none, password, public-key, keyboard-interactive, <i>gssapi-with-mic</i>
|
||||||
- <strong>Channels</strong>: shell, exec (incl. SCP wrapper), direct-tcpip, subsystem, <i>auth-agent-req@openssh.com</i>
|
- <strong>Channels</strong>: shell, exec (incl. SCP wrapper), direct-tcpip, subsystem, <i>auth-agent-req@openssh.com</i>
|
||||||
- <strong>Global Requests</strong>: tcpip-forward, forwarded-tcpip
|
- <strong>Global Requests</strong>: tcpip-forward, forwarded-tcpip
|
||||||
@@ -38,9 +38,9 @@ The libssh library provides:
|
|||||||
@section main-additional-features Additional Features
|
@section main-additional-features Additional Features
|
||||||
|
|
||||||
- Client <b>and</b> server support
|
- Client <b>and</b> server support
|
||||||
- SSHv2 protocol support
|
- SSHv2 and SSHv1 protocol support
|
||||||
- Supports <a href="https://test.libssh.org/" target="_blank">Linux, UNIX, BSD, Solaris, OS/2 and Windows</a>
|
- Supports <a href="http://test.libssh.org/" target="_blank">Linux, UNIX, BSD, Solaris, OS/2 and Windows</a>
|
||||||
- Automated test cases with nightly <a href="https://test.libssh.org/" target="_blank">tests</a>
|
- Automated test cases with nightly <a href="http://test.libssh.org/" target="_blank">tests</a>
|
||||||
- Event model based on poll(2), or a poll(2)-emulation.
|
- Event model based on poll(2), or a poll(2)-emulation.
|
||||||
|
|
||||||
@section main-copyright Copyright Policy
|
@section main-copyright Copyright Policy
|
||||||
@@ -111,7 +111,7 @@ By making a contribution to this project, I certify that:
|
|||||||
Free Software Foundation; either version 2.1 of
|
Free Software Foundation; either version 2.1 of
|
||||||
the License, or (at the option of the project) any later version.
|
the License, or (at the option of the project) any later version.
|
||||||
|
|
||||||
https://www.gnu.org/licenses/lgpl-2.1.html
|
http://www.gnu.org/licenses/lgpl-2.1.html
|
||||||
@endverbatim
|
@endverbatim
|
||||||
|
|
||||||
We will maintain a copy of that email as a record that you have the rights to
|
We will maintain a copy of that email as a record that you have the rights to
|
||||||
@@ -151,81 +151,47 @@ The libssh Team
|
|||||||
|
|
||||||
The following RFC documents described SSH-2 protcol as an Internet standard.
|
The following RFC documents described SSH-2 protcol as an Internet standard.
|
||||||
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc4250" target="_blank">RFC 4250</a>,
|
- <a href="http://tools.ietf.org/html/rfc4250" target="_blank">RFC 4250</a>,
|
||||||
The Secure Shell (SSH) Protocol Assigned Numbers
|
The Secure Shell (SSH) Protocol Assigned Numbers
|
||||||
- <a href="https://tools.ietf.org/html/rfc4251" target="_blank">RFC 4251</a>,
|
- <a href="http://tools.ietf.org/html/rfc4251" target="_blank">RFC 4251</a>,
|
||||||
The Secure Shell (SSH) Protocol Architecture
|
The Secure Shell (SSH) Protocol Architecture
|
||||||
- <a href="https://tools.ietf.org/html/rfc4252" target="_blank">RFC 4252</a>,
|
- <a href="http://tools.ietf.org/html/rfc4252" target="_blank">RFC 4252</a>,
|
||||||
The Secure Shell (SSH) Authentication Protocol
|
The Secure Shell (SSH) Authentication Protocol
|
||||||
- <a href="https://tools.ietf.org/html/rfc4253" target="_blank">RFC 4253</a>,
|
- <a href="http://tools.ietf.org/html/rfc4253" target="_blank">RFC 4253</a>,
|
||||||
The Secure Shell (SSH) Transport Layer Protocol
|
The Secure Shell (SSH) Transport Layer Protocol
|
||||||
- <a href="https://tools.ietf.org/html/rfc4254" target="_blank">RFC 4254</a>,
|
- <a href="http://tools.ietf.org/html/rfc4254" target="_blank">RFC 4254</a>,
|
||||||
The Secure Shell (SSH) Connection Protocol
|
The Secure Shell (SSH) Connection Protocol
|
||||||
- <a href="https://tools.ietf.org/html/rfc4255" target="_blank">RFC 4255</a>,
|
- <a href="http://tools.ietf.org/html/rfc4255" target="_blank">RFC 4255</a>,
|
||||||
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
|
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
|
||||||
(not implemented in libssh)
|
- <a href="http://tools.ietf.org/html/rfc4256" target="_blank">RFC 4256</a>,
|
||||||
- <a href="https://tools.ietf.org/html/rfc4256" target="_blank">RFC 4256</a>,
|
|
||||||
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
|
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
|
||||||
- <a href="https://tools.ietf.org/html/rfc4335" target="_blank">RFC 4335</a>,
|
- <a href="http://tools.ietf.org/html/rfc4335" target="_blank">RFC 4335</a>,
|
||||||
The Secure Shell (SSH) Session Channel Break Extension
|
The Secure Shell (SSH) Session Channel Break Extension
|
||||||
- <a href="https://tools.ietf.org/html/rfc4344" target="_blank">RFC 4344</a>,
|
- <a href="http://tools.ietf.org/html/rfc4344" target="_blank">RFC 4344</a>,
|
||||||
The Secure Shell (SSH) Transport Layer Encryption Modes
|
The Secure Shell (SSH) Transport Layer Encryption Modes
|
||||||
- <a href="https://tools.ietf.org/html/rfc4345" target="_blank">RFC 4345</a>,
|
- <a href="http://tools.ietf.org/html/rfc4345" target="_blank">RFC 4345</a>,
|
||||||
Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol
|
Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol
|
||||||
|
|
||||||
It was later modified and expanded by the following RFCs.
|
It was later modified and expanded by the following RFCs.
|
||||||
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc4419" target="_blank">RFC 4419</a>,
|
- <a href="http://tools.ietf.org/html/rfc4419" target="_blank">RFC 4419</a>,
|
||||||
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer
|
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer
|
||||||
Protocol
|
Protocol
|
||||||
- <a href="https://tools.ietf.org/html/rfc4432" target="_blank">RFC 4432</a>,
|
- <a href="http://tools.ietf.org/html/rfc4432" target="_blank">RFC 4432</a>,
|
||||||
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol
|
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol
|
||||||
(not implemented in libssh)
|
- <a href="http://tools.ietf.org/html/rfc4462" target="_blank">RFC 4462</a>,
|
||||||
- <a href="https://tools.ietf.org/html/rfc4462" target="_blank">RFC 4462</a>,
|
|
||||||
Generic Security Service Application Program Interface (GSS-API)
|
Generic Security Service Application Program Interface (GSS-API)
|
||||||
Authentication and Key Exchange for the Secure Shell (SSH) Protocol
|
Authentication and Key Exchange for the Secure Shell (SSH) Protocol
|
||||||
(only the authentication implemented in libssh)
|
- <a href="http://tools.ietf.org/html/rfc4716" target="_blank">RFC 4716</a>,
|
||||||
- <a href="https://tools.ietf.org/html/rfc4716" target="_blank">RFC 4716</a>,
|
|
||||||
The Secure Shell (SSH) Public Key File Format
|
The Secure Shell (SSH) Public Key File Format
|
||||||
(not implemented in libssh)
|
- <a href="http://tools.ietf.org/html/rfc5647" target="_blank">RFC 5647</a>,
|
||||||
- <a href="https://tools.ietf.org/html/rfc5647" target="_blank">RFC 5647</a>,
|
|
||||||
AES Galois Counter Mode for the Secure Shell Transport Layer Protocol
|
AES Galois Counter Mode for the Secure Shell Transport Layer Protocol
|
||||||
(the algorithm negotiation implemented according to openssh.com)
|
- <a href="http://tools.ietf.org/html/rfc5656" target="_blank">RFC 5656</a>,
|
||||||
- <a href="https://tools.ietf.org/html/rfc5656" target="_blank">RFC 5656</a>,
|
|
||||||
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
|
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
|
||||||
- <a href="https://tools.ietf.org/html/rfc6594" target="_blank">RFC 6594</a>,
|
|
||||||
Use of the SHA-256 Algorithm with RSA, DSA, and ECDSA in SSHFP Resource Records
|
|
||||||
(not implemented in libssh)
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc6668" target="_blank">RFC 6668</a>,
|
|
||||||
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc7479" target="_blank">RFC 7479</a>,
|
|
||||||
Using Ed25519 in SSHFP Resource Records
|
|
||||||
(not implemented in libssh)
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc8160" target="_blank">RFC 8160</a>,
|
|
||||||
IUTF8 Terminal Mode in Secure Shell (SSH)
|
|
||||||
(not handled in libssh)
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc8270" target="_blank">RFC 8270</a>,
|
|
||||||
Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc8308" target="_blank">RFC 8308</a>,
|
|
||||||
Extension Negotiation in the Secure Shell (SSH) Protocol
|
|
||||||
(only the "server-sig-algs" extension implemented)
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc8332" target="_blank">RFC 8332</a>,
|
|
||||||
Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol
|
|
||||||
- <a href="https://tools.ietf.org/html/rfc8709" target="_blank">RFC 8709</a>,
|
|
||||||
Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol
|
|
||||||
|
|
||||||
There are also drafts that are being currently developed and followed.
|
|
||||||
|
|
||||||
- <a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-10" target="_blank">draft-ietf-curdle-ssh-kex-sha2-10</a>
|
|
||||||
Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)
|
|
||||||
- <a href="https://tools.ietf.org/html/draft-miller-ssh-agent-03" target="_blank">draft-miller-ssh-agent-03</a>
|
|
||||||
SSH Agent Protocol
|
|
||||||
- <a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-curves-12" target="_blank">draft-ietf-curdle-ssh-curves-12</a>
|
|
||||||
Secure Shell (SSH) Key Exchange Method using Curve25519 and Curve448
|
|
||||||
|
|
||||||
Interesting cryptography documents:
|
Interesting cryptography documents:
|
||||||
|
|
||||||
- <a href="https://www.cryptsoft.com/pkcs11doc/" target="_blank">PKCS #11</a>, PKCS #11 reference documents, describing interface with smartcards.
|
- <a href="http://www.cryptsoft.com/pkcs11doc/" target="_blank">PKCS #11</a>, PKCS #11 reference documents, describing interface with smartcards.
|
||||||
|
|
||||||
@subsection main-rfc-sftp Secure Shell File Transfer Protocol (SFTP)
|
@subsection main-rfc-sftp Secure Shell File Transfer Protocol (SFTP)
|
||||||
|
|
||||||
@@ -233,22 +199,26 @@ The protocol is not an Internet standard but it is still widely implemented.
|
|||||||
OpenSSH and most other implementation implement Version 3 of the protocol. We
|
OpenSSH and most other implementation implement Version 3 of the protocol. We
|
||||||
do the same in libssh.
|
do the same in libssh.
|
||||||
|
|
||||||
- <a href="https://tools.ietf.org/html/draft-ietf-secsh-filexfer-02" target="_blank">
|
- <a href="http://tools.ietf.org/html/draft-ietf-secsh-filexfer-02" target="_blank">
|
||||||
draft-ietf-secsh-filexfer-02.txt</a>,
|
draft-ietf-secsh-filexfer-02.txt</a>,
|
||||||
SSH File Transfer Protocol
|
SSH File Transfer Protocol
|
||||||
|
|
||||||
@subsection main-rfc-extensions Secure Shell Extensions
|
@subsection main-rfc-extensions Secure Shell Extensions
|
||||||
|
|
||||||
|
The libssh project has an extension to support Curve25519 which is also supported by
|
||||||
|
the OpenSSH project.
|
||||||
|
|
||||||
|
- <a href="http://git.libssh.org/projects/libssh.git/tree/doc/curve25519-sha256@libssh.org.txt" target="_blank">curve25519-sha256@libssh.org</a>,
|
||||||
|
Curve25519-SHA256 for ECDH KEX
|
||||||
|
|
||||||
The OpenSSH project has defined some extensions to the protocol. We support some of
|
The OpenSSH project has defined some extensions to the protocol. We support some of
|
||||||
them like the statvfs calls in SFTP or the ssh-agent.
|
them like the statvfs calls in SFTP or the ssh-agent.
|
||||||
|
|
||||||
- <a href="https://api.libssh.org/rfc/PROTOCOL" target="_blank">
|
- <a href="http://api.libssh.org/rfc/PROTOCOL" target="_blank">
|
||||||
OpenSSH's deviations and extensions</a>
|
OpenSSH's deviations and extensions</a>
|
||||||
- <a href="https://api.libssh.org/rfc/PROTOCOL.certkeys" target="_blank">
|
- <a href="http://api.libssh.org/rfc/PROTOCOL.agent" target="_blank">
|
||||||
|
OpenSSH's ssh-agent</a>
|
||||||
|
- <a href="http://api.libssh.org/rfc/PROTOCOL.certkeys" target="_blank">
|
||||||
OpenSSH's pubkey certificate authentication</a>
|
OpenSSH's pubkey certificate authentication</a>
|
||||||
- <a href="https://api.libssh.org/rfc/PROTOCOL.chacha20poly1305" target="_blank">
|
|
||||||
chacha20-poly1305@openssh.com authenticated encryption mode</a>
|
|
||||||
- <a href="https://api.libssh.org/rfc/PROTOCOL.key" target="_blank">
|
|
||||||
OpenSSH private key format (openssh-key-v1)</a>
|
|
||||||
|
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -1,67 +0,0 @@
|
|||||||
/**
|
|
||||||
@page libssh_tutor_pkcs11 Chapter 9: Authentication using PKCS #11 URIs
|
|
||||||
@section how_to How to use PKCS #11 URIs in libssh?
|
|
||||||
|
|
||||||
PKCS #11 is a Cryptographic Token Interface Standard that provides an API
|
|
||||||
to devices like smart cards that store cryptographic private information.
|
|
||||||
Such cryptographic devices are referenced as tokens. A mechanism through which
|
|
||||||
objects stored on the tokens can be uniquely identified is called PKCS #11 URI
|
|
||||||
(Uniform Resource Identifier) and is defined in RFC 7512
|
|
||||||
(https://tools.ietf.org/html/rfc7512).
|
|
||||||
|
|
||||||
Pre-requisites:
|
|
||||||
|
|
||||||
OpenSSL defines an abstract layer called the "engine" to achieve cryptographic
|
|
||||||
acceleration. The engine_pkcs11 module acts like an interface between the PKCS #11
|
|
||||||
modules and the OpenSSL engine.
|
|
||||||
|
|
||||||
To build and use libssh with PKCS #11 support:
|
|
||||||
1. Enable the cmake option: $ cmake -DWITH_PKCS11_URI=ON
|
|
||||||
2. Build with OpenSSL.
|
|
||||||
3. Install and configure engine_pkcs11 (https://github.com/OpenSC/libp11).
|
|
||||||
4. Plug in a working smart card or configure softhsm (https://www.opendnssec.org/softhsm).
|
|
||||||
|
|
||||||
The functions ssh_pki_import_pubkey_file() and ssh_pki_import_privkey_file() that
|
|
||||||
import the public and private keys from files respectively are now modified to support
|
|
||||||
PKCS #11 URIs. These functions automatically detect if the provided filename is a file path
|
|
||||||
or a PKCS #11 URI (when it begins with "pkcs11:"). If a PKCS #11 URI is detected,
|
|
||||||
the engine is loaded and initialized. Through the engine, the private/public key
|
|
||||||
corresponding to the PKCS #11 URI are loaded from the PKCS #11 device.
|
|
||||||
|
|
||||||
If you wish to authenticate using public keys on your own, follow the steps mentioned under
|
|
||||||
"Authentication with public keys" in Chapter 2 - A deeper insight into authentication.
|
|
||||||
|
|
||||||
The function pki_uri_import() is used to populate the public/private ssh_key from the
|
|
||||||
engine with PKCS #11 URIs as the look up.
|
|
||||||
|
|
||||||
Here is a minimalistic example of public key authentication using PKCS #11 URIs:
|
|
||||||
|
|
||||||
@code
|
|
||||||
int authenticate_pkcs11_URI(ssh_session session)
|
|
||||||
{
|
|
||||||
int rc;
|
|
||||||
char priv_uri[1042] = "pkcs11:token=my-token;object=my-object;type=private?pin-value=1234";
|
|
||||||
|
|
||||||
rc = ssh_options_set(session, SSH_OPTIONS_IDENTITY, priv_uri);
|
|
||||||
assert_int_equal(rc, SSH_OK)
|
|
||||||
|
|
||||||
rc = ssh_userauth_publickey_auto(session, NULL, NULL);
|
|
||||||
|
|
||||||
if (rc == SSH_AUTH_ERROR)
|
|
||||||
{
|
|
||||||
fprintf(stderr, "Authentication with PKCS #11 URIs failed: %s\n",
|
|
||||||
ssh_get_error(session));
|
|
||||||
return SSH_AUTH_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
@endcode
|
|
||||||
|
|
||||||
@subsection Caveats
|
|
||||||
|
|
||||||
We recommend the users to provide a specific PKCS #11 URI so that it matches only a single slot in the engine.
|
|
||||||
If the engine discovers multiple slots that could potentially contain the private keys referenced
|
|
||||||
by the provided PKCS #11 URI, the engine will not try to authenticate.
|
|
||||||
|
|
||||||
*/
|
|
||||||
@@ -61,7 +61,7 @@ int sftp_helloworld(ssh_session session)
|
|||||||
rc = sftp_init(sftp);
|
rc = sftp_init(sftp);
|
||||||
if (rc != SSH_OK)
|
if (rc != SSH_OK)
|
||||||
{
|
{
|
||||||
fprintf(stderr, "Error initializing SFTP session: code %d.\n",
|
fprintf(stderr, "Error initializing SFTP session: %s.\n",
|
||||||
sftp_get_error(sftp));
|
sftp_get_error(sftp));
|
||||||
sftp_free(sftp);
|
sftp_free(sftp);
|
||||||
return rc;
|
return rc;
|
||||||
|
|||||||
@@ -320,36 +320,18 @@ int interactive_shell_session(ssh_session session, ssh_channel channel)
|
|||||||
If your remote application is graphical, you can forward the X11 protocol to
|
If your remote application is graphical, you can forward the X11 protocol to
|
||||||
your local computer.
|
your local computer.
|
||||||
|
|
||||||
To do that, you first declare a callback to manage channel_open_request_x11_function.
|
To do that, you first declare that you accept X11 connections with
|
||||||
Then you create the forwarding tunnel for the X11 protocol with ssh_channel_request_x11().
|
ssh_channel_accept_x11(). Then you create the forwarding tunnel for
|
||||||
|
the X11 protocol with ssh_channel_request_x11().
|
||||||
|
|
||||||
The following code performs channel initialization and shell session
|
The following code performs channel initialization and shell session
|
||||||
opening, and handles a parallel X11 connection:
|
opening, and handles a parallel X11 connection:
|
||||||
|
|
||||||
@code
|
@code
|
||||||
#include <libssh/callbacks.h>
|
|
||||||
|
|
||||||
ssh_channel x11channel = NULL;
|
|
||||||
|
|
||||||
ssh_channel x11_open_request_callback(ssh_session session, const char *shost, int sport, void *userdata)
|
|
||||||
{
|
|
||||||
x11channel = ssh_channel_new(session);
|
|
||||||
return x11channel;
|
|
||||||
}
|
|
||||||
|
|
||||||
int interactive_shell_session(ssh_channel channel)
|
int interactive_shell_session(ssh_channel channel)
|
||||||
{
|
{
|
||||||
int rc;
|
int rc;
|
||||||
|
ssh_channel x11channel;
|
||||||
struct ssh_callbacks_struct cb =
|
|
||||||
{
|
|
||||||
.channel_open_request_x11_function = x11_open_request_callback,
|
|
||||||
.userdata = NULL
|
|
||||||
};
|
|
||||||
|
|
||||||
ssh_callbacks_init(&cb);
|
|
||||||
rc = ssh_set_callbacks(session, &cb);
|
|
||||||
if (rc != SSH_OK) return rc;
|
|
||||||
|
|
||||||
rc = ssh_channel_request_pty(channel);
|
rc = ssh_channel_request_pty(channel);
|
||||||
if (rc != SSH_OK) return rc;
|
if (rc != SSH_OK) return rc;
|
||||||
@@ -368,15 +350,12 @@ int interactive_shell_session(ssh_channel channel)
|
|||||||
}
|
}
|
||||||
@endcode
|
@endcode
|
||||||
|
|
||||||
Don't forget to check the $DISPLAY environment variable on the remote
|
Don't forget to set the $DISPLAY environment variable on the remote
|
||||||
side, or the remote applications won't try using the X11 tunnel:
|
side, or the remote applications won't try using the X11 tunnel:
|
||||||
|
|
||||||
@code
|
@code
|
||||||
$ echo $DISPLAY
|
$ export DISPLAY=:0
|
||||||
localhost:10.0
|
|
||||||
$ xclock &
|
$ xclock &
|
||||||
@endcode
|
@endcode
|
||||||
|
|
||||||
See an implementation example at https://gitlab.com/libssh/libssh-mirror/-/tree/master/examples/ssh_X11_client.c for details.
|
|
||||||
|
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -6,7 +6,10 @@ set(examples_SRCS
|
|||||||
connect_ssh.c
|
connect_ssh.c
|
||||||
)
|
)
|
||||||
|
|
||||||
include_directories(${libssh_BINARY_DIR}/include ${libssh_BINARY_DIR})
|
include_directories(
|
||||||
|
${LIBSSH_PUBLIC_INCLUDE_DIRS}
|
||||||
|
${CMAKE_BINARY_DIR}
|
||||||
|
)
|
||||||
|
|
||||||
if (ARGP_INCLUDE_DIR)
|
if (ARGP_INCLUDE_DIR)
|
||||||
include_directories(${ARGP_INCLUDE_DIR})
|
include_directories(${ARGP_INCLUDE_DIR})
|
||||||
@@ -15,85 +18,60 @@ endif()
|
|||||||
if (UNIX AND NOT WIN32)
|
if (UNIX AND NOT WIN32)
|
||||||
add_executable(libssh_scp libssh_scp.c ${examples_SRCS})
|
add_executable(libssh_scp libssh_scp.c ${examples_SRCS})
|
||||||
target_compile_options(libssh_scp PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(libssh_scp PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(libssh_scp ssh::ssh)
|
target_link_libraries(libssh_scp ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(scp_download scp_download.c ${examples_SRCS})
|
add_executable(scp_download scp_download.c ${examples_SRCS})
|
||||||
target_compile_options(scp_download PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(scp_download PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(scp_download ssh::ssh)
|
target_link_libraries(scp_download ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(sshnetcat sshnetcat.c ${examples_SRCS})
|
add_executable(sshnetcat sshnetcat.c ${examples_SRCS})
|
||||||
target_compile_options(sshnetcat PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(sshnetcat PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(sshnetcat ssh::ssh)
|
target_link_libraries(sshnetcat ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
if (WITH_SFTP)
|
if (WITH_SFTP)
|
||||||
add_executable(samplesftp samplesftp.c ${examples_SRCS})
|
add_executable(samplesftp samplesftp.c ${examples_SRCS})
|
||||||
target_compile_options(samplesftp PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(samplesftp PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(samplesftp ssh::ssh)
|
target_link_libraries(samplesftp ${LIBSSH_SHARED_LIBRARY})
|
||||||
endif (WITH_SFTP)
|
endif (WITH_SFTP)
|
||||||
|
|
||||||
add_executable(ssh-client ssh_client.c ${examples_SRCS})
|
add_executable(ssh-client ssh_client.c ${examples_SRCS})
|
||||||
target_compile_options(ssh-client PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(ssh-client PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(ssh-client ssh::ssh)
|
target_link_libraries(ssh-client ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(ssh-X11-client ssh_X11_client.c ${examples_SRCS})
|
|
||||||
target_compile_options(ssh-X11-client PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(ssh-X11-client ssh::ssh)
|
|
||||||
|
|
||||||
if (WITH_SERVER AND (ARGP_LIBRARY OR HAVE_ARGP_H))
|
if (WITH_SERVER AND (ARGP_LIBRARY OR HAVE_ARGP_H))
|
||||||
if (HAVE_LIBUTIL)
|
if (HAVE_LIBUTIL)
|
||||||
add_executable(ssh_server_fork ssh_server.c)
|
add_executable(ssh_server_fork ssh_server_fork.c)
|
||||||
target_compile_options(ssh_server_fork PRIVATE ${DEFAULT_C_COMPILE_FLAGS} -DWITH_FORK)
|
target_compile_options(ssh_server_fork PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(ssh_server_fork ssh::ssh ${ARGP_LIBRARY} util)
|
target_link_libraries(ssh_server_fork ${LIBSSH_SHARED_LIBRARY} ${ARGP_LIBRARY} util)
|
||||||
|
|
||||||
add_executable(ssh_server_pthread ssh_server.c)
|
|
||||||
target_compile_options(ssh_server_pthread PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(ssh_server_pthread ssh::ssh ${ARGP_LIBRARY} pthread util)
|
|
||||||
endif (HAVE_LIBUTIL)
|
endif (HAVE_LIBUTIL)
|
||||||
|
|
||||||
if (WITH_GSSAPI AND GSSAPI_FOUND)
|
if (WITH_GSSAPI AND GSSAPI_FOUND)
|
||||||
|
add_executable(samplesshd-cb samplesshd-cb.c)
|
||||||
|
target_compile_options(samplesshd-cb PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
|
target_link_libraries(samplesshd-cb ${LIBSSH_SHARED_LIBRARY} ${ARGP_LIBRARY})
|
||||||
|
|
||||||
add_executable(proxy proxy.c)
|
add_executable(proxy proxy.c)
|
||||||
target_compile_options(proxy PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(proxy PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(proxy ssh::ssh ${ARGP_LIBRARY})
|
target_link_libraries(proxy ${LIBSSH_SHARED_LIBRARY} ${ARGP_LIBRARY})
|
||||||
|
|
||||||
add_executable(sshd_direct-tcpip sshd_direct-tcpip.c)
|
|
||||||
target_compile_options(sshd_direct-tcpip PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(sshd_direct-tcpip ssh::ssh ${ARGP_LIBRARY})
|
|
||||||
endif (WITH_GSSAPI AND GSSAPI_FOUND)
|
endif (WITH_GSSAPI AND GSSAPI_FOUND)
|
||||||
|
|
||||||
add_executable(samplesshd-kbdint samplesshd-kbdint.c)
|
add_executable(samplesshd-kbdint samplesshd-kbdint.c)
|
||||||
target_compile_options(samplesshd-kbdint PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(samplesshd-kbdint PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(samplesshd-kbdint ssh::ssh ${ARGP_LIBRARY})
|
target_link_libraries(samplesshd-kbdint ${LIBSSH_SHARED_LIBRARY} ${ARGP_LIBRARY})
|
||||||
|
|
||||||
add_executable(keygen2 keygen2.c ${examples_SRCS})
|
|
||||||
target_compile_options(keygen2 PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(keygen2 ssh::ssh ${ARGP_LIBRARY})
|
|
||||||
|
|
||||||
endif()
|
endif()
|
||||||
endif (UNIX AND NOT WIN32)
|
endif (UNIX AND NOT WIN32)
|
||||||
|
|
||||||
if (WITH_SERVER)
|
|
||||||
add_executable(samplesshd-cb samplesshd-cb.c)
|
|
||||||
target_compile_options(samplesshd-cb PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(samplesshd-cb ssh::ssh)
|
|
||||||
if (ARGP_LIBRARY OR HAVE_ARGP_H)
|
|
||||||
target_link_libraries(samplesshd-cb ${ARGP_LIBRARY})
|
|
||||||
endif(ARGP_LIBRARY OR HAVE_ARGP_H)
|
|
||||||
endif()
|
|
||||||
|
|
||||||
add_executable(exec exec.c ${examples_SRCS})
|
add_executable(exec exec.c ${examples_SRCS})
|
||||||
target_compile_options(exec PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(exec PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(exec ssh::ssh)
|
target_link_libraries(exec ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(senddata senddata.c ${examples_SRCS})
|
add_executable(senddata senddata.c ${examples_SRCS})
|
||||||
target_compile_options(senddata PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
target_compile_options(senddata PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
||||||
target_link_libraries(senddata ssh::ssh)
|
target_link_libraries(senddata ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(keygen keygen.c)
|
|
||||||
target_compile_options(keygen PRIVATE ${DEFAULT_C_COMPILE_FLAGS})
|
|
||||||
target_link_libraries(keygen ssh::ssh)
|
|
||||||
|
|
||||||
add_executable(libsshpp libsshpp.cpp)
|
add_executable(libsshpp libsshpp.cpp)
|
||||||
target_link_libraries(libsshpp ssh::ssh)
|
target_link_libraries(libsshpp ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|
||||||
add_executable(libsshpp_noexcept libsshpp_noexcept.cpp)
|
add_executable(libsshpp_noexcept libsshpp_noexcept.cpp)
|
||||||
target_link_libraries(libsshpp_noexcept ssh::ssh)
|
target_link_libraries(libsshpp_noexcept ${LIBSSH_SHARED_LIBRARY})
|
||||||
|
|||||||
@@ -100,39 +100,6 @@ int authenticate_kbdint(ssh_session session, const char *password)
|
|||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int auth_keyfile(ssh_session session, char* keyfile)
|
|
||||||
{
|
|
||||||
ssh_key key = NULL;
|
|
||||||
char pubkey[132] = {0}; // +".pub"
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
snprintf(pubkey, sizeof(pubkey), "%s.pub", keyfile);
|
|
||||||
|
|
||||||
rc = ssh_pki_import_pubkey_file( pubkey, &key);
|
|
||||||
|
|
||||||
if (rc != SSH_OK)
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
|
|
||||||
rc = ssh_userauth_try_publickey(session, NULL, key);
|
|
||||||
|
|
||||||
ssh_key_free(key);
|
|
||||||
|
|
||||||
if (rc!=SSH_AUTH_SUCCESS)
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
|
|
||||||
rc = ssh_pki_import_privkey_file(keyfile, NULL, NULL, NULL, &key);
|
|
||||||
|
|
||||||
if (rc != SSH_OK)
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
|
|
||||||
rc = ssh_userauth_publickey(session, NULL, key);
|
|
||||||
|
|
||||||
ssh_key_free(key);
|
|
||||||
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static void error(ssh_session session)
|
static void error(ssh_session session)
|
||||||
{
|
{
|
||||||
fprintf(stderr,"Authentication failed: %s\n",ssh_get_error(session));
|
fprintf(stderr,"Authentication failed: %s\n",ssh_get_error(session));
|
||||||
@@ -173,35 +140,6 @@ int authenticate_console(ssh_session session)
|
|||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
{
|
|
||||||
char buffer[128] = {0};
|
|
||||||
char *p = NULL;
|
|
||||||
|
|
||||||
printf("Automatic pubkey failed. "
|
|
||||||
"Do you want to try a specific key? (y/n)\n");
|
|
||||||
if (fgets(buffer, sizeof(buffer), stdin) == NULL) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if ((buffer[0]=='Y') || (buffer[0]=='y')) {
|
|
||||||
printf("private key filename: ");
|
|
||||||
|
|
||||||
if (fgets(buffer, sizeof(buffer), stdin) == NULL) {
|
|
||||||
return SSH_AUTH_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
buffer[sizeof(buffer) - 1] = '\0';
|
|
||||||
if ((p = strchr(buffer, '\n'))) {
|
|
||||||
*p = '\0';
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = auth_keyfile(session, buffer);
|
|
||||||
|
|
||||||
if(rc == SSH_AUTH_SUCCESS) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
fprintf(stderr, "failed with key\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to authenticate with keyboard interactive";
|
// Try to authenticate with keyboard interactive";
|
||||||
if (method & SSH_AUTH_METHOD_INTERACTIVE) {
|
if (method & SSH_AUTH_METHOD_INTERACTIVE) {
|
||||||
@@ -234,7 +172,7 @@ int authenticate_console(ssh_session session)
|
|||||||
banner = ssh_get_issue_banner(session);
|
banner = ssh_get_issue_banner(session);
|
||||||
if (banner) {
|
if (banner) {
|
||||||
printf("%s\n",banner);
|
printf("%s\n",banner);
|
||||||
SSH_STRING_FREE_CHAR(banner);
|
ssh_string_free_char(banner);
|
||||||
}
|
}
|
||||||
|
|
||||||
return rc;
|
return rc;
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ int main(void) {
|
|||||||
ssh_session session;
|
ssh_session session;
|
||||||
ssh_channel channel;
|
ssh_channel channel;
|
||||||
char buffer[256];
|
char buffer[256];
|
||||||
int rbytes, wbytes, total = 0;
|
int nbytes;
|
||||||
int rc;
|
int rc;
|
||||||
|
|
||||||
session = connect_ssh("localhost", NULL, 0);
|
session = connect_ssh("localhost", NULL, 0);
|
||||||
@@ -17,7 +17,7 @@ int main(void) {
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
channel = ssh_channel_new(session);;
|
||||||
if (channel == NULL) {
|
if (channel == NULL) {
|
||||||
ssh_disconnect(session);
|
ssh_disconnect(session);
|
||||||
ssh_free(session);
|
ssh_free(session);
|
||||||
@@ -35,30 +35,15 @@ int main(void) {
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
rbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0);
|
nbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0);
|
||||||
if (rbytes <= 0) {
|
while (nbytes > 0) {
|
||||||
goto failed;
|
if (fwrite(buffer, 1, nbytes, stdout) != (unsigned int) nbytes) {
|
||||||
}
|
|
||||||
|
|
||||||
do {
|
|
||||||
wbytes = fwrite(buffer + total, 1, rbytes, stdout);
|
|
||||||
if (wbytes <= 0) {
|
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
nbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0);
|
||||||
|
}
|
||||||
|
|
||||||
total += wbytes;
|
if (nbytes < 0) {
|
||||||
|
|
||||||
/* When it was not possible to write the whole buffer to stdout */
|
|
||||||
if (wbytes < rbytes) {
|
|
||||||
rbytes -= wbytes;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
rbytes = ssh_channel_read(channel, buffer, sizeof(buffer), 0);
|
|
||||||
total = 0;
|
|
||||||
} while (rbytes > 0);
|
|
||||||
|
|
||||||
if (rbytes < 0) {
|
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,41 +0,0 @@
|
|||||||
/* keygen.c
|
|
||||||
* Sample implementation of ssh-keygen using libssh
|
|
||||||
*/
|
|
||||||
|
|
||||||
/*
|
|
||||||
Copyright 2019 Red Hat, Inc.
|
|
||||||
|
|
||||||
Author: Jakub Jelen <jjelen@redhat.com>
|
|
||||||
|
|
||||||
This file is part of the SSH Library
|
|
||||||
|
|
||||||
You are free to copy this file, modify it in any way, consider it being public
|
|
||||||
domain. This does not apply to the rest of the library though, but it is
|
|
||||||
allowed to cut-and-paste working code from this file to any license of
|
|
||||||
program.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <libssh/libssh.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
|
|
||||||
int main(void)
|
|
||||||
{
|
|
||||||
ssh_key key = NULL;
|
|
||||||
int rv;
|
|
||||||
|
|
||||||
/* Generate a new ED25519 private key file */
|
|
||||||
rv = ssh_pki_generate(SSH_KEYTYPE_ED25519, 0, &key);
|
|
||||||
if (rv != SSH_OK) {
|
|
||||||
fprintf(stderr, "Failed to generate private key");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Write it to a file testkey in the current dirrectory */
|
|
||||||
rv = ssh_pki_export_privkey_file(key, NULL, NULL, NULL, "testkey");
|
|
||||||
if (rv != SSH_OK) {
|
|
||||||
fprintf(stderr, "Failed to write private key file");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
@@ -1,505 +0,0 @@
|
|||||||
/*
|
|
||||||
* keygen2.c - Generate SSH keys using libssh
|
|
||||||
* Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
|
|
||||||
*/
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Copyright (c) 2019 Red Hat, Inc.
|
|
||||||
*
|
|
||||||
* This program is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2 of the License, or
|
|
||||||
* (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This program is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
* GNU General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU General Public License
|
|
||||||
* along with this program. If not, see http://www.gnu.org/licenses/.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include "config.h"
|
|
||||||
|
|
||||||
#include <libssh/libssh.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <argp.h>
|
|
||||||
#include <errno.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include <ctype.h>
|
|
||||||
#include <fcntl.h>
|
|
||||||
|
|
||||||
#include <sys/stat.h>
|
|
||||||
|
|
||||||
struct arguments_st {
|
|
||||||
enum ssh_keytypes_e type;
|
|
||||||
unsigned long bits;
|
|
||||||
char *file;
|
|
||||||
char *passphrase;
|
|
||||||
int action_list;
|
|
||||||
};
|
|
||||||
|
|
||||||
static struct argp_option options[] = {
|
|
||||||
{
|
|
||||||
.name = "bits",
|
|
||||||
.key = 'b',
|
|
||||||
.arg = "BITS",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "The size of the key to be generated. "
|
|
||||||
"If omitted, a default value is used depending on the TYPE. "
|
|
||||||
"Accepted values are: "
|
|
||||||
"1024, 2048, 3072 (default), 4096, and 8192 for TYPE=\"rsa\"; "
|
|
||||||
"256 (default), 384, and 521 for TYPE=\"ecdsa\"; "
|
|
||||||
"1024 (default) and 2048 for TYPE=\"dsa\"; "
|
|
||||||
"can be omitted for TYPE=\"ed25519\" "
|
|
||||||
"(it will be ignored if provided).\n",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "file",
|
|
||||||
.key = 'f',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "The output file. "
|
|
||||||
"If not provided, the used file name will be generated "
|
|
||||||
"according to the key type as \"id_TYPE\" "
|
|
||||||
"(e.g. \"id_rsa\" for type \"rsa\"). "
|
|
||||||
"The public key file name is generated from the private key "
|
|
||||||
"file name by appending \".pub\".\n",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "passphrase",
|
|
||||||
.key = 'p',
|
|
||||||
.arg = "PASSPHRASE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "The passphrase used to encrypt the private key. "
|
|
||||||
"If omitted the file will not be encrypted.\n",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "type",
|
|
||||||
.key = 't',
|
|
||||||
.arg = "TYPE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "The type of the key to be generated. "
|
|
||||||
"Accepted values are: "
|
|
||||||
"\"rsa\", \"ecdsa\", \"ed25519\", and \"dsa\".\n",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "list",
|
|
||||||
.key = 'l',
|
|
||||||
.arg = NULL,
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "List the Fingerprint of the given key\n",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
/* End of the options */
|
|
||||||
0
|
|
||||||
},
|
|
||||||
};
|
|
||||||
|
|
||||||
/* Parse a single option. */
|
|
||||||
static error_t parse_opt (int key, char *arg, struct argp_state *state)
|
|
||||||
{
|
|
||||||
/* Get the input argument from argp_parse, which we
|
|
||||||
* know is a pointer to our arguments structure.
|
|
||||||
*/
|
|
||||||
struct arguments_st *arguments = NULL;
|
|
||||||
error_t rc = 0;
|
|
||||||
|
|
||||||
if (state == NULL) {
|
|
||||||
return EINVAL;
|
|
||||||
}
|
|
||||||
|
|
||||||
arguments = state->input;
|
|
||||||
if (arguments == NULL) {
|
|
||||||
fprintf(stderr, "Error: NULL pointer to arguments structure "
|
|
||||||
"provided\n");
|
|
||||||
rc = EINVAL;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (key) {
|
|
||||||
case 'b':
|
|
||||||
errno = 0;
|
|
||||||
arguments->bits = strtoul(arg, NULL, 10);
|
|
||||||
if (errno != 0) {
|
|
||||||
rc = errno;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case 'f':
|
|
||||||
arguments->file = strdup(arg);
|
|
||||||
if (arguments->file == NULL) {
|
|
||||||
fprintf(stderr, "Error: Out of memory\n");
|
|
||||||
rc = ENOMEM;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case 'p':
|
|
||||||
arguments->passphrase = strdup(arg);
|
|
||||||
if (arguments->passphrase == NULL) {
|
|
||||||
fprintf(stderr, "Error: Out of memory\n");
|
|
||||||
rc = ENOMEM;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case 't':
|
|
||||||
if (!strcmp(arg, "rsa")) {
|
|
||||||
arguments->type = SSH_KEYTYPE_RSA;
|
|
||||||
}
|
|
||||||
else if (!strcmp(arg, "dsa")) {
|
|
||||||
arguments->type = SSH_KEYTYPE_DSS;
|
|
||||||
}
|
|
||||||
else if (!strcmp(arg, "ecdsa")) {
|
|
||||||
arguments->type = SSH_KEYTYPE_ECDSA;
|
|
||||||
}
|
|
||||||
else if (!strcmp(arg, "ed25519")) {
|
|
||||||
arguments->type = SSH_KEYTYPE_ED25519;
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
fprintf(stderr, "Error: Invalid key type\n");
|
|
||||||
argp_usage(state);
|
|
||||||
rc = EINVAL;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case 'l':
|
|
||||||
arguments->action_list = 1;
|
|
||||||
break;
|
|
||||||
case ARGP_KEY_ARG:
|
|
||||||
if (state->arg_num > 0) {
|
|
||||||
/* Too many arguments. */
|
|
||||||
printf("Error: Too many arguments\n");
|
|
||||||
argp_usage(state);
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case ARGP_KEY_END:
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
return ARGP_ERR_UNKNOWN;
|
|
||||||
}
|
|
||||||
|
|
||||||
end:
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int validate_args(struct arguments_st *args)
|
|
||||||
{
|
|
||||||
int rc = 0;
|
|
||||||
|
|
||||||
if (args == NULL) {
|
|
||||||
return EINVAL;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* no other arguments needed for listing key fingerprints */
|
|
||||||
if (args->action_list) {
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (args->type) {
|
|
||||||
case SSH_KEYTYPE_RSA:
|
|
||||||
switch (args->bits) {
|
|
||||||
case 0:
|
|
||||||
/* If not provided, use default value */
|
|
||||||
args->bits = 3072;
|
|
||||||
break;
|
|
||||||
case 1024:
|
|
||||||
case 2048:
|
|
||||||
case 3072:
|
|
||||||
case 4096:
|
|
||||||
case 8192:
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
fprintf(stderr, "Error: Invalid bits parameter provided\n");
|
|
||||||
rc = EINVAL;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (args->file == NULL) {
|
|
||||||
args->file = strdup("id_rsa");
|
|
||||||
if (args->file == NULL) {
|
|
||||||
rc = ENOMEM;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
case SSH_KEYTYPE_ECDSA:
|
|
||||||
switch (args->bits) {
|
|
||||||
case 0:
|
|
||||||
/* If not provided, use default value */
|
|
||||||
args->bits = 256;
|
|
||||||
break;
|
|
||||||
case 256:
|
|
||||||
case 384:
|
|
||||||
case 521:
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
fprintf(stderr, "Error: Invalid bits parameter provided\n");
|
|
||||||
rc = EINVAL;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if (args->file == NULL) {
|
|
||||||
args->file = strdup("id_ecdsa");
|
|
||||||
if (args->file == NULL) {
|
|
||||||
rc = ENOMEM;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
case SSH_KEYTYPE_DSS:
|
|
||||||
switch (args->bits) {
|
|
||||||
case 0:
|
|
||||||
/* If not provided, use default value */
|
|
||||||
args->bits = 1024;
|
|
||||||
break;
|
|
||||||
case 1024:
|
|
||||||
case 2048:
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
fprintf(stderr, "Error: Invalid bits parameter provided\n");
|
|
||||||
rc = EINVAL;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if (args->file == NULL) {
|
|
||||||
args->file = strdup("id_dsa");
|
|
||||||
if (args->file == NULL) {
|
|
||||||
rc = ENOMEM;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
case SSH_KEYTYPE_ED25519:
|
|
||||||
/* Ignore value and overwrite with a zero */
|
|
||||||
args->bits = 0;
|
|
||||||
|
|
||||||
if (args->file == NULL) {
|
|
||||||
args->file = strdup("id_ed25519");
|
|
||||||
if (args->file == NULL) {
|
|
||||||
rc = ENOMEM;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
fprintf(stderr, "Error: unknown key type\n");
|
|
||||||
rc = EINVAL;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Program documentation. */
|
|
||||||
static char doc[] = "Generate an SSH key pair. "
|
|
||||||
"The \"--type\" (short: \"-t\") option is required.";
|
|
||||||
|
|
||||||
/* Our argp parser */
|
|
||||||
static struct argp argp = {options, parse_opt, NULL, doc, NULL, NULL, NULL};
|
|
||||||
|
|
||||||
static void
|
|
||||||
list_fingerprint(char *file)
|
|
||||||
{
|
|
||||||
ssh_key key = NULL;
|
|
||||||
unsigned char *hash = NULL;
|
|
||||||
size_t hlen = 0;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
rc = ssh_pki_import_privkey_file(file, NULL, NULL, NULL, &key);
|
|
||||||
if (rc != SSH_OK) {
|
|
||||||
fprintf(stderr, "Failed to import private key %s\n", file);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = ssh_get_publickey_hash(key, SSH_PUBLICKEY_HASH_SHA256, &hash, &hlen);
|
|
||||||
if (rc != SSH_OK) {
|
|
||||||
fprintf(stderr, "Failed to get key fingerprint\n");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
ssh_print_hash(SSH_PUBLICKEY_HASH_SHA256, hash, hlen);
|
|
||||||
|
|
||||||
ssh_clean_pubkey_hash(&hash);
|
|
||||||
ssh_key_free(key);
|
|
||||||
}
|
|
||||||
|
|
||||||
int main(int argc, char *argv[])
|
|
||||||
{
|
|
||||||
ssh_key key = NULL;
|
|
||||||
int rc = 0;
|
|
||||||
char overwrite[1024] = "";
|
|
||||||
|
|
||||||
char *pubkey_file = NULL;
|
|
||||||
|
|
||||||
struct arguments_st arguments = {
|
|
||||||
.type = SSH_KEYTYPE_UNKNOWN,
|
|
||||||
.bits = 0,
|
|
||||||
.file = NULL,
|
|
||||||
.passphrase = NULL,
|
|
||||||
.action_list = 0,
|
|
||||||
};
|
|
||||||
|
|
||||||
if (argc < 2) {
|
|
||||||
argp_help(&argp, stdout, ARGP_HELP_DOC | ARGP_HELP_USAGE, argv[0]);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = argp_parse(&argp, argc, argv, 0, 0, &arguments);
|
|
||||||
if (rc != 0) {
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc = validate_args(&arguments);
|
|
||||||
if (rc != 0) {
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (arguments.action_list && arguments.file) {
|
|
||||||
list_fingerprint(arguments.file);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
errno = 0;
|
|
||||||
rc = open(arguments.file, O_CREAT | O_EXCL | O_WRONLY, S_IRUSR | S_IWUSR);
|
|
||||||
if (rc < 0) {
|
|
||||||
if (errno == EEXIST) {
|
|
||||||
printf("File \"%s\" exists. Overwrite it? (y|n) ", arguments.file);
|
|
||||||
rc = scanf("%1023s", overwrite);
|
|
||||||
if (rc > 0 && tolower(overwrite[0]) == 'y') {
|
|
||||||
rc = open(arguments.file, O_WRONLY);
|
|
||||||
if (rc > 0) {
|
|
||||||
close(rc);
|
|
||||||
errno = 0;
|
|
||||||
rc = chmod(arguments.file, S_IRUSR | S_IWUSR);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Error(%d): Could not set file permissions\n",
|
|
||||||
errno);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Error: Could not create private key file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
fprintf(stderr, "Error opening \"%s\" file\n", arguments.file);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
close(rc);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Generate a new private key */
|
|
||||||
rc = ssh_pki_generate(arguments.type, arguments.bits, &key);
|
|
||||||
if (rc != SSH_OK) {
|
|
||||||
fprintf(stderr, "Error: Failed to generate keys");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Write the private key */
|
|
||||||
rc = ssh_pki_export_privkey_file(key, arguments.passphrase, NULL, NULL,
|
|
||||||
arguments.file);
|
|
||||||
if (rc != SSH_OK) {
|
|
||||||
fprintf(stderr, "Error: Failed to write private key file");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If a passphrase was provided, overwrite and free it as it is not needed
|
|
||||||
* anymore */
|
|
||||||
if (arguments.passphrase != NULL) {
|
|
||||||
#ifdef HAVE_EXPLICIT_BZERO
|
|
||||||
explicit_bzero(arguments.passphrase, strlen(arguments.passphrase));
|
|
||||||
#else
|
|
||||||
bzero(arguments.passphrase, strlen(arguments.passphrase));
|
|
||||||
#endif
|
|
||||||
free(arguments.passphrase);
|
|
||||||
arguments.passphrase = NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
pubkey_file = (char *)malloc(strlen(arguments.file) + 5);
|
|
||||||
if (pubkey_file == NULL) {
|
|
||||||
rc = ENOMEM;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
sprintf(pubkey_file, "%s.pub", arguments.file);
|
|
||||||
|
|
||||||
errno = 0;
|
|
||||||
rc = open(pubkey_file,
|
|
||||||
O_CREAT | O_EXCL | O_WRONLY,
|
|
||||||
S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
|
|
||||||
if (rc < 0) {
|
|
||||||
if (errno == EEXIST) {
|
|
||||||
printf("File \"%s\" exists. Overwrite it? (y|n) ", pubkey_file);
|
|
||||||
rc = scanf("%1023s", overwrite);
|
|
||||||
if (rc > 0 && tolower(overwrite[0]) == 'y') {
|
|
||||||
rc = open(pubkey_file, O_WRONLY);
|
|
||||||
if (rc > 0) {
|
|
||||||
close(rc);
|
|
||||||
errno = 0;
|
|
||||||
rc = chmod(pubkey_file,
|
|
||||||
S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Error(%d): Could not set file permissions\n",
|
|
||||||
errno);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Error: Could not create public key file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
fprintf(stderr, "Error opening \"%s\" file\n", pubkey_file);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
close(rc);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Write the public key */
|
|
||||||
rc = ssh_pki_export_pubkey_file(key, pubkey_file);
|
|
||||||
if (rc != SSH_OK) {
|
|
||||||
fprintf(stderr, "Error: Failed to write public key file");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
end:
|
|
||||||
if (key != NULL) {
|
|
||||||
ssh_key_free(key);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (arguments.file != NULL) {
|
|
||||||
free(arguments.file);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (arguments.passphrase != NULL) {
|
|
||||||
#ifdef HAVE_EXPLICIT_BZERO
|
|
||||||
explicit_bzero(arguments.passphrase, strlen(arguments.passphrase));
|
|
||||||
#else
|
|
||||||
bzero(arguments.passphrase, strlen(arguments.passphrase));
|
|
||||||
#endif
|
|
||||||
free(arguments.passphrase);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (pubkey_file != NULL) {
|
|
||||||
free(pubkey_file);
|
|
||||||
}
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
@@ -22,10 +22,6 @@ program.
|
|||||||
#include <libssh/libssh.h>
|
#include <libssh/libssh.h>
|
||||||
#include "examples_common.h"
|
#include "examples_common.h"
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 16384
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static char **sources;
|
static char **sources;
|
||||||
static int nsources;
|
static int nsources;
|
||||||
static char *destination;
|
static char *destination;
|
||||||
@@ -109,6 +105,10 @@ static void location_free(struct location *loc)
|
|||||||
free(loc->user);
|
free(loc->user);
|
||||||
}
|
}
|
||||||
loc->user = NULL;
|
loc->user = NULL;
|
||||||
|
if (loc->host) {
|
||||||
|
free(loc->host);
|
||||||
|
}
|
||||||
|
loc->host = NULL;
|
||||||
}
|
}
|
||||||
free(loc);
|
free(loc);
|
||||||
}
|
}
|
||||||
@@ -233,7 +233,7 @@ static int open_location(struct location *loc, int flag) {
|
|||||||
loc->file = fopen(loc->path, flag == READ ? "r":"w");
|
loc->file = fopen(loc->path, flag == READ ? "r":"w");
|
||||||
if (!loc->file) {
|
if (!loc->file) {
|
||||||
if (errno == EISDIR) {
|
if (errno == EISDIR) {
|
||||||
if (loc->path != NULL && chdir(loc->path)) {
|
if (chdir(loc->path)) {
|
||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error changing directory to %s: %s\n",
|
"Error changing directory to %s: %s\n",
|
||||||
loc->path, strerror(errno));
|
loc->path, strerror(errno));
|
||||||
@@ -257,15 +257,14 @@ static int open_location(struct location *loc, int flag) {
|
|||||||
* @param recursive Copy also directories
|
* @param recursive Copy also directories
|
||||||
*/
|
*/
|
||||||
static int do_copy(struct location *src, struct location *dest, int recursive) {
|
static int do_copy(struct location *src, struct location *dest, int recursive) {
|
||||||
size_t size;
|
int size;
|
||||||
socket_t fd;
|
socket_t fd;
|
||||||
struct stat s;
|
struct stat s;
|
||||||
int w, r;
|
int w, r;
|
||||||
char buffer[BUF_SIZE];
|
char buffer[16384];
|
||||||
size_t total = 0;
|
int total = 0;
|
||||||
mode_t mode;
|
int mode;
|
||||||
char *filename = NULL;
|
char *filename = NULL;
|
||||||
|
|
||||||
/* recursive mode doesn't work yet */
|
/* recursive mode doesn't work yet */
|
||||||
(void)recursive;
|
(void)recursive;
|
||||||
/* Get the file name and size*/
|
/* Get the file name and size*/
|
||||||
@@ -303,7 +302,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error: %s\n",
|
"Error: %s\n",
|
||||||
ssh_get_error(src->session));
|
ssh_get_error(src->session));
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
} while(r != SSH_SCP_REQUEST_NEWFILE);
|
} while(r != SSH_SCP_REQUEST_NEWFILE);
|
||||||
@@ -316,7 +315,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"error: %s\n",
|
"error: %s\n",
|
||||||
ssh_get_error(dest->session));
|
ssh_get_error(dest->session));
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
ssh_scp_free(dest->scp);
|
ssh_scp_free(dest->scp);
|
||||||
dest->scp = NULL;
|
dest->scp = NULL;
|
||||||
return -1;
|
return -1;
|
||||||
@@ -331,7 +330,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
if (src->is_ssh) {
|
if (src->is_ssh) {
|
||||||
ssh_scp_deny_request(src->scp, "Cannot open local file");
|
ssh_scp_deny_request(src->scp, "Cannot open local file");
|
||||||
}
|
}
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -347,7 +346,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error reading scp: %s\n",
|
"Error reading scp: %s\n",
|
||||||
ssh_get_error(src->session));
|
ssh_get_error(src->session));
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -364,7 +363,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error reading file: %s\n",
|
"Error reading file: %s\n",
|
||||||
strerror(errno));
|
strerror(errno));
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -377,7 +376,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
ssh_get_error(dest->session));
|
ssh_get_error(dest->session));
|
||||||
ssh_scp_free(dest->scp);
|
ssh_scp_free(dest->scp);
|
||||||
dest->scp = NULL;
|
dest->scp = NULL;
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@@ -386,7 +385,7 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error writing in local file: %s\n",
|
"Error writing in local file: %s\n",
|
||||||
strerror(errno));
|
strerror(errno));
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -394,8 +393,8 @@ static int do_copy(struct location *src, struct location *dest, int recursive) {
|
|||||||
|
|
||||||
} while(total < size);
|
} while(total < size);
|
||||||
|
|
||||||
SSH_STRING_FREE_CHAR(filename);
|
ssh_string_free_char(filename);
|
||||||
printf("wrote %zu bytes\n", total);
|
printf("wrote %d bytes\n", total);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -404,11 +403,10 @@ int main(int argc, char **argv) {
|
|||||||
int i;
|
int i;
|
||||||
int r;
|
int r;
|
||||||
if (opts(argc, argv) < 0) {
|
if (opts(argc, argv) < 0) {
|
||||||
return EXIT_FAILURE;
|
r = EXIT_FAILURE;
|
||||||
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
ssh_init();
|
|
||||||
|
|
||||||
dest = parse_location(destination);
|
dest = parse_location(destination);
|
||||||
if (dest == NULL) {
|
if (dest == NULL) {
|
||||||
r = EXIT_FAILURE;
|
r = EXIT_FAILURE;
|
||||||
@@ -450,7 +448,5 @@ close_dest:
|
|||||||
close_location(dest);
|
close_location(dest);
|
||||||
location_free(dest);
|
location_free(dest);
|
||||||
end:
|
end:
|
||||||
ssh_finalize();
|
|
||||||
free(sources);
|
|
||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -25,10 +25,6 @@ clients must be made or how a client should react.
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 2048
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define USER "myuser"
|
#define USER "myuser"
|
||||||
#define PASSWORD "mypassword"
|
#define PASSWORD "mypassword"
|
||||||
|
|
||||||
@@ -229,7 +225,7 @@ int main(int argc, char **argv){
|
|||||||
.channel_open_request_session_function = new_session_channel
|
.channel_open_request_session_function = new_session_channel
|
||||||
};
|
};
|
||||||
|
|
||||||
char buf[BUF_SIZE];
|
char buf[2048];
|
||||||
char host[128]="";
|
char host[128]="";
|
||||||
char *ptr;
|
char *ptr;
|
||||||
int i,r, rc;
|
int i,r, rc;
|
||||||
@@ -295,7 +291,7 @@ int main(int argc, char **argv){
|
|||||||
snprintf(buf,sizeof(buf), "Hello %s, welcome to the Sample SSH proxy.\r\nPlease select your destination: ", username);
|
snprintf(buf,sizeof(buf), "Hello %s, welcome to the Sample SSH proxy.\r\nPlease select your destination: ", username);
|
||||||
ssh_channel_write(chan, buf, strlen(buf));
|
ssh_channel_write(chan, buf, strlen(buf));
|
||||||
do{
|
do{
|
||||||
i=ssh_channel_read(chan,buf, sizeof(buf), 0);
|
i=ssh_channel_read(chan,buf, 2048, 0);
|
||||||
if(i>0) {
|
if(i>0) {
|
||||||
ssh_channel_write(chan, buf, i);
|
ssh_channel_write(chan, buf, i);
|
||||||
if(strlen(host) + i < sizeof(host)){
|
if(strlen(host) + i < sizeof(host)){
|
||||||
|
|||||||
@@ -29,13 +29,11 @@ clients must be made or how a client should react.
|
|||||||
#include "examples_common.h"
|
#include "examples_common.h"
|
||||||
#ifdef WITH_SFTP
|
#ifdef WITH_SFTP
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 65536
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static int verbosity;
|
static int verbosity;
|
||||||
static char *destination;
|
static char *destination;
|
||||||
|
|
||||||
|
#define DATALEN 65536
|
||||||
|
|
||||||
static void do_sftp(ssh_session session) {
|
static void do_sftp(ssh_session session) {
|
||||||
sftp_session sftp = sftp_new(session);
|
sftp_session sftp = sftp_new(session);
|
||||||
sftp_dir dir;
|
sftp_dir dir;
|
||||||
@@ -46,7 +44,7 @@ static void do_sftp(ssh_session session) {
|
|||||||
sftp_file to;
|
sftp_file to;
|
||||||
int len = 1;
|
int len = 1;
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
char data[BUF_SIZE] = {0};
|
char data[DATALEN] = {0};
|
||||||
char *lnk;
|
char *lnk;
|
||||||
|
|
||||||
unsigned int count;
|
unsigned int count;
|
||||||
@@ -225,9 +223,9 @@ static void do_sftp(ssh_session session) {
|
|||||||
to = sftp_open(sftp, "/tmp/grosfichier", O_WRONLY|O_CREAT, 0644);
|
to = sftp_open(sftp, "/tmp/grosfichier", O_WRONLY|O_CREAT, 0644);
|
||||||
|
|
||||||
for (i = 0; i < 1000; ++i) {
|
for (i = 0; i < 1000; ++i) {
|
||||||
len = sftp_write(to, data, sizeof(data));
|
len = sftp_write(to, data, DATALEN);
|
||||||
printf("wrote %d bytes\n", len);
|
printf("wrote %d bytes\n", len);
|
||||||
if (len != sizeof(data)) {
|
if (len != DATALEN) {
|
||||||
printf("chunk %d : %d (%s)\n", i, len, ssh_get_error(session));
|
printf("chunk %d : %d (%s)\n", i, len, ssh_get_error(session));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -25,14 +25,6 @@ clients must be made or how a client should react.
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
#ifdef _WIN32
|
|
||||||
#include <io.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 2049
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef KEYS_FOLDER
|
#ifndef KEYS_FOLDER
|
||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
#define KEYS_FOLDER
|
#define KEYS_FOLDER
|
||||||
@@ -49,27 +41,6 @@ static int tries = 0;
|
|||||||
static int error = 0;
|
static int error = 0;
|
||||||
static ssh_channel chan=NULL;
|
static ssh_channel chan=NULL;
|
||||||
|
|
||||||
static int auth_none(ssh_session session,
|
|
||||||
const char *user,
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
ssh_string banner = NULL;
|
|
||||||
|
|
||||||
(void)user; /* unused */
|
|
||||||
(void)userdata; /* unused */
|
|
||||||
|
|
||||||
ssh_set_auth_methods(session,
|
|
||||||
SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
|
|
||||||
|
|
||||||
banner = ssh_string_from_char("Banner Example\n");
|
|
||||||
if (banner != NULL) {
|
|
||||||
ssh_send_issue_banner(session, banner);
|
|
||||||
}
|
|
||||||
ssh_string_free(banner);
|
|
||||||
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int auth_password(ssh_session session, const char *user,
|
static int auth_password(ssh_session session, const char *user,
|
||||||
const char *password, void *userdata){
|
const char *password, void *userdata){
|
||||||
(void)userdata;
|
(void)userdata;
|
||||||
@@ -89,7 +60,6 @@ static int auth_password(ssh_session session, const char *user,
|
|||||||
return SSH_AUTH_DENIED;
|
return SSH_AUTH_DENIED;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef WITH_GSSAPI
|
|
||||||
static int auth_gssapi_mic(ssh_session session, const char *user, const char *principal, void *userdata){
|
static int auth_gssapi_mic(ssh_session session, const char *user, const char *principal, void *userdata){
|
||||||
ssh_gssapi_creds creds = ssh_gssapi_get_creds(session);
|
ssh_gssapi_creds creds = ssh_gssapi_get_creds(session);
|
||||||
(void)userdata;
|
(void)userdata;
|
||||||
@@ -102,7 +72,6 @@ static int auth_gssapi_mic(ssh_session session, const char *user, const char *pr
|
|||||||
authenticated = 1;
|
authenticated = 1;
|
||||||
return SSH_AUTH_SUCCESS;
|
return SSH_AUTH_SUCCESS;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
static int pty_request(ssh_session session, ssh_channel channel, const char *term,
|
static int pty_request(ssh_session session, ssh_channel channel, const char *term,
|
||||||
int x,int y, int px, int py, void *userdata){
|
int x,int y, int px, int py, void *userdata){
|
||||||
@@ -196,14 +165,6 @@ static struct argp_option options[] = {
|
|||||||
.doc = "Get verbose output.",
|
.doc = "Get verbose output.",
|
||||||
.group = 0
|
.group = 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
.name = "config",
|
|
||||||
.key = 'f',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Configuration file to use.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{NULL, 0, NULL, 0, NULL, 0}
|
{NULL, 0, NULL, 0, NULL, 0}
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -230,9 +191,6 @@ static error_t parse_opt (int key, char *arg, struct argp_state *state) {
|
|||||||
case 'v':
|
case 'v':
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR, "3");
|
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR, "3");
|
||||||
break;
|
break;
|
||||||
case 'f':
|
|
||||||
ssh_bind_options_parse_config(sshbind, arg);
|
|
||||||
break;
|
|
||||||
case ARGP_KEY_ARG:
|
case ARGP_KEY_ARG:
|
||||||
if (state->arg_num >= 1) {
|
if (state->arg_num >= 1) {
|
||||||
/* Too many arguments. */
|
/* Too many arguments. */
|
||||||
@@ -263,15 +221,12 @@ int main(int argc, char **argv){
|
|||||||
ssh_event mainloop;
|
ssh_event mainloop;
|
||||||
struct ssh_server_callbacks_struct cb = {
|
struct ssh_server_callbacks_struct cb = {
|
||||||
.userdata = NULL,
|
.userdata = NULL,
|
||||||
.auth_none_function = auth_none,
|
|
||||||
.auth_password_function = auth_password,
|
.auth_password_function = auth_password,
|
||||||
#ifdef WITH_GSSAPI
|
|
||||||
.auth_gssapi_mic_function = auth_gssapi_mic,
|
.auth_gssapi_mic_function = auth_gssapi_mic,
|
||||||
#endif
|
|
||||||
.channel_open_request_session_function = new_session_channel
|
.channel_open_request_session_function = new_session_channel
|
||||||
};
|
};
|
||||||
|
|
||||||
char buf[BUF_SIZE];
|
char buf[2048];
|
||||||
int i;
|
int i;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
@@ -327,24 +282,19 @@ int main(int argc, char **argv){
|
|||||||
} else
|
} else
|
||||||
printf("Authenticated and got a channel\n");
|
printf("Authenticated and got a channel\n");
|
||||||
do{
|
do{
|
||||||
i=ssh_channel_read(chan, buf, sizeof(buf) - 1, 0);
|
i=ssh_channel_read(chan,buf, 2048, 0);
|
||||||
if(i>0) {
|
if(i>0) {
|
||||||
if (ssh_channel_write(chan, buf, i) == SSH_ERROR) {
|
ssh_channel_write(chan, buf, i);
|
||||||
printf("error writing to channel\n");
|
if (write(1,buf,i) < 0) {
|
||||||
|
printf("error writing to buffer\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
buf[i] = '\0';
|
|
||||||
printf("%s", buf);
|
|
||||||
fflush(stdout);
|
|
||||||
|
|
||||||
if (buf[0] == '\x0d') {
|
if (buf[0] == '\x0d') {
|
||||||
if (ssh_channel_write(chan, "\n", 1) == SSH_ERROR) {
|
if (write(1, "\n", 1) < 0) {
|
||||||
printf("error writing to channel\n");
|
printf("error writing to buffer\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
ssh_channel_write(chan, "\n", 1);
|
||||||
printf("\n");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} while (i>0);
|
} while (i>0);
|
||||||
|
|||||||
@@ -25,10 +25,6 @@ clients must be made or how a client should react.
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdbool.h>
|
#include <stdbool.h>
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 2048
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define SSHD_USER "libssh"
|
#define SSHD_USER "libssh"
|
||||||
#define SSHD_PASSWORD "libssh"
|
#define SSHD_PASSWORD "libssh"
|
||||||
|
|
||||||
@@ -297,7 +293,7 @@ int main(int argc, char **argv){
|
|||||||
ssh_bind sshbind;
|
ssh_bind sshbind;
|
||||||
ssh_message message;
|
ssh_message message;
|
||||||
ssh_channel chan=0;
|
ssh_channel chan=0;
|
||||||
char buf[BUF_SIZE];
|
char buf[2048];
|
||||||
int auth=0;
|
int auth=0;
|
||||||
int shell=0;
|
int shell=0;
|
||||||
int i;
|
int i;
|
||||||
@@ -403,7 +399,7 @@ int main(int argc, char **argv){
|
|||||||
|
|
||||||
printf("it works !\n");
|
printf("it works !\n");
|
||||||
do{
|
do{
|
||||||
i=ssh_channel_read(chan,buf, sizeof(buf), 0);
|
i=ssh_channel_read(chan,buf, 2048, 0);
|
||||||
if(i>0) {
|
if(i>0) {
|
||||||
if(*buf == '' || *buf == '')
|
if(*buf == '' || *buf == '')
|
||||||
break;
|
break;
|
||||||
|
|||||||
@@ -22,10 +22,6 @@ program.
|
|||||||
#include <libssh/libssh.h>
|
#include <libssh/libssh.h>
|
||||||
#include "examples_common.h"
|
#include "examples_common.h"
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 16384
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static int verbosity = 0;
|
static int verbosity = 0;
|
||||||
static const char *createcommand =
|
static const char *createcommand =
|
||||||
"rm -fr /tmp/libssh_tests && mkdir /tmp/libssh_tests && "
|
"rm -fr /tmp/libssh_tests && mkdir /tmp/libssh_tests && "
|
||||||
@@ -106,7 +102,7 @@ static void create_files(ssh_session session){
|
|||||||
|
|
||||||
static int fetch_files(ssh_session session){
|
static int fetch_files(ssh_session session){
|
||||||
int size;
|
int size;
|
||||||
char buffer[BUF_SIZE];
|
char buffer[16384];
|
||||||
int mode;
|
int mode;
|
||||||
char *filename;
|
char *filename;
|
||||||
int r;
|
int r;
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ int main(void) {
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
channel = ssh_channel_new(session);;
|
||||||
if (channel == NULL) {
|
if (channel == NULL) {
|
||||||
ssh_disconnect(session);
|
ssh_disconnect(session);
|
||||||
return 1;
|
return 1;
|
||||||
|
|||||||
@@ -1,866 +0,0 @@
|
|||||||
/*
|
|
||||||
* ssh.c - Simple example of SSH X11 client using libssh
|
|
||||||
*
|
|
||||||
* Copyright (C) 2022 Marco Fortina
|
|
||||||
*
|
|
||||||
* This program is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2 of the License, or
|
|
||||||
* (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This program is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
* GNU General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU General Public License
|
|
||||||
* along with this program; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
||||||
* Boston, MA 02110-1301, USA.
|
|
||||||
*
|
|
||||||
* In addition, as a special exception, the copyright holders give
|
|
||||||
* permission to link the code of portions of this program with the
|
|
||||||
* OpenSSL library under certain conditions as described in each
|
|
||||||
* individual source file, and distribute linked combinations
|
|
||||||
* including the two.
|
|
||||||
* You must obey the GNU General Public License in all respects
|
|
||||||
* for all of the code used other than OpenSSL. * If you modify
|
|
||||||
* file(s) with this exception, you may extend this exception to your
|
|
||||||
* version of the file(s), but you are not obligated to do so. * If you
|
|
||||||
* do not wish to do so, delete this exception statement from your
|
|
||||||
* version. * If you delete this exception statement from all source
|
|
||||||
* files in the program, then also delete it here.
|
|
||||||
*
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* ssh_X11_client
|
|
||||||
* ==============
|
|
||||||
*
|
|
||||||
* AUTHOR URL
|
|
||||||
* https://gitlab.com/marco.fortina/libssh-x11-client/
|
|
||||||
*
|
|
||||||
* This is a simple example of SSH X11 client using libssh.
|
|
||||||
*
|
|
||||||
* Features:
|
|
||||||
*
|
|
||||||
* - support local display (e.g. :0)
|
|
||||||
* - support remote display (e.g. localhost:10.0)
|
|
||||||
* - using callbacks and event polling to significantly reduce CPU utilization
|
|
||||||
* - use X11 forwarding with authentication spoofing (like openssh)
|
|
||||||
*
|
|
||||||
* Note:
|
|
||||||
*
|
|
||||||
* - part of this code was inspired by openssh's one.
|
|
||||||
*
|
|
||||||
* Dependencies:
|
|
||||||
*
|
|
||||||
* - gcc >= 7.5.0
|
|
||||||
* - libssh >= 0.8.0
|
|
||||||
* - libssh-dev >= 0.8.0
|
|
||||||
*
|
|
||||||
* To Build:
|
|
||||||
* gcc -o ssh_X11_client ssh_X11_client.c -lssh -g
|
|
||||||
*
|
|
||||||
* Donations:
|
|
||||||
*
|
|
||||||
* If you liked this work and wish to support the developer please donate to:
|
|
||||||
* Bitcoin: 1N2rQimKbeUQA8N2LU5vGopYQJmZsBM2d6
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <errno.h>
|
|
||||||
#include <fcntl.h>
|
|
||||||
#include <poll.h>
|
|
||||||
#include <pthread.h>
|
|
||||||
#include <stddef.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <termios.h>
|
|
||||||
#include <time.h>
|
|
||||||
|
|
||||||
#include <libssh/libssh.h>
|
|
||||||
#include <libssh/callbacks.h>
|
|
||||||
|
|
||||||
#include <netinet/in.h>
|
|
||||||
#include <netinet/tcp.h>
|
|
||||||
|
|
||||||
#include <sys/un.h>
|
|
||||||
#include <sys/time.h>
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include <sys/socket.h>
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Data Structures and Macros
|
|
||||||
*/
|
|
||||||
|
|
||||||
#define _PATH_UNIX_X "/tmp/.X11-unix/X%d"
|
|
||||||
#define _XAUTH_CMD "/usr/bin/xauth list %s 2>/dev/null"
|
|
||||||
|
|
||||||
typedef struct item {
|
|
||||||
ssh_channel channel;
|
|
||||||
int fd_in;
|
|
||||||
int fd_out;
|
|
||||||
int protected;
|
|
||||||
struct item *next;
|
|
||||||
} node_t;
|
|
||||||
|
|
||||||
node_t *node = NULL;
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Mutex
|
|
||||||
*/
|
|
||||||
|
|
||||||
pthread_mutex_t mutex;
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Function declarations
|
|
||||||
*/
|
|
||||||
|
|
||||||
/* Linked nodes to manage channel/fd tuples */
|
|
||||||
static void insert_item(ssh_channel channel, int fd_in, int fd_out, int protected);
|
|
||||||
static void delete_item(ssh_channel channel);
|
|
||||||
static node_t * search_item(ssh_channel channel);
|
|
||||||
|
|
||||||
/* X11 Display */
|
|
||||||
const char * ssh_gai_strerror(int gaierr);
|
|
||||||
static int x11_get_proto(const char *display, char **_proto, char **_data);
|
|
||||||
static void set_nodelay(int fd);
|
|
||||||
static int connect_local_xsocket_path(const char *pathname);
|
|
||||||
static int connect_local_xsocket(int display_number);
|
|
||||||
static int x11_connect_display(void);
|
|
||||||
|
|
||||||
/* Send data to channel */
|
|
||||||
static int copy_fd_to_channel_callback(int fd, int revents, void *userdata);
|
|
||||||
|
|
||||||
/* Read data from channel */
|
|
||||||
static int copy_channel_to_fd_callback(ssh_session session, ssh_channel channel, void *data, uint32_t len, int is_stderr, void *userdata);
|
|
||||||
|
|
||||||
/* EOF&Close channel */
|
|
||||||
static void channel_close_callback(ssh_session session, ssh_channel channel, void *userdata);
|
|
||||||
|
|
||||||
/* X11 Request */
|
|
||||||
static ssh_channel x11_open_request_callback(ssh_session session, const char *shost, int sport, void *userdata);
|
|
||||||
|
|
||||||
/* Main loop */
|
|
||||||
static int main_loop(ssh_channel channel);
|
|
||||||
|
|
||||||
/* Internals */
|
|
||||||
int64_t _current_timestamp(void);
|
|
||||||
|
|
||||||
/* Global variables */
|
|
||||||
const char *hostname = NULL;
|
|
||||||
int enableX11 = 1;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Callbacks Data Structures
|
|
||||||
*/
|
|
||||||
|
|
||||||
/* SSH Channel Callbacks */
|
|
||||||
struct ssh_channel_callbacks_struct channel_cb =
|
|
||||||
{
|
|
||||||
.channel_data_function = copy_channel_to_fd_callback,
|
|
||||||
.channel_eof_function = channel_close_callback,
|
|
||||||
.channel_close_function = channel_close_callback,
|
|
||||||
.userdata = NULL
|
|
||||||
};
|
|
||||||
|
|
||||||
/* SSH Callbacks */
|
|
||||||
struct ssh_callbacks_struct cb =
|
|
||||||
{
|
|
||||||
.channel_open_request_x11_function = x11_open_request_callback,
|
|
||||||
.userdata = NULL
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* SSH Event Context
|
|
||||||
*/
|
|
||||||
|
|
||||||
short events = POLLIN | POLLPRI | POLLERR | POLLHUP | POLLNVAL;
|
|
||||||
ssh_event event;
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Internal data structures
|
|
||||||
*/
|
|
||||||
|
|
||||||
struct termios _saved_tio;
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Internal functions
|
|
||||||
*/
|
|
||||||
|
|
||||||
int64_t
|
|
||||||
_current_timestamp(void) {
|
|
||||||
struct timeval tv;
|
|
||||||
int64_t milliseconds;
|
|
||||||
|
|
||||||
gettimeofday(&tv, NULL);
|
|
||||||
milliseconds = (int64_t)(tv.tv_sec) * 1000 + (tv.tv_usec / 1000);
|
|
||||||
|
|
||||||
return milliseconds;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
_logging_callback(int priority, const char *function, const char *buffer, void *userdata)
|
|
||||||
{
|
|
||||||
FILE *fp = NULL;
|
|
||||||
char buf[100];
|
|
||||||
int64_t milliseconds;
|
|
||||||
|
|
||||||
time_t now = time (0);
|
|
||||||
|
|
||||||
(void)userdata;
|
|
||||||
|
|
||||||
strftime(buf, 100, "%Y-%m-%d %H:%M:%S", localtime (&now));
|
|
||||||
|
|
||||||
fp = fopen("debug.log","a");
|
|
||||||
if(fp == NULL)
|
|
||||||
{
|
|
||||||
printf("Error!");
|
|
||||||
exit(-11);
|
|
||||||
}
|
|
||||||
|
|
||||||
milliseconds = _current_timestamp();
|
|
||||||
|
|
||||||
fprintf(fp, "[%s.%jd, %d] %s: %s\n", buf, milliseconds, priority, function, buffer);
|
|
||||||
fclose(fp);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
_enter_term_raw_mode(void)
|
|
||||||
{
|
|
||||||
struct termios tio;
|
|
||||||
int ret = tcgetattr(fileno(stdin), &tio);
|
|
||||||
if (ret != -1) {
|
|
||||||
_saved_tio = tio;
|
|
||||||
tio.c_iflag |= IGNPAR;
|
|
||||||
tio.c_iflag &= ~(ISTRIP | INLCR | IGNCR | ICRNL | IXON | IXANY | IXOFF);
|
|
||||||
#ifdef IUCLC
|
|
||||||
tio.c_iflag &= ~IUCLC;
|
|
||||||
#endif
|
|
||||||
tio.c_lflag &= ~(ISIG | ICANON | ECHO | ECHOE | ECHOK | ECHONL);
|
|
||||||
#ifdef IEXTEN
|
|
||||||
tio.c_lflag &= ~IEXTEN;
|
|
||||||
#endif
|
|
||||||
tio.c_oflag &= ~OPOST;
|
|
||||||
tio.c_cc[VMIN] = 1;
|
|
||||||
tio.c_cc[VTIME] = 0;
|
|
||||||
ret = tcsetattr(fileno(stdin), TCSADRAIN, &tio);
|
|
||||||
}
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
_leave_term_raw_mode(void)
|
|
||||||
{
|
|
||||||
int ret = tcsetattr(fileno(stdin), TCSADRAIN, &_saved_tio);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Functions
|
|
||||||
*/
|
|
||||||
|
|
||||||
static void
|
|
||||||
insert_item(ssh_channel channel, int fd_in, int fd_out, int protected)
|
|
||||||
{
|
|
||||||
node_t *node_iterator = NULL, *new = NULL;
|
|
||||||
|
|
||||||
pthread_mutex_lock(&mutex);
|
|
||||||
|
|
||||||
if (node == NULL) {
|
|
||||||
/* Calloc ensure that node is full of 0 */
|
|
||||||
node = (node_t *) calloc(1, sizeof(node_t));
|
|
||||||
node->channel = channel;
|
|
||||||
node->fd_in = fd_in;
|
|
||||||
node->fd_out = fd_out;
|
|
||||||
node->protected = protected;
|
|
||||||
node->next = NULL;
|
|
||||||
} else {
|
|
||||||
node_iterator = node;
|
|
||||||
while (node_iterator->next != NULL)
|
|
||||||
node_iterator = node_iterator->next;
|
|
||||||
/* Create the new node */
|
|
||||||
new = (node_t *) malloc(sizeof(node_t));
|
|
||||||
new->channel = channel;
|
|
||||||
new->fd_in = fd_in;
|
|
||||||
new->fd_out = fd_out;
|
|
||||||
new->protected = protected;
|
|
||||||
new->next = NULL;
|
|
||||||
node_iterator->next = new;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
pthread_mutex_unlock(&mutex);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static void
|
|
||||||
delete_item(ssh_channel channel)
|
|
||||||
{
|
|
||||||
node_t *current = NULL, *previous = NULL;
|
|
||||||
|
|
||||||
pthread_mutex_lock(&mutex);
|
|
||||||
|
|
||||||
for (current = node; current; previous = current, current = current->next) {
|
|
||||||
if (current->channel != channel)
|
|
||||||
continue;
|
|
||||||
|
|
||||||
if (previous == NULL)
|
|
||||||
node = current->next;
|
|
||||||
else
|
|
||||||
previous->next = current->next;
|
|
||||||
|
|
||||||
free(current);
|
|
||||||
pthread_mutex_unlock(&mutex);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
pthread_mutex_unlock(&mutex);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static node_t *
|
|
||||||
search_item(ssh_channel channel)
|
|
||||||
{
|
|
||||||
node_t *current = node;
|
|
||||||
|
|
||||||
pthread_mutex_lock(&mutex);
|
|
||||||
|
|
||||||
while (current != NULL) {
|
|
||||||
if (current->channel == channel) {
|
|
||||||
pthread_mutex_unlock(&mutex);
|
|
||||||
return current;
|
|
||||||
} else {
|
|
||||||
current = current->next;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pthread_mutex_unlock(&mutex);
|
|
||||||
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
static void
|
|
||||||
set_nodelay(int fd)
|
|
||||||
{
|
|
||||||
int opt;
|
|
||||||
socklen_t optlen;
|
|
||||||
|
|
||||||
optlen = sizeof(opt);
|
|
||||||
if (getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, &optlen) == -1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "getsockopt TCP_NODELAY: %.100s", strerror(errno));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
if (opt == 1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "fd %d is TCP_NODELAY", fd);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
opt = 1;
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "fd %d setting TCP_NODELAY", fd);
|
|
||||||
if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, sizeof(opt)) == -1)
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "setsockopt TCP_NODELAY: %.100s", strerror(errno));
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
const char *
|
|
||||||
ssh_gai_strerror(int gaierr)
|
|
||||||
{
|
|
||||||
if (gaierr == EAI_SYSTEM && errno != 0)
|
|
||||||
return strerror(errno);
|
|
||||||
return gai_strerror(gaierr);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
x11_get_proto(const char *display, char **_proto, char **_cookie)
|
|
||||||
{
|
|
||||||
char cmd[1024], line[512], xdisplay[512];
|
|
||||||
static char proto[512], cookie[512];
|
|
||||||
FILE *f = NULL;
|
|
||||||
int ret = 0;
|
|
||||||
|
|
||||||
*_proto = proto;
|
|
||||||
*_cookie = cookie;
|
|
||||||
|
|
||||||
proto[0] = cookie[0] = '\0';
|
|
||||||
|
|
||||||
if (strncmp(display, "localhost:", 10) == 0) {
|
|
||||||
if ((ret = snprintf(xdisplay, sizeof(xdisplay), "unix:%s", display + 10)) < 0 || (size_t)ret >= sizeof(xdisplay)) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "display name too long. display: %s", display);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
display = xdisplay;
|
|
||||||
}
|
|
||||||
|
|
||||||
snprintf(cmd, sizeof(cmd), _XAUTH_CMD, display);
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "xauth cmd: %s", cmd);
|
|
||||||
|
|
||||||
f = popen(cmd, "r");
|
|
||||||
if (f && fgets(line, sizeof(line), f) && sscanf(line, "%*s %511s %511s", proto, cookie) == 2) {
|
|
||||||
ret = 0;
|
|
||||||
} else {
|
|
||||||
ret = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (f) pclose(f);
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "proto: %s - cookie: %s - ret: %d", proto, cookie, ret);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
connect_local_xsocket_path(const char *pathname)
|
|
||||||
{
|
|
||||||
int sock;
|
|
||||||
struct sockaddr_un addr;
|
|
||||||
|
|
||||||
sock = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
||||||
if (sock == -1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "socket: %.100s", strerror(errno));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
memset(&addr, 0, sizeof(addr));
|
|
||||||
addr.sun_family = AF_UNIX;
|
|
||||||
addr.sun_path[0] = '\0';
|
|
||||||
/* pathname is guaranteed to be initialized and larger than addr.sun_path[108] */
|
|
||||||
memcpy(addr.sun_path + 1, pathname, sizeof(addr.sun_path) - 1);
|
|
||||||
if (connect(sock, (struct sockaddr *)&addr, offsetof(struct sockaddr_un, sun_path) + 1 + strlen(pathname)) == 0)
|
|
||||||
return sock;
|
|
||||||
close(sock);
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "connect %.100s: %.100s", addr.sun_path, strerror(errno));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
connect_local_xsocket(int display_number)
|
|
||||||
{
|
|
||||||
char buf[1024] = {0};
|
|
||||||
snprintf(buf, sizeof(buf), _PATH_UNIX_X, display_number);
|
|
||||||
return connect_local_xsocket_path(buf);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
x11_connect_display()
|
|
||||||
{
|
|
||||||
int display_number;
|
|
||||||
const char *display = NULL;
|
|
||||||
char buf[1024], *cp = NULL;
|
|
||||||
struct addrinfo hints, *ai = NULL, *aitop = NULL;
|
|
||||||
char strport[NI_MAXSERV];
|
|
||||||
int gaierr = 0, sock = 0;
|
|
||||||
|
|
||||||
/* Try to open a socket for the local X server. */
|
|
||||||
display = getenv("DISPLAY");
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "display: %s", display);
|
|
||||||
|
|
||||||
if (!display) {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Check if it is a unix domain socket. */
|
|
||||||
if (strncmp(display, "unix:", 5) == 0 || display[0] == ':') {
|
|
||||||
/* Connect to the unix domain socket. */
|
|
||||||
if (sscanf(strrchr(display, ':') + 1, "%d", &display_number) != 1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "Could not parse display number from DISPLAY: %.100s", display);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "display_number: %d", display_number);
|
|
||||||
|
|
||||||
/* Create a socket. */
|
|
||||||
sock = connect_local_xsocket(display_number);
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "socket: %d", sock);
|
|
||||||
|
|
||||||
if (sock < 0)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
/* OK, we now have a connection to the display. */
|
|
||||||
return sock;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Connect to an inet socket. */
|
|
||||||
strncpy(buf, display, sizeof(buf) - 1);
|
|
||||||
cp = strchr(buf, ':');
|
|
||||||
if (!cp) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "Could not find ':' in DISPLAY: %.100s", display);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
*cp = 0;
|
|
||||||
if (sscanf(cp + 1, "%d", &display_number) != 1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "Could not parse display number from DISPLAY: %.100s", display);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Look up the host address */
|
|
||||||
memset(&hints, 0, sizeof(hints));
|
|
||||||
hints.ai_family = AF_INET;
|
|
||||||
hints.ai_socktype = SOCK_STREAM;
|
|
||||||
snprintf(strport, sizeof(strport), "%u", 6000 + display_number);
|
|
||||||
if ((gaierr = getaddrinfo(buf, strport, &hints, &aitop)) != 0) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "%.100s: unknown host. (%s)", buf, ssh_gai_strerror(gaierr));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
for (ai = aitop; ai; ai = ai->ai_next) {
|
|
||||||
/* Create a socket. */
|
|
||||||
sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
|
|
||||||
if (sock == -1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "socket: %.100s", strerror(errno));
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
/* Connect it to the display. */
|
|
||||||
if (connect(sock, ai->ai_addr, ai->ai_addrlen) == -1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "connect %.100s port %u: %.100s", buf, 6000 + display_number, strerror(errno));
|
|
||||||
close(sock);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
/* Success */
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
freeaddrinfo(aitop);
|
|
||||||
if (!ai) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "connect %.100s port %u: %.100s", buf, 6000 + display_number, strerror(errno));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
set_nodelay(sock);
|
|
||||||
return sock;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
copy_fd_to_channel_callback(int fd, int revents, void *userdata)
|
|
||||||
{
|
|
||||||
ssh_channel channel = (ssh_channel)userdata;
|
|
||||||
char buf[2097152];
|
|
||||||
int sz = 0, ret = 0;
|
|
||||||
|
|
||||||
node_t *temp_node = search_item(channel);
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "event: %d - fd: %d", revents, fd);
|
|
||||||
|
|
||||||
if (!channel) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "channel does not exist.");
|
|
||||||
if (temp_node->protected == 0) {
|
|
||||||
close(fd);
|
|
||||||
}
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (fcntl(fd, F_GETFD) == -1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "fcntl error. fd: %d", fd);
|
|
||||||
ssh_channel_close(channel);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((revents & POLLIN) || (revents & POLLPRI)) {
|
|
||||||
sz = read(fd, buf, sizeof(buf));
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "sz: %d", sz);
|
|
||||||
if (sz > 0) {
|
|
||||||
ret = ssh_channel_write(channel, buf, sz);
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "channel_write ret: %d", ret);
|
|
||||||
} else if (sz < 0) {
|
|
||||||
ssh_channel_close(channel);
|
|
||||||
return -1;
|
|
||||||
} else {
|
|
||||||
/* sz = 0. Why the hell I'm here? */
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "Why the hell am I here?: sz: %d", sz);
|
|
||||||
if (temp_node->protected == 0) {
|
|
||||||
close(fd);
|
|
||||||
}
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((revents & POLLHUP) || (revents & POLLNVAL) || (revents & POLLERR)) {
|
|
||||||
ssh_channel_close(channel);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
return sz;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
copy_channel_to_fd_callback(ssh_session session, ssh_channel channel, void *data, uint32_t len, int is_stderr, void *userdata)
|
|
||||||
{
|
|
||||||
node_t *temp_node = NULL;
|
|
||||||
int fd, sz;
|
|
||||||
|
|
||||||
(void)session;
|
|
||||||
(void)is_stderr;
|
|
||||||
(void)userdata;
|
|
||||||
|
|
||||||
temp_node = search_item(channel);
|
|
||||||
|
|
||||||
fd = temp_node->fd_out;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "len: %d - fd: %d - is_stderr: %d", len, fd, is_stderr);
|
|
||||||
|
|
||||||
sz = write(fd, data, len);
|
|
||||||
|
|
||||||
return sz;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static void
|
|
||||||
channel_close_callback(ssh_session session, ssh_channel channel, void *userdata)
|
|
||||||
{
|
|
||||||
node_t *temp_node = NULL;
|
|
||||||
|
|
||||||
(void)session;
|
|
||||||
(void)userdata;
|
|
||||||
|
|
||||||
temp_node = search_item(channel);
|
|
||||||
|
|
||||||
if (temp_node != NULL) {
|
|
||||||
int fd = temp_node->fd_in;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "fd: %d", fd);
|
|
||||||
|
|
||||||
delete_item(channel);
|
|
||||||
ssh_event_remove_fd(event, fd);
|
|
||||||
|
|
||||||
if (temp_node->protected == 0) {
|
|
||||||
close(fd);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static ssh_channel
|
|
||||||
x11_open_request_callback(ssh_session session, const char *shost, int sport, void *userdata)
|
|
||||||
{
|
|
||||||
ssh_channel channel = NULL;
|
|
||||||
int sock;
|
|
||||||
|
|
||||||
(void)shost;
|
|
||||||
(void)sport;
|
|
||||||
(void)userdata;
|
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
|
||||||
|
|
||||||
sock = x11_connect_display();
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "sock: %d", sock);
|
|
||||||
|
|
||||||
insert_item(channel, sock, sock, 0);
|
|
||||||
|
|
||||||
ssh_event_add_fd(event, sock, events, copy_fd_to_channel_callback, channel);
|
|
||||||
ssh_event_add_session(event, session);
|
|
||||||
|
|
||||||
ssh_add_channel_callbacks(channel, &channel_cb);
|
|
||||||
|
|
||||||
return channel;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* MAIN LOOP
|
|
||||||
*/
|
|
||||||
|
|
||||||
static int
|
|
||||||
main_loop(ssh_channel channel)
|
|
||||||
{
|
|
||||||
ssh_session session = ssh_channel_get_session(channel);
|
|
||||||
|
|
||||||
insert_item(channel, fileno(stdin), fileno(stdout), 1);
|
|
||||||
|
|
||||||
ssh_callbacks_init(&channel_cb);
|
|
||||||
ssh_set_channel_callbacks(channel, &channel_cb);
|
|
||||||
|
|
||||||
event = ssh_event_new();
|
|
||||||
if (event == NULL) {
|
|
||||||
printf("Couldn't get a event\n");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssh_event_add_fd(event, fileno(stdin), events, copy_fd_to_channel_callback, channel) != SSH_OK) {
|
|
||||||
printf("Couldn't add an fd to the event\n");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(ssh_event_add_session(event, session) != SSH_OK) {
|
|
||||||
printf("Couldn't add the session to the event\n");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
do {
|
|
||||||
if (ssh_event_dopoll(event, 1000) == SSH_ERROR) {
|
|
||||||
printf("Error : %s\n", ssh_get_error(session));
|
|
||||||
/* fall through */
|
|
||||||
}
|
|
||||||
} while (!ssh_channel_is_closed(channel));
|
|
||||||
|
|
||||||
delete_item(channel);
|
|
||||||
ssh_event_remove_fd(event, fileno(stdin));
|
|
||||||
ssh_event_remove_session(event, session);
|
|
||||||
ssh_event_free(event);
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*
|
|
||||||
* USAGE
|
|
||||||
*/
|
|
||||||
|
|
||||||
static void
|
|
||||||
usage(void)
|
|
||||||
{
|
|
||||||
fprintf(stderr,
|
|
||||||
"Usage : ssh-X11-client [options] [login@]hostname\n"
|
|
||||||
"sample X11 client - libssh-%s\n"
|
|
||||||
"Options :\n"
|
|
||||||
" -l user : Specifies the user to log in as on the remote machine.\n"
|
|
||||||
" -p port : Port to connect to on the remote host.\n"
|
|
||||||
" -v : Verbose mode. Multiple -v options increase the verbosity. The maximum is 5.\n"
|
|
||||||
" -C : Requests compression of all data.\n"
|
|
||||||
" -x : Disables X11 forwarding.\n"
|
|
||||||
"\n",
|
|
||||||
ssh_version(0));
|
|
||||||
|
|
||||||
exit(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int opts(int argc, char **argv)
|
|
||||||
{
|
|
||||||
int i;
|
|
||||||
|
|
||||||
while ((i = getopt(argc,argv,"x")) != -1) {
|
|
||||||
switch(i) {
|
|
||||||
case 'x':
|
|
||||||
enableX11 = 0;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
fprintf(stderr, "Unknown option %c\n", optopt);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (optind < argc) {
|
|
||||||
hostname = argv[optind++];
|
|
||||||
}
|
|
||||||
|
|
||||||
if (hostname == NULL) {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* MAIN
|
|
||||||
*/
|
|
||||||
|
|
||||||
int
|
|
||||||
main(int argc, char **argv)
|
|
||||||
{
|
|
||||||
char *password = NULL;
|
|
||||||
|
|
||||||
ssh_session session = NULL;
|
|
||||||
ssh_channel channel = NULL;
|
|
||||||
|
|
||||||
int ret;
|
|
||||||
|
|
||||||
const char *display = NULL;
|
|
||||||
char *proto = NULL, *cookie = NULL;
|
|
||||||
|
|
||||||
ssh_set_log_callback(_logging_callback);
|
|
||||||
ret = ssh_init();
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
session = ssh_new();
|
|
||||||
if (session == NULL) exit(-1);
|
|
||||||
|
|
||||||
if (ssh_options_getopt(session, &argc, argv) || opts(argc, argv)) {
|
|
||||||
fprintf(stderr, "Error parsing command line: %s\n", ssh_get_error(session));
|
|
||||||
ssh_free(session);
|
|
||||||
ssh_finalize();
|
|
||||||
usage();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssh_options_set(session, SSH_OPTIONS_HOST, hostname) < 0) {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ssh_connect(session);
|
|
||||||
if (ret != SSH_OK) {
|
|
||||||
fprintf(stderr, "Connection failed : %s\n", ssh_get_error(session));
|
|
||||||
exit(-1);
|
|
||||||
}
|
|
||||||
|
|
||||||
password = getpass("Password: ");
|
|
||||||
ret = ssh_userauth_password(session, NULL, password);
|
|
||||||
if (ret != SSH_AUTH_SUCCESS) {
|
|
||||||
fprintf(stderr, "Error authenticating with password: %s\n", ssh_get_error(session));
|
|
||||||
exit(-1);
|
|
||||||
}
|
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
|
||||||
if (channel == NULL) return SSH_ERROR;
|
|
||||||
|
|
||||||
ret = ssh_channel_open_session(channel);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
ret = ssh_channel_request_pty(channel);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
ret = ssh_channel_change_pty_size(channel, 80, 24);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
if (enableX11 == 1) {
|
|
||||||
display = getenv("DISPLAY");
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "display: %s", display);
|
|
||||||
|
|
||||||
if (display) {
|
|
||||||
ssh_callbacks_init(&cb);
|
|
||||||
ret = ssh_set_callbacks(session, &cb);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
if (x11_get_proto(display, &proto, &cookie) != 0) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "Using fake authentication data for X11 forwarding");
|
|
||||||
proto = NULL;
|
|
||||||
cookie = NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, __func__, "proto: %s - cookie: %s", proto, cookie);
|
|
||||||
/* See https://gitlab.com/libssh/libssh-mirror/-/blob/master/src/channels.c#L2062 for details. */
|
|
||||||
ret = ssh_channel_request_x11(channel, 0, proto, cookie, 0);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = _enter_term_raw_mode();
|
|
||||||
if (ret != 0) exit(-1);
|
|
||||||
|
|
||||||
ret = ssh_channel_request_shell(channel);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
ret = main_loop(channel);
|
|
||||||
if (ret != SSH_OK) return ret;
|
|
||||||
|
|
||||||
_leave_term_raw_mode();
|
|
||||||
|
|
||||||
ssh_channel_close(channel);
|
|
||||||
ssh_channel_free(channel);
|
|
||||||
ssh_disconnect(session);
|
|
||||||
ssh_free(session);
|
|
||||||
ssh_finalize();
|
|
||||||
}
|
|
||||||
@@ -1,23 +1,21 @@
|
|||||||
/* ssh_client.c */
|
/* client.c */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Copyright 2003-2015 Aris Adamantiadis
|
Copyright 2003-2009 Aris Adamantiadis
|
||||||
*
|
|
||||||
* This file is part of the SSH Library
|
This file is part of the SSH Library
|
||||||
*
|
|
||||||
* You are free to copy this file, modify it in any way, consider it being public
|
You are free to copy this file, modify it in any way, consider it being public
|
||||||
* domain. This does not apply to the rest of the library though, but it is
|
domain. This does not apply to the rest of the library though, but it is
|
||||||
* allowed to cut-and-paste working code from this file to any license of
|
allowed to cut-and-paste working code from this file to any license of
|
||||||
* program.
|
program.
|
||||||
* The goal is to show the API in action. It's not a reference on how terminal
|
The goal is to show the API in action. It's not a reference on how terminal
|
||||||
* clients must be made or how a client should react.
|
clients must be made or how a client should react.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <limits.h>
|
|
||||||
|
|
||||||
#include <sys/select.h>
|
#include <sys/select.h>
|
||||||
#include <sys/time.h>
|
#include <sys/time.h>
|
||||||
@@ -45,10 +43,9 @@
|
|||||||
#include "examples_common.h"
|
#include "examples_common.h"
|
||||||
#define MAXCMD 10
|
#define MAXCMD 10
|
||||||
|
|
||||||
static char *host = NULL;
|
static char *host;
|
||||||
static char *user = NULL;
|
static char *user;
|
||||||
static char *cmds[MAXCMD];
|
static char *cmds[MAXCMD];
|
||||||
static char *config_file = NULL;
|
|
||||||
static struct termios terminal;
|
static struct termios terminal;
|
||||||
|
|
||||||
static char *pcap_file = NULL;
|
static char *pcap_file = NULL;
|
||||||
@@ -83,7 +80,7 @@ static void add_cmd(char *cmd)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmds[n] = cmd;
|
cmds[n] = strdup(cmd);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void usage(void)
|
static void usage(void)
|
||||||
@@ -96,7 +93,6 @@ static void usage(void)
|
|||||||
" -p port : connect to port\n"
|
" -p port : connect to port\n"
|
||||||
" -d : use DSS to verify host public key\n"
|
" -d : use DSS to verify host public key\n"
|
||||||
" -r : use RSA to verify host public key\n"
|
" -r : use RSA to verify host public key\n"
|
||||||
" -F file : parse configuration file instead of default one\n"
|
|
||||||
#ifdef WITH_PCAP
|
#ifdef WITH_PCAP
|
||||||
" -P file : create a pcap debugging file\n"
|
" -P file : create a pcap debugging file\n"
|
||||||
#endif
|
#endif
|
||||||
@@ -113,14 +109,11 @@ static int opts(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
while((i = getopt(argc,argv,"T:P:F:")) != -1) {
|
while((i = getopt(argc,argv,"T:P:")) != -1) {
|
||||||
switch(i){
|
switch(i){
|
||||||
case 'P':
|
case 'P':
|
||||||
pcap_file = optarg;
|
pcap_file = optarg;
|
||||||
break;
|
break;
|
||||||
case 'F':
|
|
||||||
config_file = optarg;
|
|
||||||
break;
|
|
||||||
#ifndef _WIN32
|
#ifndef _WIN32
|
||||||
case 'T':
|
case 'T':
|
||||||
proxycommand = optarg;
|
proxycommand = optarg;
|
||||||
@@ -128,7 +121,7 @@ static int opts(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
default:
|
default:
|
||||||
fprintf(stderr, "Unknown option %c\n", optopt);
|
fprintf(stderr, "Unknown option %c\n", optopt);
|
||||||
return -1;
|
usage();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (optind < argc) {
|
if (optind < argc) {
|
||||||
@@ -140,7 +133,7 @@ static int opts(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (host == NULL) {
|
if (host == NULL) {
|
||||||
return -1;
|
usage();
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
@@ -175,25 +168,22 @@ static void do_exit(int i)
|
|||||||
exit(0);
|
exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static ssh_channel chan;
|
||||||
static int signal_delayed = 0;
|
static int signal_delayed = 0;
|
||||||
|
|
||||||
#ifdef SIGWINCH
|
|
||||||
static void sigwindowchanged(int i)
|
static void sigwindowchanged(int i)
|
||||||
{
|
{
|
||||||
(void) i;
|
(void) i;
|
||||||
signal_delayed = 1;
|
signal_delayed = 1;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
static void setsignal(void)
|
static void setsignal(void)
|
||||||
{
|
{
|
||||||
#ifdef SIGWINCH
|
|
||||||
signal(SIGWINCH, sigwindowchanged);
|
signal(SIGWINCH, sigwindowchanged);
|
||||||
#endif
|
|
||||||
signal_delayed = 0;
|
signal_delayed = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void sizechanged(ssh_channel chan)
|
static void sizechanged(void)
|
||||||
{
|
{
|
||||||
struct winsize win = {
|
struct winsize win = {
|
||||||
.ws_row = 0,
|
.ws_row = 0,
|
||||||
@@ -207,20 +197,19 @@ static void sizechanged(ssh_channel chan)
|
|||||||
static void select_loop(ssh_session session,ssh_channel channel)
|
static void select_loop(ssh_session session,ssh_channel channel)
|
||||||
{
|
{
|
||||||
ssh_connector connector_in, connector_out, connector_err;
|
ssh_connector connector_in, connector_out, connector_err;
|
||||||
int rc;
|
|
||||||
|
|
||||||
ssh_event event = ssh_event_new();
|
ssh_event event = ssh_event_new();
|
||||||
|
|
||||||
/* stdin */
|
/* stdin */
|
||||||
connector_in = ssh_connector_new(session);
|
connector_in = ssh_connector_new(session);
|
||||||
ssh_connector_set_out_channel(connector_in, channel, SSH_CONNECTOR_STDINOUT);
|
ssh_connector_set_out_channel(connector_in, channel, SSH_CONNECTOR_STDOUT);
|
||||||
ssh_connector_set_in_fd(connector_in, 0);
|
ssh_connector_set_in_fd(connector_in, 0);
|
||||||
ssh_event_add_connector(event, connector_in);
|
ssh_event_add_connector(event, connector_in);
|
||||||
|
|
||||||
/* stdout */
|
/* stdout */
|
||||||
connector_out = ssh_connector_new(session);
|
connector_out = ssh_connector_new(session);
|
||||||
ssh_connector_set_out_fd(connector_out, 1);
|
ssh_connector_set_out_fd(connector_out, 1);
|
||||||
ssh_connector_set_in_channel(connector_out, channel, SSH_CONNECTOR_STDINOUT);
|
ssh_connector_set_in_channel(connector_out, channel, SSH_CONNECTOR_STDOUT);
|
||||||
ssh_event_add_connector(event, connector_out);
|
ssh_event_add_connector(event, connector_out);
|
||||||
|
|
||||||
/* stderr */
|
/* stderr */
|
||||||
@@ -231,13 +220,9 @@ static void select_loop(ssh_session session,ssh_channel channel)
|
|||||||
|
|
||||||
while (ssh_channel_is_open(channel)) {
|
while (ssh_channel_is_open(channel)) {
|
||||||
if (signal_delayed) {
|
if (signal_delayed) {
|
||||||
sizechanged(channel);
|
sizechanged();
|
||||||
}
|
|
||||||
rc = ssh_event_dopoll(event, 60000);
|
|
||||||
if (rc == SSH_ERROR) {
|
|
||||||
fprintf(stderr, "Error in ssh_event_dopoll()\n");
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
|
ssh_event_dopoll(event, 60000);
|
||||||
}
|
}
|
||||||
ssh_event_remove_connector(event, connector_in);
|
ssh_event_remove_connector(event, connector_in);
|
||||||
ssh_event_remove_connector(event, connector_out);
|
ssh_event_remove_connector(event, connector_out);
|
||||||
@@ -248,6 +233,7 @@ static void select_loop(ssh_session session,ssh_channel channel)
|
|||||||
ssh_connector_free(connector_err);
|
ssh_connector_free(connector_err);
|
||||||
|
|
||||||
ssh_event_free(event);
|
ssh_event_free(event);
|
||||||
|
ssh_channel_free(channel);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void shell(ssh_session session)
|
static void shell(ssh_session session)
|
||||||
@@ -255,11 +241,7 @@ static void shell(ssh_session session)
|
|||||||
ssh_channel channel;
|
ssh_channel channel;
|
||||||
struct termios terminal_local;
|
struct termios terminal_local;
|
||||||
int interactive=isatty(0);
|
int interactive=isatty(0);
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
channel = ssh_channel_new(session);
|
||||||
if (channel == NULL) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (interactive) {
|
if (interactive) {
|
||||||
tcgetattr(0, &terminal_local);
|
tcgetattr(0, &terminal_local);
|
||||||
@@ -268,17 +250,16 @@ static void shell(ssh_session session)
|
|||||||
|
|
||||||
if (ssh_channel_open_session(channel)) {
|
if (ssh_channel_open_session(channel)) {
|
||||||
printf("Error opening channel : %s\n", ssh_get_error(session));
|
printf("Error opening channel : %s\n", ssh_get_error(session));
|
||||||
ssh_channel_free(channel);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
chan = channel;
|
||||||
if (interactive) {
|
if (interactive) {
|
||||||
ssh_channel_request_pty(channel);
|
ssh_channel_request_pty(channel);
|
||||||
sizechanged(channel);
|
sizechanged();
|
||||||
}
|
}
|
||||||
|
|
||||||
if (ssh_channel_request_shell(channel)) {
|
if (ssh_channel_request_shell(channel)) {
|
||||||
printf("Requesting shell : %s\n", ssh_get_error(session));
|
printf("Requesting shell : %s\n", ssh_get_error(session));
|
||||||
ssh_channel_free(channel);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -292,33 +273,28 @@ static void shell(ssh_session session)
|
|||||||
if (interactive) {
|
if (interactive) {
|
||||||
do_cleanup(0);
|
do_cleanup(0);
|
||||||
}
|
}
|
||||||
ssh_channel_free(channel);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void batch_shell(ssh_session session)
|
static void batch_shell(ssh_session session)
|
||||||
{
|
{
|
||||||
ssh_channel channel;
|
ssh_channel channel;
|
||||||
char buffer[PATH_MAX];
|
char buffer[1024];
|
||||||
size_t i;
|
size_t i;
|
||||||
int s = 0;
|
int s = 0;
|
||||||
|
|
||||||
for (i = 0; i < MAXCMD && cmds[i]; ++i) {
|
for (i = 0; i < MAXCMD && cmds[i]; ++i) {
|
||||||
s += snprintf(buffer + s, sizeof(buffer) - s, "%s ", cmds[i]);
|
s += snprintf(buffer + s, sizeof(buffer) - s, "%s ", cmds[i]);
|
||||||
|
free(cmds[i]);
|
||||||
|
cmds[i] = NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
channel = ssh_channel_new(session);
|
channel = ssh_channel_new(session);
|
||||||
if (channel == NULL) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssh_channel_open_session(channel);
|
ssh_channel_open_session(channel);
|
||||||
if (ssh_channel_request_exec(channel, buffer)) {
|
if (ssh_channel_request_exec(channel, buffer)) {
|
||||||
printf("Error executing '%s' : %s\n", buffer, ssh_get_error(session));
|
printf("Error executing '%s' : %s\n", buffer, ssh_get_error(session));
|
||||||
ssh_channel_free(channel);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
select_loop(session, channel);
|
select_loop(session, channel);
|
||||||
ssh_channel_free(channel);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int client(ssh_session session)
|
static int client(ssh_session session)
|
||||||
@@ -332,7 +308,7 @@ static int client(ssh_session session)
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (ssh_options_set(session, SSH_OPTIONS_HOST, host) < 0) {
|
if (ssh_options_set(session, SSH_OPTIONS_HOST ,host) < 0) {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (proxycommand != NULL) {
|
if (proxycommand != NULL) {
|
||||||
@@ -340,13 +316,7 @@ static int client(ssh_session session)
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/* Parse configuration file if specified: The command-line options will
|
ssh_options_parse_config(session, NULL);
|
||||||
* overwrite items loaded from configuration file */
|
|
||||||
if (config_file != NULL) {
|
|
||||||
ssh_options_parse_config(session, config_file);
|
|
||||||
} else {
|
|
||||||
ssh_options_parse_config(session, NULL);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssh_connect(session)) {
|
if (ssh_connect(session)) {
|
||||||
fprintf(stderr, "Connection failed : %s\n", ssh_get_error(session));
|
fprintf(stderr, "Connection failed : %s\n", ssh_get_error(session));
|
||||||
@@ -410,20 +380,18 @@ int main(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
ssh_session session;
|
ssh_session session;
|
||||||
|
|
||||||
ssh_init();
|
|
||||||
session = ssh_new();
|
session = ssh_new();
|
||||||
|
|
||||||
ssh_callbacks_init(&cb);
|
ssh_callbacks_init(&cb);
|
||||||
ssh_set_callbacks(session,&cb);
|
ssh_set_callbacks(session,&cb);
|
||||||
|
|
||||||
if (ssh_options_getopt(session, &argc, argv) || opts(argc, argv)) {
|
if (ssh_options_getopt(session, &argc, argv)) {
|
||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error parsing command line: %s\n",
|
"Error parsing command line: %s\n",
|
||||||
ssh_get_error(session));
|
ssh_get_error(session));
|
||||||
ssh_free(session);
|
|
||||||
ssh_finalize();
|
|
||||||
usage();
|
usage();
|
||||||
}
|
}
|
||||||
|
opts(argc, argv);
|
||||||
signal(SIGTERM, do_exit);
|
signal(SIGTERM, do_exit);
|
||||||
|
|
||||||
set_pcap(session);
|
set_pcap(session);
|
||||||
|
|||||||
@@ -24,7 +24,6 @@ The goal is to show the API in action.
|
|||||||
#ifdef HAVE_LIBUTIL_H
|
#ifdef HAVE_LIBUTIL_H
|
||||||
#include <libutil.h>
|
#include <libutil.h>
|
||||||
#endif
|
#endif
|
||||||
#include <pthread.h>
|
|
||||||
#ifdef HAVE_PTY_H
|
#ifdef HAVE_PTY_H
|
||||||
#include <pty.h>
|
#include <pty.h>
|
||||||
#endif
|
#endif
|
||||||
@@ -38,13 +37,8 @@ The goal is to show the API in action.
|
|||||||
#endif
|
#endif
|
||||||
#include <sys/ioctl.h>
|
#include <sys/ioctl.h>
|
||||||
#include <sys/wait.h>
|
#include <sys/wait.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 1048576
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef KEYS_FOLDER
|
#ifndef KEYS_FOLDER
|
||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
#define KEYS_FOLDER
|
#define KEYS_FOLDER
|
||||||
@@ -53,6 +47,9 @@ The goal is to show the API in action.
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#define USER "myuser"
|
||||||
|
#define PASS "mypassword"
|
||||||
|
#define BUF_SIZE 1048576
|
||||||
#define SESSION_END (SSH_CLOSED | SSH_CLOSED_ERROR)
|
#define SESSION_END (SSH_CLOSED | SSH_CLOSED_ERROR)
|
||||||
#define SFTP_SERVER_PATH "/usr/lib/sftp-server"
|
#define SFTP_SERVER_PATH "/usr/lib/sftp-server"
|
||||||
|
|
||||||
@@ -72,13 +69,8 @@ static void set_default_keys(ssh_bind sshbind,
|
|||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_ECDSAKEY,
|
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_ECDSAKEY,
|
||||||
KEYS_FOLDER "ssh_host_ecdsa_key");
|
KEYS_FOLDER "ssh_host_ecdsa_key");
|
||||||
}
|
}
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY,
|
|
||||||
KEYS_FOLDER "ssh_host_ed25519_key");
|
|
||||||
}
|
}
|
||||||
#define DEF_STR_SIZE 1024
|
|
||||||
char authorizedkeys[DEF_STR_SIZE] = {0};
|
|
||||||
char username[128] = "myuser";
|
|
||||||
char password[128] = "mypassword";
|
|
||||||
#ifdef HAVE_ARGP_H
|
#ifdef HAVE_ARGP_H
|
||||||
const char *argp_program_version = "libssh server example "
|
const char *argp_program_version = "libssh server example "
|
||||||
SSH_STRINGIFY(LIBSSH_VERSION);
|
SSH_STRINGIFY(LIBSSH_VERSION);
|
||||||
@@ -133,30 +125,6 @@ static struct argp_option options[] = {
|
|||||||
.doc = "Set the ecdsa key.",
|
.doc = "Set the ecdsa key.",
|
||||||
.group = 0
|
.group = 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
.name = "authorizedkeys",
|
|
||||||
.key = 'a',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set the authorized keys file.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "user",
|
|
||||||
.key = 'u',
|
|
||||||
.arg = "USERNAME",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set expected username.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "pass",
|
|
||||||
.key = 'P',
|
|
||||||
.arg = "PASSWORD",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set expected password.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
.name = "no-default-keys",
|
.name = "no-default-keys",
|
||||||
.key = 'n',
|
.key = 'n',
|
||||||
@@ -210,15 +178,6 @@ static error_t parse_opt (int key, char *arg, struct argp_state *state) {
|
|||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_ECDSAKEY, arg);
|
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_ECDSAKEY, arg);
|
||||||
ecdsa_already_set = 1;
|
ecdsa_already_set = 1;
|
||||||
break;
|
break;
|
||||||
case 'a':
|
|
||||||
strncpy(authorizedkeys, arg, DEF_STR_SIZE-1);
|
|
||||||
break;
|
|
||||||
case 'u':
|
|
||||||
strncpy(username, arg, sizeof(username) - 1);
|
|
||||||
break;
|
|
||||||
case 'P':
|
|
||||||
strncpy(password, arg, sizeof(password) - 1);
|
|
||||||
break;
|
|
||||||
case 'v':
|
case 'v':
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR,
|
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR,
|
||||||
"3");
|
"3");
|
||||||
@@ -252,89 +211,6 @@ static error_t parse_opt (int key, char *arg, struct argp_state *state) {
|
|||||||
|
|
||||||
/* Our argp parser. */
|
/* Our argp parser. */
|
||||||
static struct argp argp = {options, parse_opt, args_doc, doc, NULL, NULL, NULL};
|
static struct argp argp = {options, parse_opt, args_doc, doc, NULL, NULL, NULL};
|
||||||
#else
|
|
||||||
static int parse_opt(int argc, char **argv, ssh_bind sshbind) {
|
|
||||||
int no_default_keys = 0;
|
|
||||||
int rsa_already_set = 0;
|
|
||||||
int dsa_already_set = 0;
|
|
||||||
int ecdsa_already_set = 0;
|
|
||||||
int key;
|
|
||||||
|
|
||||||
while((key = getopt(argc, argv, "a:d:e:k:np:P:r:u:v")) != -1) {
|
|
||||||
if (key == 'n') {
|
|
||||||
no_default_keys = 1;
|
|
||||||
} else if (key == 'p') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT_STR, optarg);
|
|
||||||
} else if (key == 'd') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_DSAKEY, optarg);
|
|
||||||
dsa_already_set = 1;
|
|
||||||
} else if (key == 'k') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, optarg);
|
|
||||||
/* We can't track the types of keys being added with this
|
|
||||||
option, so let's ensure we keep the keys we're adding
|
|
||||||
by just not setting the default keys */
|
|
||||||
no_default_keys = 1;
|
|
||||||
} else if (key == 'r') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_RSAKEY, optarg);
|
|
||||||
rsa_already_set = 1;
|
|
||||||
} else if (key == 'e') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_ECDSAKEY, optarg);
|
|
||||||
ecdsa_already_set = 1;
|
|
||||||
} else if (key == 'a') {
|
|
||||||
strncpy(authorizedkeys, optarg, DEF_STR_SIZE-1);
|
|
||||||
} else if (key == 'u') {
|
|
||||||
strncpy(username, optarg, sizeof(username) - 1);
|
|
||||||
} else if (key == 'P') {
|
|
||||||
strncpy(password, optarg, sizeof(password) - 1);
|
|
||||||
} else if (key == 'v') {
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR,
|
|
||||||
"3");
|
|
||||||
} else {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (key != -1) {
|
|
||||||
printf("Usage: %s [OPTION...] BINDADDR\n"
|
|
||||||
"libssh %s -- a Secure Shell protocol implementation\n"
|
|
||||||
"\n"
|
|
||||||
" -a, --authorizedkeys=FILE Set the authorized keys file.\n"
|
|
||||||
" -d, --dsakey=FILE Set the dsa key.\n"
|
|
||||||
" -e, --ecdsakey=FILE Set the ecdsa key.\n"
|
|
||||||
" -k, --hostkey=FILE Set a host key. Can be used multiple times.\n"
|
|
||||||
" Implies no default keys.\n"
|
|
||||||
" -n, --no-default-keys Do not set default key locations.\n"
|
|
||||||
" -p, --port=PORT Set the port to bind.\n"
|
|
||||||
" -P, --pass=PASSWORD Set expected password.\n"
|
|
||||||
" -r, --rsakey=FILE Set the rsa key.\n"
|
|
||||||
" -u, --user=USERNAME Set expected username.\n"
|
|
||||||
" -v, --verbose Get verbose output.\n"
|
|
||||||
" -?, --help Give this help list\n"
|
|
||||||
"\n"
|
|
||||||
"Mandatory or optional arguments to long options are also mandatory or optional\n"
|
|
||||||
"for any corresponding short options.\n"
|
|
||||||
"\n"
|
|
||||||
"Report bugs to <libssh@libssh.org>.\n",
|
|
||||||
argv[0], SSH_STRINGIFY(LIBSSH_VERSION));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (optind != argc - 1) {
|
|
||||||
printf("Usage: %s [OPTION...] BINDADDR\n", argv[0]);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, argv[optind]);
|
|
||||||
|
|
||||||
if (!no_default_keys) {
|
|
||||||
set_default_keys(sshbind,
|
|
||||||
rsa_already_set,
|
|
||||||
dsa_already_set,
|
|
||||||
ecdsa_already_set);
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
#endif /* HAVE_ARGP_H */
|
#endif /* HAVE_ARGP_H */
|
||||||
|
|
||||||
/* A userdata struct for channel. */
|
/* A userdata struct for channel. */
|
||||||
@@ -549,7 +425,7 @@ static int auth_password(ssh_session session, const char *user,
|
|||||||
|
|
||||||
(void) session;
|
(void) session;
|
||||||
|
|
||||||
if (strcmp(user, username) == 0 && strcmp(pass, password) == 0) {
|
if (strcmp(user, USER) == 0 && strcmp(pass, PASS) == 0) {
|
||||||
sdata->authenticated = 1;
|
sdata->authenticated = 1;
|
||||||
return SSH_AUTH_SUCCESS;
|
return SSH_AUTH_SUCCESS;
|
||||||
}
|
}
|
||||||
@@ -558,53 +434,6 @@ static int auth_password(ssh_session session, const char *user,
|
|||||||
return SSH_AUTH_DENIED;
|
return SSH_AUTH_DENIED;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int auth_publickey(ssh_session session,
|
|
||||||
const char *user,
|
|
||||||
struct ssh_key_struct *pubkey,
|
|
||||||
char signature_state,
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
struct session_data_struct *sdata = (struct session_data_struct *) userdata;
|
|
||||||
|
|
||||||
(void) user;
|
|
||||||
(void) session;
|
|
||||||
|
|
||||||
if (signature_state == SSH_PUBLICKEY_STATE_NONE) {
|
|
||||||
return SSH_AUTH_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (signature_state != SSH_PUBLICKEY_STATE_VALID) {
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
}
|
|
||||||
|
|
||||||
// valid so far. Now look through authorized keys for a match
|
|
||||||
if (authorizedkeys[0]) {
|
|
||||||
ssh_key key = NULL;
|
|
||||||
int result;
|
|
||||||
struct stat buf;
|
|
||||||
|
|
||||||
if (stat(authorizedkeys, &buf) == 0) {
|
|
||||||
result = ssh_pki_import_pubkey_file( authorizedkeys, &key );
|
|
||||||
if ((result != SSH_OK) || (key==NULL)) {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Unable to import public key file %s\n",
|
|
||||||
authorizedkeys);
|
|
||||||
} else {
|
|
||||||
result = ssh_key_cmp( key, pubkey, SSH_KEY_CMP_PUBLIC );
|
|
||||||
ssh_key_free(key);
|
|
||||||
if (result == 0) {
|
|
||||||
sdata->authenticated = 1;
|
|
||||||
return SSH_AUTH_SUCCESS;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// no matches
|
|
||||||
sdata->authenticated = 0;
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
}
|
|
||||||
|
|
||||||
static ssh_channel channel_open(ssh_session session, void *userdata) {
|
static ssh_channel channel_open(ssh_session session, void *userdata) {
|
||||||
struct session_data_struct *sdata = (struct session_data_struct *) userdata;
|
struct session_data_struct *sdata = (struct session_data_struct *) userdata;
|
||||||
|
|
||||||
@@ -689,12 +518,6 @@ static void handle_session(ssh_event event, ssh_session session) {
|
|||||||
.channel_open_request_session_function = channel_open,
|
.channel_open_request_session_function = channel_open,
|
||||||
};
|
};
|
||||||
|
|
||||||
if (authorizedkeys[0]) {
|
|
||||||
server_cb.auth_pubkey_function = auth_publickey;
|
|
||||||
ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_PUBLICKEY);
|
|
||||||
} else
|
|
||||||
ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD);
|
|
||||||
|
|
||||||
ssh_callbacks_init(&server_cb);
|
ssh_callbacks_init(&server_cb);
|
||||||
ssh_callbacks_init(&channel_cb);
|
ssh_callbacks_init(&channel_cb);
|
||||||
|
|
||||||
@@ -705,6 +528,7 @@ static void handle_session(ssh_event event, ssh_session session) {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD);
|
||||||
ssh_event_add_session(event, session);
|
ssh_event_add_session(event, session);
|
||||||
|
|
||||||
n = 0;
|
n = 0;
|
||||||
@@ -787,38 +611,18 @@ static void handle_session(ssh_event event, ssh_session session) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef WITH_FORK
|
|
||||||
/* SIGCHLD handler for cleaning up dead children. */
|
/* SIGCHLD handler for cleaning up dead children. */
|
||||||
static void sigchld_handler(int signo) {
|
static void sigchld_handler(int signo) {
|
||||||
(void) signo;
|
(void) signo;
|
||||||
while (waitpid(-1, NULL, WNOHANG) > 0);
|
while (waitpid(-1, NULL, WNOHANG) > 0);
|
||||||
}
|
}
|
||||||
#else
|
|
||||||
static void *session_thread(void *arg) {
|
|
||||||
ssh_session session = arg;
|
|
||||||
ssh_event event;
|
|
||||||
|
|
||||||
event = ssh_event_new();
|
|
||||||
if (event != NULL) {
|
|
||||||
/* Blocks until the SSH session ends by either
|
|
||||||
* child thread exiting, or client disconnecting. */
|
|
||||||
handle_session(event, session);
|
|
||||||
ssh_event_free(event);
|
|
||||||
} else {
|
|
||||||
fprintf(stderr, "Could not create polling context\n");
|
|
||||||
}
|
|
||||||
ssh_disconnect(session);
|
|
||||||
ssh_free(session);
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
int main(int argc, char **argv) {
|
int main(int argc, char **argv) {
|
||||||
ssh_bind sshbind;
|
ssh_bind sshbind;
|
||||||
ssh_session session;
|
ssh_session session;
|
||||||
int rc;
|
ssh_event event;
|
||||||
#ifdef WITH_FORK
|
|
||||||
struct sigaction sa;
|
struct sigaction sa;
|
||||||
|
int rc;
|
||||||
|
|
||||||
/* Set up SIGCHLD handler. */
|
/* Set up SIGCHLD handler. */
|
||||||
sa.sa_handler = sigchld_handler;
|
sa.sa_handler = sigchld_handler;
|
||||||
@@ -828,7 +632,6 @@ int main(int argc, char **argv) {
|
|||||||
fprintf(stderr, "Failed to register SIGCHLD handler\n");
|
fprintf(stderr, "Failed to register SIGCHLD handler\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
rc = ssh_init();
|
rc = ssh_init();
|
||||||
if (rc < 0) {
|
if (rc < 0) {
|
||||||
@@ -839,24 +642,20 @@ int main(int argc, char **argv) {
|
|||||||
sshbind = ssh_bind_new();
|
sshbind = ssh_bind_new();
|
||||||
if (sshbind == NULL) {
|
if (sshbind == NULL) {
|
||||||
fprintf(stderr, "ssh_bind_new failed\n");
|
fprintf(stderr, "ssh_bind_new failed\n");
|
||||||
ssh_finalize();
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef HAVE_ARGP_H
|
#ifdef HAVE_ARGP_H
|
||||||
argp_parse(&argp, argc, argv, 0, 0, sshbind);
|
argp_parse(&argp, argc, argv, 0, 0, sshbind);
|
||||||
#else
|
#else
|
||||||
if (parse_opt(argc, argv, sshbind) < 0) {
|
(void) argc;
|
||||||
ssh_bind_free(sshbind);
|
(void) argv;
|
||||||
ssh_finalize();
|
|
||||||
return 1;
|
set_default_keys(sshbind, 0, 0, 0);
|
||||||
}
|
|
||||||
#endif /* HAVE_ARGP_H */
|
#endif /* HAVE_ARGP_H */
|
||||||
|
|
||||||
if(ssh_bind_listen(sshbind) < 0) {
|
if(ssh_bind_listen(sshbind) < 0) {
|
||||||
fprintf(stderr, "%s\n", ssh_get_error(sshbind));
|
fprintf(stderr, "%s\n", ssh_get_error(sshbind));
|
||||||
ssh_bind_free(sshbind);
|
|
||||||
ssh_finalize();
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -869,9 +668,6 @@ int main(int argc, char **argv) {
|
|||||||
|
|
||||||
/* Blocks until there is a new incoming connection. */
|
/* Blocks until there is a new incoming connection. */
|
||||||
if(ssh_bind_accept(sshbind, session) != SSH_ERROR) {
|
if(ssh_bind_accept(sshbind, session) != SSH_ERROR) {
|
||||||
#ifdef WITH_FORK
|
|
||||||
ssh_event event;
|
|
||||||
|
|
||||||
switch(fork()) {
|
switch(fork()) {
|
||||||
case 0:
|
case 0:
|
||||||
/* Remove the SIGCHLD handler inherited from parent. */
|
/* Remove the SIGCHLD handler inherited from parent. */
|
||||||
@@ -897,16 +693,6 @@ int main(int argc, char **argv) {
|
|||||||
case -1:
|
case -1:
|
||||||
fprintf(stderr, "Failed to fork\n");
|
fprintf(stderr, "Failed to fork\n");
|
||||||
}
|
}
|
||||||
#else
|
|
||||||
pthread_t tid;
|
|
||||||
|
|
||||||
rc = pthread_create(&tid, NULL, session_thread, session);
|
|
||||||
if (rc == 0) {
|
|
||||||
pthread_detach(tid);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
fprintf(stderr, "Failed to pthread_create\n");
|
|
||||||
#endif
|
|
||||||
} else {
|
} else {
|
||||||
fprintf(stderr, "%s\n", ssh_get_error(sshbind));
|
fprintf(stderr, "%s\n", ssh_get_error(sshbind));
|
||||||
}
|
}
|
||||||
@@ -1,754 +0,0 @@
|
|||||||
/* This is a sample implementation of a libssh based SSH server */
|
|
||||||
/*
|
|
||||||
Copyright 2003-2009 Aris Adamantiadis
|
|
||||||
Copyright 2018 T. Wimmer
|
|
||||||
|
|
||||||
This file is part of the SSH Library
|
|
||||||
|
|
||||||
You are free to copy this file, modify it in any way, consider it being public
|
|
||||||
domain. This does not apply to the rest of the library though, but it is
|
|
||||||
allowed to cut-and-paste working code from this file to any license of
|
|
||||||
program.
|
|
||||||
The goal is to show the API in action. It's not a reference on how terminal
|
|
||||||
clients must be made or how a client should react.
|
|
||||||
*/
|
|
||||||
|
|
||||||
/*
|
|
||||||
Example:
|
|
||||||
./sshd_direct-tcpip -v -p 2022 -d serverkey.dsa -r serverkey.rsa 127.0.0.1
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include "config.h"
|
|
||||||
|
|
||||||
#include <libssh/libssh.h>
|
|
||||||
#include <libssh/server.h>
|
|
||||||
#include <libssh/callbacks.h>
|
|
||||||
|
|
||||||
#ifdef HAVE_ARGP_H
|
|
||||||
#include <argp.h>
|
|
||||||
#endif
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include <sys/socket.h>
|
|
||||||
#include <stdbool.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <poll.h>
|
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 16384
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define SAFE_FREE(x) do { if ((x) != NULL) {free(x); x=NULL;} } while(0)
|
|
||||||
|
|
||||||
#ifndef __unused__
|
|
||||||
# ifdef HAVE_UNUSED_ATTRIBUTE
|
|
||||||
# define __unused__ __attribute__((unused))
|
|
||||||
# else /* HAVE_UNUSED_ATTRIBUTE */
|
|
||||||
# define __unused__
|
|
||||||
# endif /* HAVE_UNUSED_ATTRIBUTE */
|
|
||||||
#endif /* __unused__ */
|
|
||||||
|
|
||||||
#ifndef UNUSED_PARAM
|
|
||||||
#define UNUSED_PARAM(param) param __unused__
|
|
||||||
#endif /* UNUSED_PARAM */
|
|
||||||
|
|
||||||
#ifndef KEYS_FOLDER
|
|
||||||
#ifdef _WIN32
|
|
||||||
#define KEYS_FOLDER
|
|
||||||
#else
|
|
||||||
#define KEYS_FOLDER "/etc/ssh/"
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define USER "user"
|
|
||||||
#define PASSWORD "pwd"
|
|
||||||
|
|
||||||
struct event_fd_data_struct {
|
|
||||||
int *p_fd;
|
|
||||||
ssh_channel channel;
|
|
||||||
struct ssh_channel_callbacks_struct *cb_chan;
|
|
||||||
int stacked;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct cleanup_node_struct {
|
|
||||||
struct event_fd_data_struct *data;
|
|
||||||
struct cleanup_node_struct *next;
|
|
||||||
};
|
|
||||||
|
|
||||||
static bool authenticated = false;
|
|
||||||
static int tries = 0;
|
|
||||||
static bool error_set = false;
|
|
||||||
static int sockets_cnt = 0;
|
|
||||||
static ssh_event mainloop = NULL;
|
|
||||||
static struct cleanup_node_struct *cleanup_stack = NULL;
|
|
||||||
|
|
||||||
static void _close_socket(struct event_fd_data_struct event_fd_data);
|
|
||||||
|
|
||||||
static void
|
|
||||||
cleanup_push(struct cleanup_node_struct** head_ref,
|
|
||||||
struct event_fd_data_struct *new_data)
|
|
||||||
{
|
|
||||||
// Allocate memory for node
|
|
||||||
struct cleanup_node_struct *new_node = malloc(sizeof *new_node);
|
|
||||||
|
|
||||||
if (*head_ref != NULL) {
|
|
||||||
new_node->next = *head_ref;
|
|
||||||
} else {
|
|
||||||
new_node->next = NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Copy new_data
|
|
||||||
new_node->data = new_data;
|
|
||||||
|
|
||||||
// Change head pointer as new node is added at the beginning
|
|
||||||
(*head_ref) = new_node;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
do_cleanup(struct cleanup_node_struct **head_ref)
|
|
||||||
{
|
|
||||||
struct cleanup_node_struct *current = (*head_ref);
|
|
||||||
struct cleanup_node_struct *previous = NULL, *gone = NULL;
|
|
||||||
|
|
||||||
while (current != NULL) {
|
|
||||||
if (ssh_channel_is_closed(current->data->channel)) {
|
|
||||||
if (current == (*head_ref)) {
|
|
||||||
(*head_ref) = current->next;
|
|
||||||
}
|
|
||||||
if (previous != NULL) {
|
|
||||||
previous->next = current->next;
|
|
||||||
}
|
|
||||||
gone = current;
|
|
||||||
current = current->next;
|
|
||||||
|
|
||||||
if (gone->data->channel) {
|
|
||||||
_close_socket(*gone->data);
|
|
||||||
ssh_remove_channel_callbacks(gone->data->channel, gone->data->cb_chan);
|
|
||||||
ssh_channel_free(gone->data->channel);
|
|
||||||
gone->data->channel = NULL;
|
|
||||||
|
|
||||||
SAFE_FREE(gone->data->p_fd);
|
|
||||||
SAFE_FREE(gone->data->cb_chan);
|
|
||||||
SAFE_FREE(gone->data);
|
|
||||||
SAFE_FREE(gone);
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
fprintf(stderr, "channel already freed!\n");
|
|
||||||
}
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== do_cleanup", "Freed.");
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
ssh_channel_close(current->data->channel);
|
|
||||||
previous = current;
|
|
||||||
current = current->next;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
auth_password(ssh_session session,
|
|
||||||
const char *user,
|
|
||||||
const char *password,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== auth_password", "Authenticating user %s pwd %s",
|
|
||||||
user,
|
|
||||||
password);
|
|
||||||
if (strcmp(user, USER) == 0 && strcmp(password, PASSWORD) == 0) {
|
|
||||||
authenticated = true;
|
|
||||||
printf("Authenticated\n");
|
|
||||||
return SSH_AUTH_SUCCESS;
|
|
||||||
}
|
|
||||||
if (tries >= 3) {
|
|
||||||
printf("Too many authentication tries\n");
|
|
||||||
ssh_disconnect(session);
|
|
||||||
error_set = true;
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
}
|
|
||||||
tries++;
|
|
||||||
return SSH_AUTH_DENIED;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
auth_gssapi_mic(ssh_session session,
|
|
||||||
const char *user,
|
|
||||||
const char *principal,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
ssh_gssapi_creds creds = ssh_gssapi_get_creds(session);
|
|
||||||
printf("Authenticating user %s with gssapi principal %s\n",
|
|
||||||
user, principal);
|
|
||||||
if (creds != NULL) {
|
|
||||||
printf("Received some gssapi credentials\n");
|
|
||||||
} else {
|
|
||||||
printf("Not received any forwardable creds\n");
|
|
||||||
}
|
|
||||||
printf("authenticated\n");
|
|
||||||
authenticated = true;
|
|
||||||
return SSH_AUTH_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
subsystem_request(UNUSED_PARAM(ssh_session session),
|
|
||||||
UNUSED_PARAM(ssh_channel channel),
|
|
||||||
const char *subsystem,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== subsystem_request", "Channel subsystem reqeuest: %s",
|
|
||||||
subsystem);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
struct ssh_channel_callbacks_struct channel_cb = {
|
|
||||||
.channel_subsystem_request_function = subsystem_request
|
|
||||||
};
|
|
||||||
|
|
||||||
static ssh_channel
|
|
||||||
new_session_channel(UNUSED_PARAM(ssh_session session),
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== subsystem_request", "Session channel request");
|
|
||||||
/* For TCP forward only there seems to be no need for a session channel */
|
|
||||||
/*if(chan != NULL)
|
|
||||||
return NULL;
|
|
||||||
printf("Session channel request\n");
|
|
||||||
chan = ssh_channel_new(session);
|
|
||||||
ssh_callbacks_init(&channel_cb);
|
|
||||||
ssh_set_channel_callbacks(chan, &channel_cb);
|
|
||||||
return chan;*/
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
stack_socket_close(UNUSED_PARAM(ssh_session session),
|
|
||||||
struct event_fd_data_struct *event_fd_data)
|
|
||||||
{
|
|
||||||
if (event_fd_data->stacked != 1) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== stack_socket_close",
|
|
||||||
"Closing fd = %d sockets_cnt = %d", *event_fd_data->p_fd,
|
|
||||||
sockets_cnt);
|
|
||||||
event_fd_data->stacked = 1;
|
|
||||||
cleanup_push(&cleanup_stack, event_fd_data);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
_close_socket(struct event_fd_data_struct event_fd_data)
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== close_socket",
|
|
||||||
"Closing fd = %d sockets_cnt = %d", *event_fd_data.p_fd,
|
|
||||||
sockets_cnt);
|
|
||||||
ssh_event_remove_fd(mainloop, *event_fd_data.p_fd);
|
|
||||||
sockets_cnt--;
|
|
||||||
#ifdef _WIN32
|
|
||||||
closesocket(*event_fd_data.p_fd);
|
|
||||||
#else
|
|
||||||
close(*event_fd_data.p_fd);
|
|
||||||
#endif // _WIN32
|
|
||||||
(*event_fd_data.p_fd) = SSH_INVALID_SOCKET;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
service_request(UNUSED_PARAM(ssh_session session),
|
|
||||||
const char *service,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== service_request", "Service request: %s", service);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
global_request(UNUSED_PARAM(ssh_session session),
|
|
||||||
ssh_message message,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== global_request", "Global request, message type: %d",
|
|
||||||
ssh_message_type(message));
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
my_channel_close_function(ssh_session session,
|
|
||||||
UNUSED_PARAM(ssh_channel channel),
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
struct event_fd_data_struct *event_fd_data = (struct event_fd_data_struct *)userdata;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== my_channel_close_function",
|
|
||||||
"Channel closed by remote.");
|
|
||||||
|
|
||||||
stack_socket_close(session, event_fd_data);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
my_channel_eof_function(ssh_session session,
|
|
||||||
UNUSED_PARAM(ssh_channel channel),
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
struct event_fd_data_struct *event_fd_data = (struct event_fd_data_struct *)userdata;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== my_channel_eof_function",
|
|
||||||
"Got EOF on channel. Shuting down write on socket (fd = %d).",
|
|
||||||
*event_fd_data->p_fd);
|
|
||||||
|
|
||||||
stack_socket_close(session, event_fd_data);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void
|
|
||||||
my_channel_exit_status_function(UNUSED_PARAM(ssh_session session),
|
|
||||||
UNUSED_PARAM(ssh_channel channel),
|
|
||||||
int exit_status,
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
struct event_fd_data_struct *event_fd_data = (struct event_fd_data_struct *)userdata;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== my_channel_exit_status_function",
|
|
||||||
"Got exit status %d on channel fd = %d.",
|
|
||||||
exit_status, *event_fd_data->p_fd);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
my_channel_data_function(ssh_session session,
|
|
||||||
UNUSED_PARAM(ssh_channel channel),
|
|
||||||
void *data,
|
|
||||||
uint32_t len,
|
|
||||||
UNUSED_PARAM(int is_stderr),
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
int i = 0;
|
|
||||||
struct event_fd_data_struct *event_fd_data = (struct event_fd_data_struct *)userdata;
|
|
||||||
|
|
||||||
if (event_fd_data->channel == NULL) {
|
|
||||||
fprintf(stderr, "Why we're here? Stacked = %d\n", event_fd_data->stacked);
|
|
||||||
}
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL,
|
|
||||||
"=== my_channel_data_function",
|
|
||||||
"%d bytes waiting on channel for reading. Fd = %d",
|
|
||||||
len,
|
|
||||||
*event_fd_data->p_fd);
|
|
||||||
if (len > 0) {
|
|
||||||
i = send(*event_fd_data->p_fd, data, len, 0);
|
|
||||||
}
|
|
||||||
if (i < 0) {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== my_channel_data_function",
|
|
||||||
"Writing to tcp socket %d: %s", *event_fd_data->p_fd,
|
|
||||||
strerror(errno));
|
|
||||||
stack_socket_close(session, event_fd_data);
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== my_channel_data_function", "Sent %d bytes", i);
|
|
||||||
}
|
|
||||||
return i;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
my_fd_data_function(UNUSED_PARAM(socket_t fd),
|
|
||||||
int revents,
|
|
||||||
void *userdata)
|
|
||||||
{
|
|
||||||
struct event_fd_data_struct *event_fd_data = (struct event_fd_data_struct *)userdata;
|
|
||||||
ssh_channel channel = event_fd_data->channel;
|
|
||||||
ssh_session session;
|
|
||||||
int len, i, wr;
|
|
||||||
char buf[BUF_SIZE];
|
|
||||||
int blocking;
|
|
||||||
|
|
||||||
if (channel == NULL) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== my_fd_data_function", "channel == NULL!");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
session = ssh_channel_get_session(channel);
|
|
||||||
|
|
||||||
if (ssh_channel_is_closed(channel)) {
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== my_fd_data_function", "channel is closed!");
|
|
||||||
stack_socket_close(session, event_fd_data);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!(revents & POLLIN)) {
|
|
||||||
if (revents & POLLPRI) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "poll revents & POLLPRI");
|
|
||||||
}
|
|
||||||
if (revents & POLLOUT) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "poll revents & POLLOUT");
|
|
||||||
}
|
|
||||||
if (revents & POLLHUP) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "poll revents & POLLHUP");
|
|
||||||
}
|
|
||||||
if (revents & POLLNVAL) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "poll revents & POLLNVAL");
|
|
||||||
}
|
|
||||||
if (revents & POLLERR) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "poll revents & POLLERR");
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
blocking = ssh_is_blocking(session);
|
|
||||||
ssh_set_blocking(session, 0);
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS,
|
|
||||||
"=== my_fd_data_function",
|
|
||||||
"Trying to read from tcp socket fd = %d",
|
|
||||||
*event_fd_data->p_fd);
|
|
||||||
#ifdef _WIN32
|
|
||||||
struct sockaddr from;
|
|
||||||
int fromlen = sizeof(from);
|
|
||||||
len = recvfrom(*event_fd_data->p_fd, buf, sizeof(buf), 0, &from, &fromlen);
|
|
||||||
#else
|
|
||||||
len = recv(*event_fd_data->p_fd, buf, sizeof(buf), 0);
|
|
||||||
#endif // _WIN32
|
|
||||||
if (len < 0) {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== my_fd_data_function", "Reading from tcp socket: %s", strerror(errno));
|
|
||||||
|
|
||||||
ssh_channel_send_eof(channel);
|
|
||||||
}
|
|
||||||
else if (len > 0) {
|
|
||||||
if (ssh_channel_is_open(channel)) {
|
|
||||||
wr = 0;
|
|
||||||
do {
|
|
||||||
i = ssh_channel_write(channel, buf, len);
|
|
||||||
if (i < 0) {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== my_fd_data_function", "Error writing on the direct-tcpip channel: %d", i);
|
|
||||||
len = wr;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
wr += i;
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== my_fd_data_function", "ssh_channel_write (%d from %d)", wr, len);
|
|
||||||
} while (i > 0 && wr < len);
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== my_fd_data_function", "Can't write on closed channel!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== my_fd_data_function", "The destination host has disconnected!");
|
|
||||||
|
|
||||||
ssh_channel_close(channel);
|
|
||||||
#ifdef _WIN32
|
|
||||||
shutdown(*event_fd_data->p_fd, SD_RECEIVE);
|
|
||||||
#else
|
|
||||||
shutdown(*event_fd_data->p_fd, SHUT_RD);
|
|
||||||
#endif // _WIN32
|
|
||||||
}
|
|
||||||
ssh_set_blocking(session, blocking);
|
|
||||||
|
|
||||||
return len;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
open_tcp_socket(ssh_message msg)
|
|
||||||
{
|
|
||||||
struct sockaddr_in sin;
|
|
||||||
int forwardsock = -1;
|
|
||||||
struct hostent *host;
|
|
||||||
const char *dest_hostname;
|
|
||||||
int dest_port;
|
|
||||||
|
|
||||||
forwardsock = socket(AF_INET, SOCK_STREAM, 0);
|
|
||||||
if (forwardsock < 0) {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== open_tcp_socket", "ERROR opening socket: %s", strerror(errno));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
dest_hostname = ssh_message_channel_request_open_destination(msg);
|
|
||||||
dest_port = ssh_message_channel_request_open_destination_port(msg);
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== open_tcp_socket", "Connecting to %s on port %d", dest_hostname, dest_port);
|
|
||||||
|
|
||||||
host = gethostbyname(dest_hostname);
|
|
||||||
if (host == NULL) {
|
|
||||||
close(forwardsock);
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== open_tcp_socket", "ERROR, no such host: %s", dest_hostname);
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
memset((char *)&sin, '\0', sizeof(sin));
|
|
||||||
sin.sin_family = AF_INET;
|
|
||||||
memcpy((char *)&sin.sin_addr.s_addr, (char *)host->h_addr, host->h_length);
|
|
||||||
sin.sin_port = htons(dest_port);
|
|
||||||
|
|
||||||
if (connect(forwardsock, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
|
|
||||||
close(forwardsock);
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== open_tcp_socket", "ERROR connecting: %s", strerror(errno));
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
sockets_cnt++;
|
|
||||||
_ssh_log(SSH_LOG_FUNCTIONS, "=== open_tcp_socket", "Connected. sockets_cnt = %d", sockets_cnt);
|
|
||||||
return forwardsock;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
message_callback(UNUSED_PARAM(ssh_session session),
|
|
||||||
ssh_message message,
|
|
||||||
UNUSED_PARAM(void *userdata))
|
|
||||||
{
|
|
||||||
ssh_channel channel;
|
|
||||||
int socket_fd, *pFd;
|
|
||||||
struct ssh_channel_callbacks_struct *cb_chan;
|
|
||||||
struct event_fd_data_struct *event_fd_data;
|
|
||||||
|
|
||||||
_ssh_log(SSH_LOG_PACKET, "=== message_callback", "Message type: %d",
|
|
||||||
ssh_message_type(message));
|
|
||||||
_ssh_log(SSH_LOG_PACKET, "=== message_callback", "Message Subtype: %d",
|
|
||||||
ssh_message_subtype(message));
|
|
||||||
if (ssh_message_type(message) == SSH_REQUEST_CHANNEL_OPEN) {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== message_callback", "channel_request_open");
|
|
||||||
|
|
||||||
if (ssh_message_subtype(message) == SSH_CHANNEL_DIRECT_TCPIP) {
|
|
||||||
channel = ssh_message_channel_request_open_reply_accept(message);
|
|
||||||
|
|
||||||
if (channel == NULL) {
|
|
||||||
_ssh_log(SSH_LOG_WARNING, "=== message_callback", "Accepting direct-tcpip channel failed!");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
_ssh_log(SSH_LOG_PROTOCOL, "=== message_callback", "Connected to channel!");
|
|
||||||
|
|
||||||
socket_fd = open_tcp_socket(message);
|
|
||||||
if (-1 == socket_fd) {
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
pFd = malloc(sizeof *pFd);
|
|
||||||
cb_chan = malloc(sizeof *cb_chan);
|
|
||||||
event_fd_data = malloc(sizeof *event_fd_data);
|
|
||||||
if (pFd == NULL || cb_chan == NULL || event_fd_data == NULL) {
|
|
||||||
SAFE_FREE(pFd);
|
|
||||||
SAFE_FREE(cb_chan);
|
|
||||||
SAFE_FREE(event_fd_data);
|
|
||||||
close(socket_fd);
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
(*pFd) = socket_fd;
|
|
||||||
event_fd_data->channel = channel;
|
|
||||||
event_fd_data->p_fd = pFd;
|
|
||||||
event_fd_data->stacked = 0;
|
|
||||||
event_fd_data->cb_chan = cb_chan;
|
|
||||||
|
|
||||||
cb_chan->userdata = event_fd_data;
|
|
||||||
cb_chan->channel_eof_function = my_channel_eof_function;
|
|
||||||
cb_chan->channel_close_function = my_channel_close_function;
|
|
||||||
cb_chan->channel_data_function = my_channel_data_function;
|
|
||||||
cb_chan->channel_exit_status_function = my_channel_exit_status_function;
|
|
||||||
|
|
||||||
ssh_callbacks_init(cb_chan);
|
|
||||||
ssh_set_channel_callbacks(channel, cb_chan);
|
|
||||||
|
|
||||||
ssh_event_add_fd(mainloop, (socket_t)*pFd, POLLIN, my_fd_data_function, event_fd_data);
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifdef HAVE_ARGP_H
|
|
||||||
const char *argp_program_version = "libssh server example "
|
|
||||||
SSH_STRINGIFY(LIBSSH_VERSION);
|
|
||||||
const char *argp_program_bug_address = "<libssh@libssh.org>";
|
|
||||||
|
|
||||||
/* Program documentation. */
|
|
||||||
static char doc[] = "libssh -- a Secure Shell protocol implementation";
|
|
||||||
|
|
||||||
/* A description of the arguments we accept. */
|
|
||||||
static char args_doc[] = "BINDADDR";
|
|
||||||
|
|
||||||
/* The options we understand. */
|
|
||||||
static struct argp_option options[] = {
|
|
||||||
{
|
|
||||||
.name = "port",
|
|
||||||
.key = 'p',
|
|
||||||
.arg = "PORT",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set the port to bind.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "hostkey",
|
|
||||||
.key = 'k',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set the host key.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "dsakey",
|
|
||||||
.key = 'd',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set the dsa key.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "rsakey",
|
|
||||||
.key = 'r',
|
|
||||||
.arg = "FILE",
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Set the rsa key.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
.name = "verbose",
|
|
||||||
.key = 'v',
|
|
||||||
.arg = NULL,
|
|
||||||
.flags = 0,
|
|
||||||
.doc = "Get verbose output.",
|
|
||||||
.group = 0
|
|
||||||
},
|
|
||||||
{NULL, 0, NULL, 0, NULL, 0}
|
|
||||||
};
|
|
||||||
|
|
||||||
/* Parse a single option. */
|
|
||||||
static error_t
|
|
||||||
parse_opt (int key, char *arg, struct argp_state *state)
|
|
||||||
{
|
|
||||||
/* Get the input argument from argp_parse, which we
|
|
||||||
* know is a pointer to our arguments structure.
|
|
||||||
*/
|
|
||||||
ssh_bind sshbind = state->input;
|
|
||||||
|
|
||||||
switch (key) {
|
|
||||||
case 'p':
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT_STR, arg);
|
|
||||||
break;
|
|
||||||
case 'd':
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_DSAKEY, arg);
|
|
||||||
break;
|
|
||||||
case 'k':
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, arg);
|
|
||||||
break;
|
|
||||||
case 'r':
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_RSAKEY, arg);
|
|
||||||
break;
|
|
||||||
case 'v':
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY_STR, "1");
|
|
||||||
break;
|
|
||||||
case ARGP_KEY_ARG:
|
|
||||||
if (state->arg_num >= 1) {
|
|
||||||
/* Too many arguments. */
|
|
||||||
argp_usage (state);
|
|
||||||
}
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, arg);
|
|
||||||
break;
|
|
||||||
case ARGP_KEY_END:
|
|
||||||
if (state->arg_num < 1) {
|
|
||||||
/* Not enough arguments. */
|
|
||||||
argp_usage (state);
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
return ARGP_ERR_UNKNOWN;
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Our argp parser. */
|
|
||||||
static struct argp argp = {options, parse_opt, args_doc, doc, NULL, NULL, NULL};
|
|
||||||
#endif /* HAVE_ARGP_H */
|
|
||||||
|
|
||||||
int
|
|
||||||
main(int argc, char **argv)
|
|
||||||
{
|
|
||||||
ssh_session session;
|
|
||||||
ssh_bind sshbind;
|
|
||||||
struct ssh_server_callbacks_struct cb = {
|
|
||||||
.userdata = NULL,
|
|
||||||
.auth_password_function = auth_password,
|
|
||||||
.auth_gssapi_mic_function = auth_gssapi_mic,
|
|
||||||
.channel_open_request_session_function = new_session_channel,
|
|
||||||
.service_request_function = service_request
|
|
||||||
};
|
|
||||||
struct ssh_callbacks_struct cb_gen = {
|
|
||||||
.userdata = NULL,
|
|
||||||
.global_request_function = global_request
|
|
||||||
};
|
|
||||||
|
|
||||||
int ret = 1;
|
|
||||||
|
|
||||||
sshbind = ssh_bind_new();
|
|
||||||
session = ssh_new();
|
|
||||||
mainloop = ssh_event_new();
|
|
||||||
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_DSAKEY, KEYS_FOLDER "ssh_host_dsa_key");
|
|
||||||
ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_RSAKEY, KEYS_FOLDER "ssh_host_rsa_key");
|
|
||||||
|
|
||||||
#ifdef HAVE_ARGP_H
|
|
||||||
/*
|
|
||||||
* Parse our arguments; every option seen by parse_opt will
|
|
||||||
* be reflected in arguments.
|
|
||||||
*/
|
|
||||||
argp_parse (&argp, argc, argv, 0, 0, sshbind);
|
|
||||||
#else
|
|
||||||
(void)argc;
|
|
||||||
(void)argv;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (ssh_bind_listen(sshbind) < 0) {
|
|
||||||
printf("Error listening to socket: %s\n", ssh_get_error(sshbind));
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ssh_bind_accept(sshbind, session) == SSH_ERROR) {
|
|
||||||
printf("error accepting a connection : %s\n", ssh_get_error(sshbind));
|
|
||||||
ret = 1;
|
|
||||||
goto shutdown;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssh_callbacks_init(&cb);
|
|
||||||
ssh_callbacks_init(&cb_gen);
|
|
||||||
ssh_set_server_callbacks(session, &cb);
|
|
||||||
ssh_set_callbacks(session, &cb_gen);
|
|
||||||
ssh_set_message_callback(session, message_callback, (void *)NULL);
|
|
||||||
|
|
||||||
if (ssh_handle_key_exchange(session)) {
|
|
||||||
printf("ssh_handle_key_exchange: %s\n", ssh_get_error(session));
|
|
||||||
ret = 1;
|
|
||||||
goto shutdown;
|
|
||||||
}
|
|
||||||
ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
|
|
||||||
ssh_event_add_session(mainloop, session);
|
|
||||||
|
|
||||||
while (!authenticated) {
|
|
||||||
if (error_set) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if (ssh_event_dopoll(mainloop, -1) == SSH_ERROR) {
|
|
||||||
printf("Error : %s\n", ssh_get_error(session));
|
|
||||||
ret = 1;
|
|
||||||
goto shutdown;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (error_set) {
|
|
||||||
printf("Error, exiting loop\n");
|
|
||||||
} else {
|
|
||||||
printf("Authenticated and got a channel\n");
|
|
||||||
|
|
||||||
while (!error_set) {
|
|
||||||
if (ssh_event_dopoll(mainloop, 100) == SSH_ERROR) {
|
|
||||||
printf("Error : %s\n", ssh_get_error(session));
|
|
||||||
ret = 1;
|
|
||||||
goto shutdown;
|
|
||||||
}
|
|
||||||
do_cleanup(&cleanup_stack);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
shutdown:
|
|
||||||
ssh_disconnect(session);
|
|
||||||
ssh_bind_free(sshbind);
|
|
||||||
ssh_finalize();
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
@@ -34,11 +34,6 @@ clients must be made or how a client should react.
|
|||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
|
|
||||||
#include "examples_common.h"
|
#include "examples_common.h"
|
||||||
|
|
||||||
#ifndef BUF_SIZE
|
|
||||||
#define BUF_SIZE 4096
|
|
||||||
#endif
|
|
||||||
|
|
||||||
char *host;
|
char *host;
|
||||||
const char *desthost="localhost";
|
const char *desthost="localhost";
|
||||||
const char *port="22";
|
const char *port="22";
|
||||||
@@ -82,7 +77,7 @@ static int opts(int argc, char **argv){
|
|||||||
static void select_loop(ssh_session session,ssh_channel channel){
|
static void select_loop(ssh_session session,ssh_channel channel){
|
||||||
fd_set fds;
|
fd_set fds;
|
||||||
struct timeval timeout;
|
struct timeval timeout;
|
||||||
char buffer[BUF_SIZE];
|
char buffer[4096];
|
||||||
/* channels will be set to the channels to poll.
|
/* channels will be set to the channels to poll.
|
||||||
* outchannels will contain the result of the poll
|
* outchannels will contain the result of the poll
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -26,14 +26,8 @@ install(
|
|||||||
FILES
|
FILES
|
||||||
${libssh_HDRS}
|
${libssh_HDRS}
|
||||||
DESTINATION
|
DESTINATION
|
||||||
${CMAKE_INSTALL_INCLUDEDIR}/${APPLICATION_NAME}
|
${INCLUDE_INSTALL_DIR}/${APPLICATION_NAME}
|
||||||
COMPONENT
|
COMPONENT
|
||||||
headers
|
headers
|
||||||
)
|
)
|
||||||
|
|
||||||
configure_file(${CMAKE_CURRENT_SOURCE_DIR}/libssh_version.h.cmake
|
|
||||||
${libssh_BINARY_DIR}/include/libssh/libssh_version.h
|
|
||||||
@ONLY)
|
|
||||||
install(FILES ${libssh_BINARY_DIR}/include/libssh/libssh_version.h
|
|
||||||
DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}/${APPLICATION_NAME}
|
|
||||||
COMPONENT headers)
|
|
||||||
|
|||||||
@@ -77,6 +77,7 @@ struct ssh_agent_struct {
|
|||||||
ssh_channel channel;
|
ssh_channel channel;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
#ifndef _WIN32
|
||||||
/* agent.c */
|
/* agent.c */
|
||||||
/**
|
/**
|
||||||
* @brief Create a new ssh agent structure.
|
* @brief Create a new ssh agent structure.
|
||||||
@@ -103,7 +104,7 @@ void ssh_agent_free(struct ssh_agent_struct *agent);
|
|||||||
*/
|
*/
|
||||||
int ssh_agent_is_running(struct ssh_session_struct *session);
|
int ssh_agent_is_running(struct ssh_session_struct *session);
|
||||||
|
|
||||||
uint32_t ssh_agent_get_ident_count(struct ssh_session_struct *session);
|
int ssh_agent_get_ident_count(struct ssh_session_struct *session);
|
||||||
|
|
||||||
ssh_key ssh_agent_get_next_ident(struct ssh_session_struct *session,
|
ssh_key ssh_agent_get_next_ident(struct ssh_session_struct *session,
|
||||||
char **comment);
|
char **comment);
|
||||||
@@ -114,5 +115,6 @@ ssh_key ssh_agent_get_first_ident(struct ssh_session_struct *session,
|
|||||||
ssh_string ssh_agent_sign_data(ssh_session session,
|
ssh_string ssh_agent_sign_data(ssh_session session,
|
||||||
const ssh_key pubkey,
|
const ssh_key pubkey,
|
||||||
struct ssh_buffer_struct *data);
|
struct ssh_buffer_struct *data);
|
||||||
|
#endif
|
||||||
|
|
||||||
#endif /* __AGENT_H */
|
#endif /* __AGENT_H */
|
||||||
|
|||||||
@@ -26,8 +26,9 @@
|
|||||||
#include "libssh/libmbedcrypto.h"
|
#include "libssh/libmbedcrypto.h"
|
||||||
|
|
||||||
bignum ssh_make_string_bn(ssh_string string);
|
bignum ssh_make_string_bn(ssh_string string);
|
||||||
|
void ssh_make_string_bn_inplace(ssh_string string, bignum bnout);
|
||||||
ssh_string ssh_make_bignum_string(bignum num);
|
ssh_string ssh_make_bignum_string(bignum num);
|
||||||
void ssh_print_bignum(const char *which, const_bignum num);
|
void ssh_print_bignum(const char *which, const bignum num);
|
||||||
|
|
||||||
|
|
||||||
#endif /* BIGNUM_H_ */
|
#endif /* BIGNUM_H_ */
|
||||||
|
|||||||
@@ -22,7 +22,6 @@
|
|||||||
#define BIND_H_
|
#define BIND_H_
|
||||||
|
|
||||||
#include "libssh/priv.h"
|
#include "libssh/priv.h"
|
||||||
#include "libssh/kex.h"
|
|
||||||
#include "libssh/session.h"
|
#include "libssh/session.h"
|
||||||
|
|
||||||
struct ssh_bind_struct {
|
struct ssh_bind_struct {
|
||||||
@@ -32,7 +31,7 @@ struct ssh_bind_struct {
|
|||||||
|
|
||||||
struct ssh_poll_handle_struct *poll;
|
struct ssh_poll_handle_struct *poll;
|
||||||
/* options */
|
/* options */
|
||||||
char *wanted_methods[SSH_KEX_METHODS];
|
char *wanted_methods[10];
|
||||||
char *banner;
|
char *banner;
|
||||||
char *ecdsakey;
|
char *ecdsakey;
|
||||||
char *dsakey;
|
char *dsakey;
|
||||||
@@ -47,11 +46,6 @@ struct ssh_bind_struct {
|
|||||||
unsigned int bindport;
|
unsigned int bindport;
|
||||||
int blocking;
|
int blocking;
|
||||||
int toaccept;
|
int toaccept;
|
||||||
bool config_processed;
|
|
||||||
char *config_dir;
|
|
||||||
char *pubkey_accepted_key_types;
|
|
||||||
char* moduli_file;
|
|
||||||
int rsa_min_size;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct ssh_poll_handle_struct *ssh_bind_get_poll(struct ssh_bind_struct
|
struct ssh_poll_handle_struct *ssh_bind_get_poll(struct ssh_bind_struct
|
||||||
|
|||||||
@@ -1,74 +0,0 @@
|
|||||||
/*
|
|
||||||
* bind_config.h - Parse the SSH server configuration file
|
|
||||||
*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2019 by Red Hat, Inc.
|
|
||||||
*
|
|
||||||
* Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
|
|
||||||
*
|
|
||||||
* The SSH Library is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU Lesser General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
||||||
* option) any later version.
|
|
||||||
*
|
|
||||||
* The SSH Library is distributed in the hope that it will be useful, but
|
|
||||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
||||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
||||||
* License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public License
|
|
||||||
* along with the SSH Library; see the file COPYING. If not, write to
|
|
||||||
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
||||||
* MA 02111-1307, USA.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef BIND_CONFIG_H_
|
|
||||||
#define BIND_CONFIG_H_
|
|
||||||
|
|
||||||
#include "libssh/server.h"
|
|
||||||
|
|
||||||
enum ssh_bind_config_opcode_e {
|
|
||||||
/* Known but not allowed in Match block */
|
|
||||||
BIND_CFG_NOT_ALLOWED_IN_MATCH = -4,
|
|
||||||
/* Unknown opcode */
|
|
||||||
BIND_CFG_UNKNOWN = -3,
|
|
||||||
/* Known and not applicable to libssh */
|
|
||||||
BIND_CFG_NA = -2,
|
|
||||||
/* Known but not supported by current libssh version */
|
|
||||||
BIND_CFG_UNSUPPORTED = -1,
|
|
||||||
BIND_CFG_INCLUDE,
|
|
||||||
BIND_CFG_HOSTKEY,
|
|
||||||
BIND_CFG_LISTENADDRESS,
|
|
||||||
BIND_CFG_PORT,
|
|
||||||
BIND_CFG_LOGLEVEL,
|
|
||||||
BIND_CFG_CIPHERS,
|
|
||||||
BIND_CFG_MACS,
|
|
||||||
BIND_CFG_KEXALGORITHMS,
|
|
||||||
BIND_CFG_MATCH,
|
|
||||||
BIND_CFG_PUBKEY_ACCEPTED_KEY_TYPES,
|
|
||||||
BIND_CFG_HOSTKEY_ALGORITHMS,
|
|
||||||
|
|
||||||
BIND_CFG_MAX /* Keep this one last in the list */
|
|
||||||
};
|
|
||||||
|
|
||||||
/* @brief Parse configuration file and set the options to the given ssh_bind
|
|
||||||
*
|
|
||||||
* @params[in] sshbind The ssh_bind context to be configured
|
|
||||||
* @params[in] filename The path to the configuration file
|
|
||||||
*
|
|
||||||
* @returns 0 on successful parsing the configuration file, -1 on error
|
|
||||||
*/
|
|
||||||
int ssh_bind_config_parse_file(ssh_bind sshbind, const char *filename);
|
|
||||||
|
|
||||||
/* @brief Parse configuration string and set the options to the given bind session
|
|
||||||
*
|
|
||||||
* @params[in] bind The ssh bind session
|
|
||||||
* @params[in] input Null terminated string containing the configuration
|
|
||||||
*
|
|
||||||
* @returns SSH_OK on successful parsing the configuration string,
|
|
||||||
* SSH_ERROR on error
|
|
||||||
*/
|
|
||||||
int ssh_bind_config_parse_string(ssh_bind bind, const char *input);
|
|
||||||
|
|
||||||
#endif /* BIND_CONFIG_H_ */
|
|
||||||
@@ -50,11 +50,11 @@ int _ssh_buffer_pack(struct ssh_buffer_struct *buffer,
|
|||||||
_ssh_buffer_pack((buffer), (format), __VA_NARG__(__VA_ARGS__), __VA_ARGS__, SSH_BUFFER_PACK_END)
|
_ssh_buffer_pack((buffer), (format), __VA_NARG__(__VA_ARGS__), __VA_ARGS__, SSH_BUFFER_PACK_END)
|
||||||
|
|
||||||
int ssh_buffer_unpack_va(struct ssh_buffer_struct *buffer,
|
int ssh_buffer_unpack_va(struct ssh_buffer_struct *buffer,
|
||||||
const char *format, size_t argc,
|
const char *format, int argc,
|
||||||
va_list ap);
|
va_list ap);
|
||||||
int _ssh_buffer_unpack(struct ssh_buffer_struct *buffer,
|
int _ssh_buffer_unpack(struct ssh_buffer_struct *buffer,
|
||||||
const char *format,
|
const char *format,
|
||||||
size_t argc,
|
int argc,
|
||||||
...);
|
...);
|
||||||
#define ssh_buffer_unpack(buffer, format, ...) \
|
#define ssh_buffer_unpack(buffer, format, ...) \
|
||||||
_ssh_buffer_unpack((buffer), (format), __VA_NARG__(__VA_ARGS__), __VA_ARGS__, SSH_BUFFER_PACK_END)
|
_ssh_buffer_unpack((buffer), (format), __VA_NARG__(__VA_ARGS__), __VA_ARGS__, SSH_BUFFER_PACK_END)
|
||||||
@@ -63,9 +63,9 @@ int ssh_buffer_prepend_data(ssh_buffer buffer, const void *data, uint32_t len);
|
|||||||
int ssh_buffer_add_buffer(ssh_buffer buffer, ssh_buffer source);
|
int ssh_buffer_add_buffer(ssh_buffer buffer, ssh_buffer source);
|
||||||
|
|
||||||
/* buffer_read_*() returns the number of bytes read, except for ssh strings */
|
/* buffer_read_*() returns the number of bytes read, except for ssh strings */
|
||||||
uint32_t ssh_buffer_get_u8(ssh_buffer buffer, uint8_t *data);
|
int ssh_buffer_get_u8(ssh_buffer buffer, uint8_t *data);
|
||||||
uint32_t ssh_buffer_get_u32(ssh_buffer buffer, uint32_t *data);
|
int ssh_buffer_get_u32(ssh_buffer buffer, uint32_t *data);
|
||||||
uint32_t ssh_buffer_get_u64(ssh_buffer buffer, uint64_t *data);
|
int ssh_buffer_get_u64(ssh_buffer buffer, uint64_t *data);
|
||||||
|
|
||||||
/* ssh_buffer_get_ssh_string() is an exception. if the String read is too large or invalid, it will answer NULL. */
|
/* ssh_buffer_get_ssh_string() is an exception. if the String read is too large or invalid, it will answer NULL. */
|
||||||
ssh_string ssh_buffer_get_ssh_string(ssh_buffer buffer);
|
ssh_string ssh_buffer_get_ssh_string(ssh_buffer buffer);
|
||||||
|
|||||||
@@ -56,7 +56,7 @@ typedef void (*ssh_callback_int) (int code, void *user);
|
|||||||
* @returns number of bytes processed by the callee. The remaining bytes will
|
* @returns number of bytes processed by the callee. The remaining bytes will
|
||||||
* be sent in the next callback message, when more data is available.
|
* be sent in the next callback message, when more data is available.
|
||||||
*/
|
*/
|
||||||
typedef size_t (*ssh_callback_data) (const void *data, size_t len, void *user);
|
typedef int (*ssh_callback_data) (const void *data, size_t len, void *user);
|
||||||
|
|
||||||
typedef void (*ssh_callback_int_int) (int code, int errno_code, void *user);
|
typedef void (*ssh_callback_int_int) (int code, int errno_code, void *user);
|
||||||
|
|
||||||
@@ -221,8 +221,8 @@ typedef int (*ssh_auth_gssapi_mic_callback) (ssh_session session, const char *us
|
|||||||
* @param user User that wants to authenticate
|
* @param user User that wants to authenticate
|
||||||
* @param pubkey public key used for authentication
|
* @param pubkey public key used for authentication
|
||||||
* @param signature_state SSH_PUBLICKEY_STATE_NONE if the key is not signed (simple public key probe),
|
* @param signature_state SSH_PUBLICKEY_STATE_NONE if the key is not signed (simple public key probe),
|
||||||
* SSH_PUBLICKEY_STATE_VALID if the signature is valid. Others values should be
|
* SSH_PUBLICKEY_STATE_VALID if the signature is valid. Others values should be
|
||||||
* replied with a SSH_AUTH_DENIED.
|
* replied with a SSH_AUTH_DENIED.
|
||||||
* @param userdata Userdata to be passed to the callback function.
|
* @param userdata Userdata to be passed to the callback function.
|
||||||
* @returns SSH_AUTH_SUCCESS Authentication is accepted.
|
* @returns SSH_AUTH_SUCCESS Authentication is accepted.
|
||||||
* @returns SSH_AUTH_PARTIAL Partial authentication, more authentication means are needed.
|
* @returns SSH_AUTH_PARTIAL Partial authentication, more authentication means are needed.
|
||||||
@@ -272,7 +272,7 @@ typedef ssh_string (*ssh_gssapi_select_oid_callback) (ssh_session session, const
|
|||||||
* @param session current session handler
|
* @param session current session handler
|
||||||
* @param[in] input_token input token provided by client
|
* @param[in] input_token input token provided by client
|
||||||
* @param[out] output_token output of the gssapi accept_sec_context method,
|
* @param[out] output_token output of the gssapi accept_sec_context method,
|
||||||
* NULL after completion.
|
* NULL after completion.
|
||||||
* @returns SSH_OK if the token was generated correctly or accept_sec_context
|
* @returns SSH_OK if the token was generated correctly or accept_sec_context
|
||||||
* returned GSS_S_COMPLETE
|
* returned GSS_S_COMPLETE
|
||||||
* @returns SSH_ERROR in case of error
|
* @returns SSH_ERROR in case of error
|
||||||
@@ -354,9 +354,6 @@ typedef struct ssh_server_callbacks_struct *ssh_server_callbacks;
|
|||||||
* This functions sets the callback structure to use your own callback
|
* This functions sets the callback structure to use your own callback
|
||||||
* functions for user authentication, new channels and requests.
|
* functions for user authentication, new channels and requests.
|
||||||
*
|
*
|
||||||
* Note, that the structure is not copied to the session structure so it needs
|
|
||||||
* to be valid for the whole session lifetime.
|
|
||||||
*
|
|
||||||
* @code
|
* @code
|
||||||
* struct ssh_server_callbacks_struct cb = {
|
* struct ssh_server_callbacks_struct cb = {
|
||||||
* .userdata = data,
|
* .userdata = data,
|
||||||
@@ -551,9 +548,6 @@ typedef struct ssh_packet_callbacks_struct *ssh_packet_callbacks;
|
|||||||
* This functions sets the callback structure to use your own callback
|
* This functions sets the callback structure to use your own callback
|
||||||
* functions for auth, logging and status.
|
* functions for auth, logging and status.
|
||||||
*
|
*
|
||||||
* Note, that the callback structure is not copied into the session so it needs
|
|
||||||
* to be valid for the whole session lifetime.
|
|
||||||
*
|
|
||||||
* @code
|
* @code
|
||||||
* struct ssh_callbacks_struct cb = {
|
* struct ssh_callbacks_struct cb = {
|
||||||
* .userdata = data,
|
* .userdata = data,
|
||||||
@@ -777,7 +771,7 @@ typedef int (*ssh_channel_subsystem_request_callback) (ssh_session session,
|
|||||||
*/
|
*/
|
||||||
typedef int (*ssh_channel_write_wontblock_callback) (ssh_session session,
|
typedef int (*ssh_channel_write_wontblock_callback) (ssh_session session,
|
||||||
ssh_channel channel,
|
ssh_channel channel,
|
||||||
uint32_t bytes,
|
size_t bytes,
|
||||||
void *userdata);
|
void *userdata);
|
||||||
|
|
||||||
struct ssh_channel_callbacks_struct {
|
struct ssh_channel_callbacks_struct {
|
||||||
@@ -855,16 +849,12 @@ typedef struct ssh_channel_callbacks_struct *ssh_channel_callbacks;
|
|||||||
* @brief Set the channel callback functions.
|
* @brief Set the channel callback functions.
|
||||||
*
|
*
|
||||||
* This functions sets the callback structure to use your own callback
|
* This functions sets the callback structure to use your own callback
|
||||||
* functions for channel data and exceptions.
|
* functions for channel data and exceptions
|
||||||
*
|
|
||||||
* Note, that the structure is not copied to the channel structure so it needs
|
|
||||||
* to be valid as for the whole life of the channel or until it is removed with
|
|
||||||
* ssh_remove_channel_callbacks().
|
|
||||||
*
|
*
|
||||||
* @code
|
* @code
|
||||||
* struct ssh_channel_callbacks_struct cb = {
|
* struct ssh_channel_callbacks_struct cb = {
|
||||||
* .userdata = data,
|
* .userdata = data,
|
||||||
* .channel_data_function = my_channel_data_function
|
* .channel_data = my_channel_data_function
|
||||||
* };
|
* };
|
||||||
* ssh_callbacks_init(&cb);
|
* ssh_callbacks_init(&cb);
|
||||||
* ssh_set_channel_callbacks(channel, &cb);
|
* ssh_set_channel_callbacks(channel, &cb);
|
||||||
@@ -954,20 +944,9 @@ LIBSSH_API int ssh_threads_set_callbacks(struct ssh_threads_callbacks_struct
|
|||||||
*cb);
|
*cb);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Returns a pointer to the appropriate callbacks structure for the
|
* @brief returns a pointer on the pthread threads callbacks, to be used with
|
||||||
* environment, to be used with ssh_threads_set_callbacks.
|
|
||||||
*
|
|
||||||
* @returns A pointer to a ssh_threads_callbacks_struct to be used with
|
|
||||||
* ssh_threads_set_callbacks.
|
* ssh_threads_set_callbacks.
|
||||||
*
|
* @warning you have to link with the library ssh_threads.
|
||||||
* @see ssh_threads_set_callbacks
|
|
||||||
*/
|
|
||||||
LIBSSH_API struct ssh_threads_callbacks_struct *ssh_threads_get_default(void);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief Returns a pointer on the pthread threads callbacks, to be used with
|
|
||||||
* ssh_threads_set_callbacks.
|
|
||||||
*
|
|
||||||
* @see ssh_threads_set_callbacks
|
* @see ssh_threads_set_callbacks
|
||||||
*/
|
*/
|
||||||
LIBSSH_API struct ssh_threads_callbacks_struct *ssh_threads_get_pthread(void);
|
LIBSSH_API struct ssh_threads_callbacks_struct *ssh_threads_get_pthread(void);
|
||||||
|
|||||||
@@ -17,6 +17,7 @@ struct chacha_ctx {
|
|||||||
#define CHACHA_NONCELEN 8
|
#define CHACHA_NONCELEN 8
|
||||||
#define CHACHA_CTRLEN 8
|
#define CHACHA_CTRLEN 8
|
||||||
#define CHACHA_STATELEN (CHACHA_NONCELEN+CHACHA_CTRLEN)
|
#define CHACHA_STATELEN (CHACHA_NONCELEN+CHACHA_CTRLEN)
|
||||||
|
#define CHACHA_BLOCKLEN 64
|
||||||
|
|
||||||
void chacha_keysetup(struct chacha_ctx *x, const uint8_t *k, uint32_t kbits)
|
void chacha_keysetup(struct chacha_ctx *x, const uint8_t *k, uint32_t kbits)
|
||||||
#ifdef HAVE_GCC_BOUNDED_ATTRIBUTE
|
#ifdef HAVE_GCC_BOUNDED_ATTRIBUTE
|
||||||
|
|||||||
@@ -1,54 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2020 Red Hat, Inc.
|
|
||||||
*
|
|
||||||
* Author: Jakub Jelen <jjelen@redhat.com>
|
|
||||||
*
|
|
||||||
* This library is free software; you can redistribute it and/or
|
|
||||||
* modify it under the terms of the GNU Lesser General Public
|
|
||||||
* License as published by the Free Software Foundation; either
|
|
||||||
* version 2.1 of the License, or (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This library is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
* Lesser General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public
|
|
||||||
* License along with this library; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
||||||
*/
|
|
||||||
|
|
||||||
/*
|
|
||||||
* chacha20-poly1305.h file
|
|
||||||
* This file includes definitions needed for Chacha20-poly1305 AEAD cipher
|
|
||||||
* using different crypto backends.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef CHACHA20_POLY1305_H
|
|
||||||
#define CHACHA20_POLY1305_H
|
|
||||||
|
|
||||||
#define CHACHA20_BLOCKSIZE 64
|
|
||||||
#define CHACHA20_KEYLEN 32
|
|
||||||
|
|
||||||
#define POLY1305_TAGLEN 16
|
|
||||||
/* size of the keys k1 and k2 as defined in specs */
|
|
||||||
#define POLY1305_KEYLEN 32
|
|
||||||
|
|
||||||
#ifdef _MSC_VER
|
|
||||||
#pragma pack(push, 1)
|
|
||||||
#endif
|
|
||||||
struct ssh_packet_header {
|
|
||||||
uint32_t length;
|
|
||||||
uint8_t payload[];
|
|
||||||
}
|
|
||||||
#if defined(__GNUC__)
|
|
||||||
__attribute__ ((packed))
|
|
||||||
#endif
|
|
||||||
#ifdef _MSC_VER
|
|
||||||
#pragma pack(pop)
|
|
||||||
#endif
|
|
||||||
;
|
|
||||||
|
|
||||||
#endif /* CHACHA20_POLY1305_H */
|
|
||||||
@@ -48,16 +48,11 @@ enum ssh_channel_state_e {
|
|||||||
};
|
};
|
||||||
|
|
||||||
/* The channel has been closed by the remote side */
|
/* The channel has been closed by the remote side */
|
||||||
#define SSH_CHANNEL_FLAG_CLOSED_REMOTE 0x0001
|
#define SSH_CHANNEL_FLAG_CLOSED_REMOTE 0x1
|
||||||
|
|
||||||
/* The channel has been closed locally */
|
|
||||||
#define SSH_CHANNEL_FLAG_CLOSED_LOCAL 0x0002
|
|
||||||
|
|
||||||
/* The channel has been freed by the calling program */
|
/* The channel has been freed by the calling program */
|
||||||
#define SSH_CHANNEL_FLAG_FREED_LOCAL 0x0004
|
#define SSH_CHANNEL_FLAG_FREED_LOCAL 0x2
|
||||||
|
|
||||||
/* the channel has not yet been bound to a remote one */
|
/* the channel has not yet been bound to a remote one */
|
||||||
#define SSH_CHANNEL_FLAG_NOT_BOUND 0x0008
|
#define SSH_CHANNEL_FLAG_NOT_BOUND 0x4
|
||||||
|
|
||||||
struct ssh_channel_struct {
|
struct ssh_channel_struct {
|
||||||
ssh_session session; /* SSH_SESSION pointer */
|
ssh_session session; /* SSH_SESSION pointer */
|
||||||
@@ -97,9 +92,8 @@ SSH_PACKET_CALLBACK(channel_rcv_close);
|
|||||||
SSH_PACKET_CALLBACK(channel_rcv_request);
|
SSH_PACKET_CALLBACK(channel_rcv_request);
|
||||||
SSH_PACKET_CALLBACK(channel_rcv_data);
|
SSH_PACKET_CALLBACK(channel_rcv_data);
|
||||||
|
|
||||||
int channel_default_bufferize(ssh_channel channel,
|
int channel_default_bufferize(ssh_channel channel, void *data, int len,
|
||||||
void *data, uint32_t len,
|
int is_stderr);
|
||||||
bool is_stderr);
|
|
||||||
int ssh_channel_flush(ssh_channel channel);
|
int ssh_channel_flush(ssh_channel channel);
|
||||||
uint32_t ssh_channel_new_id(ssh_session session);
|
uint32_t ssh_channel_new_id(ssh_session session);
|
||||||
ssh_channel ssh_channel_from_local(ssh_session session, uint32_t id);
|
ssh_channel ssh_channel_from_local(ssh_session session, uint32_t id);
|
||||||
|
|||||||
@@ -42,10 +42,10 @@ enum ssh_config_opcode_e {
|
|||||||
SOC_MACS,
|
SOC_MACS,
|
||||||
SOC_COMPRESSION,
|
SOC_COMPRESSION,
|
||||||
SOC_TIMEOUT,
|
SOC_TIMEOUT,
|
||||||
|
SOC_PROTOCOL,
|
||||||
SOC_STRICTHOSTKEYCHECK,
|
SOC_STRICTHOSTKEYCHECK,
|
||||||
SOC_KNOWNHOSTS,
|
SOC_KNOWNHOSTS,
|
||||||
SOC_PROXYCOMMAND,
|
SOC_PROXYCOMMAND,
|
||||||
SOC_PROXYJUMP,
|
|
||||||
SOC_GSSAPISERVERIDENTITY,
|
SOC_GSSAPISERVERIDENTITY,
|
||||||
SOC_GSSAPICLIENTIDENTITY,
|
SOC_GSSAPICLIENTIDENTITY,
|
||||||
SOC_GSSAPIDELEGATECREDENTIALS,
|
SOC_GSSAPIDELEGATECREDENTIALS,
|
||||||
@@ -59,9 +59,7 @@ enum ssh_config_opcode_e {
|
|||||||
SOC_KBDINTERACTIVEAUTHENTICATION,
|
SOC_KBDINTERACTIVEAUTHENTICATION,
|
||||||
SOC_PASSWORDAUTHENTICATION,
|
SOC_PASSWORDAUTHENTICATION,
|
||||||
SOC_PUBKEYAUTHENTICATION,
|
SOC_PUBKEYAUTHENTICATION,
|
||||||
SOC_PUBKEYACCEPTEDKEYTYPES,
|
SOC_PUBKEYACCEPTEDTYPES,
|
||||||
SOC_REKEYLIMIT,
|
|
||||||
SOC_IDENTITYAGENT,
|
|
||||||
|
|
||||||
SOC_MAX /* Keep this one last in the list */
|
SOC_MAX /* Keep this one last in the list */
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,57 +0,0 @@
|
|||||||
/*
|
|
||||||
* config_parser.h - Common configuration file parser functions
|
|
||||||
*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2019 by Red Hat, Inc.
|
|
||||||
*
|
|
||||||
* Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
|
|
||||||
*
|
|
||||||
* The SSH Library is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU Lesser General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
||||||
* option) any later version.
|
|
||||||
*
|
|
||||||
* The SSH Library is distributed in the hope that it will be useful, but
|
|
||||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
||||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
||||||
* License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public License
|
|
||||||
* along with the SSH Library; see the file COPYING. If not, write to
|
|
||||||
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
||||||
* MA 02111-1307, USA.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef CONFIG_PARSER_H_
|
|
||||||
#define CONFIG_PARSER_H_
|
|
||||||
|
|
||||||
char *ssh_config_get_cmd(char **str);
|
|
||||||
|
|
||||||
char *ssh_config_get_token(char **str);
|
|
||||||
|
|
||||||
long ssh_config_get_long(char **str, long notfound);
|
|
||||||
|
|
||||||
const char *ssh_config_get_str_tok(char **str, const char *def);
|
|
||||||
|
|
||||||
int ssh_config_get_yesno(char **str, int notfound);
|
|
||||||
|
|
||||||
/* @brief Parse SSH URI in format [user@]host[:port] from the given string
|
|
||||||
*
|
|
||||||
* @param[in] tok String to parse
|
|
||||||
* @param[out] username Pointer to the location, where the new username will
|
|
||||||
* be stored or NULL if we do not care about the result.
|
|
||||||
* @param[out] hostname Pointer to the location, where the new hostname will
|
|
||||||
* be stored or NULL if we do not care about the result.
|
|
||||||
* @param[out] port Pointer to the location, where the new port will
|
|
||||||
* be stored or NULL if we do not care about the result.
|
|
||||||
*
|
|
||||||
* @returns SSH_OK if the provided string is in format of SSH URI,
|
|
||||||
* SSH_ERROR on failure
|
|
||||||
*/
|
|
||||||
int ssh_config_parse_uri(const char *tok,
|
|
||||||
char **username,
|
|
||||||
char **hostname,
|
|
||||||
char **port);
|
|
||||||
|
|
||||||
#endif /* LIBSSH_CONFIG_H_ */
|
|
||||||
@@ -25,7 +25,6 @@
|
|||||||
#ifndef _CRYPTO_H_
|
#ifndef _CRYPTO_H_
|
||||||
#define _CRYPTO_H_
|
#define _CRYPTO_H_
|
||||||
|
|
||||||
#include <stdbool.h>
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
|
|
||||||
#ifdef HAVE_LIBGCRYPT
|
#ifdef HAVE_LIBGCRYPT
|
||||||
@@ -45,7 +44,6 @@
|
|||||||
#ifdef HAVE_OPENSSL_ECDH_H
|
#ifdef HAVE_OPENSSL_ECDH_H
|
||||||
#include <openssl/ecdh.h>
|
#include <openssl/ecdh.h>
|
||||||
#endif
|
#endif
|
||||||
#include "libssh/dh.h"
|
|
||||||
#include "libssh/ecdh.h"
|
#include "libssh/ecdh.h"
|
||||||
#include "libssh/kex.h"
|
#include "libssh/kex.h"
|
||||||
#include "libssh/curve25519.h"
|
#include "libssh/curve25519.h"
|
||||||
@@ -60,12 +58,6 @@ enum ssh_key_exchange_e {
|
|||||||
SSH_KEX_DH_GROUP1_SHA1=1,
|
SSH_KEX_DH_GROUP1_SHA1=1,
|
||||||
/* diffie-hellman-group14-sha1 */
|
/* diffie-hellman-group14-sha1 */
|
||||||
SSH_KEX_DH_GROUP14_SHA1,
|
SSH_KEX_DH_GROUP14_SHA1,
|
||||||
#ifdef WITH_GEX
|
|
||||||
/* diffie-hellman-group-exchange-sha1 */
|
|
||||||
SSH_KEX_DH_GEX_SHA1,
|
|
||||||
/* diffie-hellman-group-exchange-sha256 */
|
|
||||||
SSH_KEX_DH_GEX_SHA256,
|
|
||||||
#endif /* WITH_GEX */
|
|
||||||
/* ecdh-sha2-nistp256 */
|
/* ecdh-sha2-nistp256 */
|
||||||
SSH_KEX_ECDH_SHA2_NISTP256,
|
SSH_KEX_ECDH_SHA2_NISTP256,
|
||||||
/* ecdh-sha2-nistp384 */
|
/* ecdh-sha2-nistp384 */
|
||||||
@@ -80,15 +72,11 @@ enum ssh_key_exchange_e {
|
|||||||
SSH_KEX_DH_GROUP16_SHA512,
|
SSH_KEX_DH_GROUP16_SHA512,
|
||||||
/* diffie-hellman-group18-sha512 */
|
/* diffie-hellman-group18-sha512 */
|
||||||
SSH_KEX_DH_GROUP18_SHA512,
|
SSH_KEX_DH_GROUP18_SHA512,
|
||||||
/* diffie-hellman-group14-sha256 */
|
|
||||||
SSH_KEX_DH_GROUP14_SHA256,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ssh_cipher_e {
|
enum ssh_cipher_e {
|
||||||
SSH_NO_CIPHER=0,
|
SSH_NO_CIPHER=0,
|
||||||
#ifdef WITH_BLOWFISH_CIPHER
|
|
||||||
SSH_BLOWFISH_CBC,
|
SSH_BLOWFISH_CBC,
|
||||||
#endif /* WITH_BLOWFISH_CIPHER */
|
|
||||||
SSH_3DES_CBC,
|
SSH_3DES_CBC,
|
||||||
SSH_AES128_CBC,
|
SSH_AES128_CBC,
|
||||||
SSH_AES192_CBC,
|
SSH_AES192_CBC,
|
||||||
@@ -101,25 +89,11 @@ enum ssh_cipher_e {
|
|||||||
SSH_AEAD_CHACHA20_POLY1305
|
SSH_AEAD_CHACHA20_POLY1305
|
||||||
};
|
};
|
||||||
|
|
||||||
struct dh_ctx;
|
|
||||||
|
|
||||||
struct ssh_crypto_struct {
|
struct ssh_crypto_struct {
|
||||||
bignum shared_secret;
|
bignum e,f,x,k,y;
|
||||||
struct dh_ctx *dh_ctx;
|
|
||||||
#ifdef WITH_GEX
|
|
||||||
size_t dh_pmin; size_t dh_pn; size_t dh_pmax; /* preferred group parameters */
|
|
||||||
#endif /* WITH_GEX */
|
|
||||||
#ifdef HAVE_ECDH
|
#ifdef HAVE_ECDH
|
||||||
#ifdef HAVE_OPENSSL_ECC
|
#ifdef HAVE_OPENSSL_ECC
|
||||||
/* TODO Change to new API when the OpenSSL will support export of uncompressed EC keys
|
|
||||||
* https://github.com/openssl/openssl/pull/16624
|
|
||||||
* #if OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
*/
|
|
||||||
#if 1
|
|
||||||
EC_KEY *ecdh_privkey;
|
EC_KEY *ecdh_privkey;
|
||||||
#else
|
|
||||||
EVP_PKEY *ecdh_privkey;
|
|
||||||
#endif /* OPENSSL_VERSION_NUMBER */
|
|
||||||
#elif defined HAVE_GCRYPT_ECC
|
#elif defined HAVE_GCRYPT_ECC
|
||||||
gcry_sexp_t ecdh_privkey;
|
gcry_sexp_t ecdh_privkey;
|
||||||
#elif defined HAVE_LIBMBEDCRYPTO
|
#elif defined HAVE_LIBMBEDCRYPTO
|
||||||
@@ -134,9 +108,8 @@ struct ssh_crypto_struct {
|
|||||||
ssh_curve25519_pubkey curve25519_server_pubkey;
|
ssh_curve25519_pubkey curve25519_server_pubkey;
|
||||||
#endif
|
#endif
|
||||||
ssh_string dh_server_signature; /* information used by dh_handshake. */
|
ssh_string dh_server_signature; /* information used by dh_handshake. */
|
||||||
size_t session_id_len;
|
size_t digest_len; /* len of all the fields below */
|
||||||
unsigned char *session_id;
|
unsigned char *session_id;
|
||||||
size_t digest_len; /* len of the secret hash */
|
|
||||||
unsigned char *secret_hash; /* Secret hash is same as session id until re-kex */
|
unsigned char *secret_hash; /* Secret hash is same as session id until re-kex */
|
||||||
unsigned char *encryptIV;
|
unsigned char *encryptIV;
|
||||||
unsigned char *decryptIV;
|
unsigned char *decryptIV;
|
||||||
@@ -147,7 +120,6 @@ struct ssh_crypto_struct {
|
|||||||
unsigned char hmacbuf[DIGEST_MAX_LEN];
|
unsigned char hmacbuf[DIGEST_MAX_LEN];
|
||||||
struct ssh_cipher_struct *in_cipher, *out_cipher; /* the cipher structures/objects */
|
struct ssh_cipher_struct *in_cipher, *out_cipher; /* the cipher structures/objects */
|
||||||
enum ssh_hmac_e in_hmac, out_hmac; /* the MAC algorithms used */
|
enum ssh_hmac_e in_hmac, out_hmac; /* the MAC algorithms used */
|
||||||
bool in_hmac_etm, out_hmac_etm; /* Whether EtM mode is used or not */
|
|
||||||
|
|
||||||
ssh_key server_pubkey;
|
ssh_key server_pubkey;
|
||||||
int do_compress_out; /* idem */
|
int do_compress_out; /* idem */
|
||||||
@@ -161,8 +133,7 @@ struct ssh_crypto_struct {
|
|||||||
struct ssh_kex_struct client_kex;
|
struct ssh_kex_struct client_kex;
|
||||||
char *kex_methods[SSH_KEX_METHODS];
|
char *kex_methods[SSH_KEX_METHODS];
|
||||||
enum ssh_key_exchange_e kex_type;
|
enum ssh_key_exchange_e kex_type;
|
||||||
enum ssh_kdf_digest digest_type; /* Digest type for session keys derivation */
|
enum ssh_mac_e mac_type; /* Mac operations to use for key gen */
|
||||||
enum ssh_crypto_direction_e used; /* Is this crypto still used for either of directions? */
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct ssh_cipher_struct {
|
struct ssh_cipher_struct {
|
||||||
@@ -191,11 +162,6 @@ struct ssh_cipher_struct {
|
|||||||
struct chacha20_poly1305_keysched *chacha20_schedule;
|
struct chacha20_poly1305_keysched *chacha20_schedule;
|
||||||
unsigned int keysize; /* bytes of key used. != keylen */
|
unsigned int keysize; /* bytes of key used. != keylen */
|
||||||
size_t tag_size; /* overhead required for tag */
|
size_t tag_size; /* overhead required for tag */
|
||||||
/* Counters for rekeying initialization */
|
|
||||||
uint32_t packets;
|
|
||||||
uint64_t blocks;
|
|
||||||
/* Rekeying limit for the cipher or manually enforced */
|
|
||||||
uint64_t max_blocks;
|
|
||||||
/* sets the new key for immediate use */
|
/* sets the new key for immediate use */
|
||||||
int (*set_encrypt_key)(struct ssh_cipher_struct *cipher, void *key, void *IV);
|
int (*set_encrypt_key)(struct ssh_cipher_struct *cipher, void *key, void *IV);
|
||||||
int (*set_decrypt_key)(struct ssh_cipher_struct *cipher, void *key, void *IV);
|
int (*set_decrypt_key)(struct ssh_cipher_struct *cipher, void *key, void *IV);
|
||||||
@@ -217,14 +183,5 @@ struct ssh_cipher_struct {
|
|||||||
};
|
};
|
||||||
|
|
||||||
const struct ssh_cipher_struct *ssh_get_chacha20poly1305_cipher(void);
|
const struct ssh_cipher_struct *ssh_get_chacha20poly1305_cipher(void);
|
||||||
int sshkdf_derive_key(struct ssh_crypto_struct *crypto,
|
|
||||||
unsigned char *key, size_t key_len,
|
|
||||||
int key_type, unsigned char *output,
|
|
||||||
size_t requested_len);
|
|
||||||
|
|
||||||
int secure_memcmp(const void *s1, const void *s2, size_t n);
|
|
||||||
#ifdef HAVE_LIBCRYPTO
|
|
||||||
ENGINE *pki_get_engine(void);
|
|
||||||
#endif /* HAVE_LIBCRYPTO */
|
|
||||||
|
|
||||||
#endif /* _CRYPTO_H_ */
|
#endif /* _CRYPTO_H_ */
|
||||||
|
|||||||
@@ -48,9 +48,10 @@ typedef unsigned char ssh_curve25519_privkey[CURVE25519_PRIVKEY_SIZE];
|
|||||||
|
|
||||||
|
|
||||||
int ssh_client_curve25519_init(ssh_session session);
|
int ssh_client_curve25519_init(ssh_session session);
|
||||||
|
int ssh_client_curve25519_reply(ssh_session session, ssh_buffer packet);
|
||||||
|
|
||||||
#ifdef WITH_SERVER
|
#ifdef WITH_SERVER
|
||||||
void ssh_server_curve25519_init(ssh_session session);
|
int ssh_server_curve25519_init(ssh_session session, ssh_buffer packet);
|
||||||
#endif /* WITH_SERVER */
|
#endif /* WITH_SERVER */
|
||||||
|
|
||||||
#endif /* CURVE25519_H_ */
|
#endif /* CURVE25519_H_ */
|
||||||
|
|||||||
@@ -1,32 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2016 by Aris Adamantiadis <aris@0xbadc0de.be>
|
|
||||||
*
|
|
||||||
* The SSH Library is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU Lesser General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
||||||
* option) any later version.
|
|
||||||
*
|
|
||||||
* The SSH Library is distributed in the hope that it will be useful, but
|
|
||||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
||||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
||||||
* License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public License
|
|
||||||
* along with the SSH Library; see the file COPYING. If not, write to
|
|
||||||
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
||||||
* MA 02111-1307, USA.
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
#ifndef SRC_DH_GEX_H_
|
|
||||||
#define SRC_DH_GEX_H_
|
|
||||||
|
|
||||||
int ssh_client_dhgex_init(ssh_session session);
|
|
||||||
|
|
||||||
#ifdef WITH_SERVER
|
|
||||||
void ssh_server_dhgex_init(ssh_session session);
|
|
||||||
#endif /* WITH_SERVER */
|
|
||||||
|
|
||||||
#endif /* SRC_DH_GEX_H_ */
|
|
||||||
@@ -25,47 +25,25 @@
|
|||||||
|
|
||||||
#include "libssh/crypto.h"
|
#include "libssh/crypto.h"
|
||||||
|
|
||||||
struct dh_ctx;
|
int ssh_dh_generate_e(ssh_session session);
|
||||||
|
int ssh_dh_generate_f(ssh_session session);
|
||||||
|
int ssh_dh_generate_x(ssh_session session);
|
||||||
|
int ssh_dh_generate_y(ssh_session session);
|
||||||
|
|
||||||
#define DH_CLIENT_KEYPAIR 0
|
|
||||||
#define DH_SERVER_KEYPAIR 1
|
|
||||||
|
|
||||||
/* functions implemented by crypto backends */
|
|
||||||
int ssh_dh_init_common(struct ssh_crypto_struct *crypto);
|
|
||||||
void ssh_dh_cleanup(struct ssh_crypto_struct *crypto);
|
|
||||||
|
|
||||||
#if !defined(HAVE_LIBCRYPTO) || OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
int ssh_dh_get_parameters(struct dh_ctx *ctx,
|
|
||||||
const_bignum *modulus, const_bignum *generator);
|
|
||||||
#else
|
|
||||||
int ssh_dh_get_parameters(struct dh_ctx *ctx,
|
|
||||||
bignum *modulus, bignum *generator);
|
|
||||||
#endif /* OPENSSL_VERSION_NUMBER */
|
|
||||||
int ssh_dh_set_parameters(struct dh_ctx *ctx,
|
|
||||||
const bignum modulus, const bignum generator);
|
|
||||||
|
|
||||||
int ssh_dh_keypair_gen_keys(struct dh_ctx *ctx, int peer);
|
|
||||||
#if !defined(HAVE_LIBCRYPTO) || OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
int ssh_dh_keypair_get_keys(struct dh_ctx *ctx, int peer,
|
|
||||||
const_bignum *priv, const_bignum *pub);
|
|
||||||
#else
|
|
||||||
int ssh_dh_keypair_get_keys(struct dh_ctx *ctx, int peer,
|
|
||||||
bignum *priv, bignum *pub);
|
|
||||||
#endif /* OPENSSL_VERSION_NUMBER */
|
|
||||||
int ssh_dh_keypair_set_keys(struct dh_ctx *ctx, int peer,
|
|
||||||
const bignum priv, const bignum pub);
|
|
||||||
|
|
||||||
int ssh_dh_compute_shared_secret(struct dh_ctx *ctx, int local, int remote,
|
|
||||||
bignum *dest);
|
|
||||||
|
|
||||||
void ssh_dh_debug_crypto(struct ssh_crypto_struct *c);
|
|
||||||
|
|
||||||
/* common functions */
|
|
||||||
int ssh_dh_init(void);
|
int ssh_dh_init(void);
|
||||||
void ssh_dh_finalize(void);
|
void ssh_dh_finalize(void);
|
||||||
|
|
||||||
int ssh_dh_import_next_pubkey_blob(ssh_session session,
|
ssh_string ssh_dh_get_e(ssh_session session);
|
||||||
ssh_string pubkey_blob);
|
ssh_string ssh_dh_get_f(ssh_session session);
|
||||||
|
int ssh_dh_import_f(ssh_session session,ssh_string f_string);
|
||||||
|
int ssh_dh_import_e(ssh_session session, ssh_string e_string);
|
||||||
|
|
||||||
|
int ssh_dh_import_pubkey_blob(ssh_session session, ssh_string pubkey_blob);
|
||||||
|
int ssh_dh_import_next_pubkey_blob(ssh_session session, ssh_string pubkey_blob);
|
||||||
|
|
||||||
|
int ssh_dh_build_k(ssh_session session);
|
||||||
|
int ssh_client_dh_init(ssh_session session);
|
||||||
|
int ssh_client_dh_reply(ssh_session session, ssh_buffer packet);
|
||||||
|
|
||||||
ssh_key ssh_dh_get_current_server_publickey(ssh_session session);
|
ssh_key ssh_dh_get_current_server_publickey(ssh_session session);
|
||||||
int ssh_dh_get_current_server_publickey_blob(ssh_session session,
|
int ssh_dh_get_current_server_publickey_blob(ssh_session session,
|
||||||
@@ -74,12 +52,10 @@ ssh_key ssh_dh_get_next_server_publickey(ssh_session session);
|
|||||||
int ssh_dh_get_next_server_publickey_blob(ssh_session session,
|
int ssh_dh_get_next_server_publickey_blob(ssh_session session,
|
||||||
ssh_string *pubkey_blob);
|
ssh_string *pubkey_blob);
|
||||||
|
|
||||||
int ssh_client_dh_init(ssh_session session);
|
int ssh_make_sessionid(ssh_session session);
|
||||||
#ifdef WITH_SERVER
|
/* add data for the final cookie */
|
||||||
void ssh_server_dh_init(ssh_session session);
|
int ssh_hashbufin_add_cookie(ssh_session session, unsigned char *cookie);
|
||||||
#endif /* WITH_SERVER */
|
int ssh_hashbufout_add_cookie(ssh_session session);
|
||||||
int ssh_server_dh_process_init(ssh_session session, ssh_buffer packet);
|
int ssh_generate_session_keys(ssh_session session);
|
||||||
int ssh_fallback_group(uint32_t pmax, bignum *p, bignum *g);
|
|
||||||
bool ssh_dh_is_known_group(bignum modulus, bignum generator);
|
|
||||||
|
|
||||||
#endif /* DH_H_ */
|
#endif /* DH_H_ */
|
||||||
|
|||||||
@@ -22,7 +22,6 @@
|
|||||||
#define ECDH_H_
|
#define ECDH_H_
|
||||||
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
#include "libssh/callbacks.h"
|
|
||||||
|
|
||||||
#ifdef HAVE_LIBCRYPTO
|
#ifdef HAVE_LIBCRYPTO
|
||||||
#ifdef HAVE_OPENSSL_ECDH_H
|
#ifdef HAVE_OPENSSL_ECDH_H
|
||||||
@@ -42,15 +41,15 @@
|
|||||||
#define HAVE_ECDH 1
|
#define HAVE_ECDH 1
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
extern struct ssh_packet_callbacks_struct ssh_ecdh_client_callbacks;
|
/* Common functions. */
|
||||||
|
int ssh_client_ecdh_reply(ssh_session session, ssh_buffer packet);
|
||||||
|
|
||||||
/* Backend-specific functions. */
|
/* Backend-specific functions. */
|
||||||
int ssh_client_ecdh_init(ssh_session session);
|
int ssh_client_ecdh_init(ssh_session session);
|
||||||
int ecdh_build_k(ssh_session session);
|
int ecdh_build_k(ssh_session session);
|
||||||
|
|
||||||
#ifdef WITH_SERVER
|
#ifdef WITH_SERVER
|
||||||
extern struct ssh_packet_callbacks_struct ssh_ecdh_server_callbacks;
|
int ssh_server_ecdh_init(ssh_session session, ssh_buffer packet);
|
||||||
void ssh_server_ecdh_init(ssh_session session);
|
|
||||||
SSH_PACKET_CALLBACK(ssh_packet_server_ecdh_init);
|
|
||||||
#endif /* WITH_SERVER */
|
#endif /* WITH_SERVER */
|
||||||
|
|
||||||
#endif /* ECDH_H_ */
|
#endif /* ECDH_H_ */
|
||||||
|
|||||||
@@ -56,8 +56,8 @@ int crypto_sign_ed25519_keypair(ed25519_pubkey pk, ed25519_privkey sk);
|
|||||||
* @return 0 on success.
|
* @return 0 on success.
|
||||||
*/
|
*/
|
||||||
int crypto_sign_ed25519(
|
int crypto_sign_ed25519(
|
||||||
unsigned char *sm, uint64_t *smlen,
|
unsigned char *sm,unsigned long long *smlen,
|
||||||
const unsigned char *m, uint64_t mlen,
|
const unsigned char *m,unsigned long long mlen,
|
||||||
const ed25519_privkey sk);
|
const ed25519_privkey sk);
|
||||||
|
|
||||||
/** @internal
|
/** @internal
|
||||||
@@ -71,8 +71,8 @@ int crypto_sign_ed25519(
|
|||||||
* @returns 0 on success (supposedly).
|
* @returns 0 on success (supposedly).
|
||||||
*/
|
*/
|
||||||
int crypto_sign_ed25519_open(
|
int crypto_sign_ed25519_open(
|
||||||
unsigned char *m, uint64_t *mlen,
|
unsigned char *m,unsigned long long *mlen,
|
||||||
const unsigned char *sm, uint64_t smlen,
|
const unsigned char *sm,unsigned long long smlen,
|
||||||
const ed25519_pubkey pk);
|
const ed25519_pubkey pk);
|
||||||
|
|
||||||
/** @} */
|
/** @} */
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ void fe25519_unpack(fe25519 *r, const unsigned char x[32]);
|
|||||||
|
|
||||||
void fe25519_pack(unsigned char r[32], const fe25519 *x);
|
void fe25519_pack(unsigned char r[32], const fe25519 *x);
|
||||||
|
|
||||||
uint32_t fe25519_iszero(const fe25519 *x);
|
int fe25519_iszero(const fe25519 *x);
|
||||||
|
|
||||||
int fe25519_iseq_vartime(const fe25519 *x, const fe25519 *y);
|
int fe25519_iseq_vartime(const fe25519 *x, const fe25519 *y);
|
||||||
|
|
||||||
|
|||||||
@@ -39,21 +39,12 @@ int ssh_set_client_kex(ssh_session session);
|
|||||||
int ssh_kex_select_methods(ssh_session session);
|
int ssh_kex_select_methods(ssh_session session);
|
||||||
int ssh_verify_existing_algo(enum ssh_kex_types_e algo, const char *name);
|
int ssh_verify_existing_algo(enum ssh_kex_types_e algo, const char *name);
|
||||||
char *ssh_keep_known_algos(enum ssh_kex_types_e algo, const char *list);
|
char *ssh_keep_known_algos(enum ssh_kex_types_e algo, const char *list);
|
||||||
char *ssh_keep_fips_algos(enum ssh_kex_types_e algo, const char *list);
|
|
||||||
char **ssh_space_tokenize(const char *chain);
|
char **ssh_space_tokenize(const char *chain);
|
||||||
int ssh_get_kex1(ssh_session session);
|
int ssh_get_kex1(ssh_session session);
|
||||||
char *ssh_find_matching(const char *in_d, const char *what_d);
|
char *ssh_find_matching(const char *in_d, const char *what_d);
|
||||||
const char *ssh_kex_get_supported_method(uint32_t algo);
|
const char *ssh_kex_get_supported_method(uint32_t algo);
|
||||||
const char *ssh_kex_get_default_methods(uint32_t algo);
|
const char *ssh_kex_get_default_methods(uint32_t algo);
|
||||||
const char *ssh_kex_get_fips_methods(uint32_t algo);
|
|
||||||
const char *ssh_kex_get_description(uint32_t algo);
|
const char *ssh_kex_get_description(uint32_t algo);
|
||||||
char *ssh_client_select_hostkeys(ssh_session session);
|
char *ssh_client_select_hostkeys(ssh_session session);
|
||||||
int ssh_send_rekex(ssh_session session);
|
|
||||||
int server_set_kex(ssh_session session);
|
|
||||||
int ssh_make_sessionid(ssh_session session);
|
|
||||||
/* add data for the final cookie */
|
|
||||||
int ssh_hashbufin_add_cookie(ssh_session session, unsigned char *cookie);
|
|
||||||
int ssh_hashbufout_add_cookie(ssh_session session);
|
|
||||||
int ssh_generate_session_keys(ssh_session session);
|
|
||||||
|
|
||||||
#endif /* KEX_H_ */
|
#endif /* KEX_H_ */
|
||||||
|
|||||||
@@ -28,17 +28,13 @@
|
|||||||
struct ssh_public_key_struct {
|
struct ssh_public_key_struct {
|
||||||
int type;
|
int type;
|
||||||
const char *type_c; /* Don't free it ! it is static */
|
const char *type_c; /* Don't free it ! it is static */
|
||||||
#if defined(HAVE_LIBGCRYPT)
|
#ifdef HAVE_LIBGCRYPT
|
||||||
gcry_sexp_t dsa_pub;
|
gcry_sexp_t dsa_pub;
|
||||||
gcry_sexp_t rsa_pub;
|
gcry_sexp_t rsa_pub;
|
||||||
#elif defined(HAVE_LIBCRYPTO)
|
#elif HAVE_LIBCRYPTO
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
DSA *dsa_pub;
|
DSA *dsa_pub;
|
||||||
RSA *rsa_pub;
|
RSA *rsa_pub;
|
||||||
#else /* OPENSSL_VERSION_NUMBER */
|
#elif HAVE_LIBMBEDCRYPTO
|
||||||
EVP_PKEY *key_pub;
|
|
||||||
#endif
|
|
||||||
#elif defined(HAVE_LIBMBEDCRYPTO)
|
|
||||||
mbedtls_pk_context *rsa_pub;
|
mbedtls_pk_context *rsa_pub;
|
||||||
void *dsa_pub;
|
void *dsa_pub;
|
||||||
#endif
|
#endif
|
||||||
@@ -46,17 +42,13 @@ struct ssh_public_key_struct {
|
|||||||
|
|
||||||
struct ssh_private_key_struct {
|
struct ssh_private_key_struct {
|
||||||
int type;
|
int type;
|
||||||
#if defined(HAVE_LIBGCRYPT)
|
#ifdef HAVE_LIBGCRYPT
|
||||||
gcry_sexp_t dsa_priv;
|
gcry_sexp_t dsa_priv;
|
||||||
gcry_sexp_t rsa_priv;
|
gcry_sexp_t rsa_priv;
|
||||||
#elif defined(HAVE_LIBCRYPTO)
|
#elif defined HAVE_LIBCRYPTO
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
DSA *dsa_priv;
|
DSA *dsa_priv;
|
||||||
RSA *rsa_priv;
|
RSA *rsa_priv;
|
||||||
#else
|
#elif HAVE_LIBMBEDCRYPTO
|
||||||
EVP_PKEY *key_priv;
|
|
||||||
#endif /* OPENSSL_VERSION_NUMBER */
|
|
||||||
#elif defined(HAVE_LIBMBEDCRYPTO)
|
|
||||||
mbedtls_pk_context *rsa_priv;
|
mbedtls_pk_context *rsa_priv;
|
||||||
void *dsa_priv;
|
void *dsa_priv;
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -23,7 +23,6 @@
|
|||||||
#define SSH_KNOWNHOSTS_H_
|
#define SSH_KNOWNHOSTS_H_
|
||||||
|
|
||||||
struct ssh_list *ssh_known_hosts_get_algorithms(ssh_session session);
|
struct ssh_list *ssh_known_hosts_get_algorithms(ssh_session session);
|
||||||
char *ssh_known_hosts_get_algorithms_names(ssh_session session);
|
|
||||||
enum ssh_known_hosts_e
|
enum ssh_known_hosts_e
|
||||||
ssh_session_get_known_hosts_entry_file(ssh_session session,
|
ssh_session_get_known_hosts_entry_file(ssh_session session,
|
||||||
const char *filename,
|
const char *filename,
|
||||||
|
|||||||
@@ -88,19 +88,19 @@ SSH_DEPRECATED LIBSSH_API int channel_select(ssh_channel *readchans, ssh_channel
|
|||||||
SSH_DEPRECATED LIBSSH_API void channel_set_blocking(ssh_channel channel, int blocking);
|
SSH_DEPRECATED LIBSSH_API void channel_set_blocking(ssh_channel channel, int blocking);
|
||||||
SSH_DEPRECATED LIBSSH_API int channel_write(ssh_channel channel, const void *data, uint32_t len);
|
SSH_DEPRECATED LIBSSH_API int channel_write(ssh_channel channel, const void *data, uint32_t len);
|
||||||
|
|
||||||
SSH_DEPRECATED LIBSSH_API void privatekey_free(ssh_private_key prv);
|
LIBSSH_API void privatekey_free(ssh_private_key prv);
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_private_key privatekey_from_file(ssh_session session, const char *filename,
|
LIBSSH_API ssh_private_key privatekey_from_file(ssh_session session, const char *filename,
|
||||||
int type, const char *passphrase);
|
int type, const char *passphrase);
|
||||||
SSH_DEPRECATED LIBSSH_API void publickey_free(ssh_public_key key);
|
LIBSSH_API void publickey_free(ssh_public_key key);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_publickey_to_file(ssh_session session, const char *file,
|
LIBSSH_API int ssh_publickey_to_file(ssh_session session, const char *file,
|
||||||
ssh_string pubkey, int type);
|
ssh_string pubkey, int type);
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_string publickey_from_file(ssh_session session, const char *filename,
|
LIBSSH_API ssh_string publickey_from_file(ssh_session session, const char *filename,
|
||||||
int *type);
|
int *type);
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_public_key publickey_from_privatekey(ssh_private_key prv);
|
LIBSSH_API ssh_public_key publickey_from_privatekey(ssh_private_key prv);
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_string publickey_to_string(ssh_public_key key);
|
LIBSSH_API ssh_string publickey_to_string(ssh_public_key key);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_try_publickey_from_file(ssh_session session, const char *keyfile,
|
LIBSSH_API int ssh_try_publickey_from_file(ssh_session session, const char *keyfile,
|
||||||
ssh_string *publickey, int *type);
|
ssh_string *publickey, int *type);
|
||||||
SSH_DEPRECATED LIBSSH_API enum ssh_keytypes_e ssh_privatekey_type(ssh_private_key privatekey);
|
LIBSSH_API enum ssh_keytypes_e ssh_privatekey_type(ssh_private_key privatekey);
|
||||||
|
|
||||||
LIBSSH_API ssh_string ssh_get_pubkey(ssh_session session);
|
LIBSSH_API ssh_string ssh_get_pubkey(ssh_session session);
|
||||||
|
|
||||||
|
|||||||
@@ -31,14 +31,13 @@
|
|||||||
#include <openssl/md5.h>
|
#include <openssl/md5.h>
|
||||||
#include <openssl/hmac.h>
|
#include <openssl/hmac.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/crypto.h>
|
|
||||||
|
|
||||||
typedef EVP_MD_CTX* SHACTX;
|
typedef EVP_MD_CTX* SHACTX;
|
||||||
typedef EVP_MD_CTX* SHA256CTX;
|
typedef EVP_MD_CTX* SHA256CTX;
|
||||||
typedef EVP_MD_CTX* SHA384CTX;
|
typedef EVP_MD_CTX* SHA384CTX;
|
||||||
typedef EVP_MD_CTX* SHA512CTX;
|
typedef EVP_MD_CTX* SHA512CTX;
|
||||||
typedef EVP_MD_CTX* MD5CTX;
|
typedef EVP_MD_CTX* MD5CTX;
|
||||||
typedef EVP_MD_CTX* HMACCTX;
|
typedef HMAC_CTX* HMACCTX;
|
||||||
#ifdef HAVE_ECC
|
#ifdef HAVE_ECC
|
||||||
typedef EVP_MD_CTX *EVPCTX;
|
typedef EVP_MD_CTX *EVPCTX;
|
||||||
#else
|
#else
|
||||||
@@ -60,8 +59,11 @@ typedef void *EVPCTX;
|
|||||||
|
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
#include <openssl/opensslv.h>
|
#include <openssl/opensslv.h>
|
||||||
|
#define OPENSSL_0_9_7b 0x0090702fL
|
||||||
|
#if (OPENSSL_VERSION_NUMBER <= OPENSSL_0_9_7b)
|
||||||
|
#define BROKEN_AES_CTR
|
||||||
|
#endif
|
||||||
typedef BIGNUM* bignum;
|
typedef BIGNUM* bignum;
|
||||||
typedef const BIGNUM* const_bignum;
|
|
||||||
typedef BN_CTX* bignum_CTX;
|
typedef BN_CTX* bignum_CTX;
|
||||||
|
|
||||||
#define bignum_new() BN_new()
|
#define bignum_new() BN_new()
|
||||||
@@ -72,49 +74,19 @@ typedef BN_CTX* bignum_CTX;
|
|||||||
} \
|
} \
|
||||||
} while(0)
|
} while(0)
|
||||||
#define bignum_set_word(bn,n) BN_set_word(bn,n)
|
#define bignum_set_word(bn,n) BN_set_word(bn,n)
|
||||||
#define bignum_bin2bn(data, datalen, dest) \
|
#define bignum_bin2bn(bn,datalen,data) BN_bin2bn(bn,datalen,data)
|
||||||
do { \
|
|
||||||
(*dest) = BN_new(); \
|
|
||||||
if ((*dest) != NULL) { \
|
|
||||||
BN_bin2bn(data,datalen,(*dest)); \
|
|
||||||
} \
|
|
||||||
} while(0)
|
|
||||||
#define bignum_bn2dec(num) BN_bn2dec(num)
|
#define bignum_bn2dec(num) BN_bn2dec(num)
|
||||||
#define bignum_dec2bn(data, bn) BN_dec2bn(bn, data)
|
#define bignum_dec2bn(bn,data) BN_dec2bn(data,bn)
|
||||||
#define bignum_hex2bn(data, bn) BN_hex2bn(bn, data)
|
#define bignum_bn2hex(num) BN_bn2hex(num)
|
||||||
#define bignum_bn2hex(num, dest) (*dest)=(unsigned char *)BN_bn2hex(num)
|
|
||||||
#define bignum_rand(rnd, bits) BN_rand(rnd, bits, 0, 1)
|
#define bignum_rand(rnd, bits) BN_rand(rnd, bits, 0, 1)
|
||||||
#define bignum_rand_range(rnd, max) BN_rand_range(rnd, max)
|
|
||||||
#define bignum_ctx_new() BN_CTX_new()
|
#define bignum_ctx_new() BN_CTX_new()
|
||||||
#define bignum_ctx_free(num) BN_CTX_free(num)
|
#define bignum_ctx_free(num) BN_CTX_free(num)
|
||||||
#define bignum_ctx_invalid(ctx) ((ctx) == NULL)
|
|
||||||
#define bignum_mod_exp(dest,generator,exp,modulo,ctx) BN_mod_exp(dest,generator,exp,modulo,ctx)
|
#define bignum_mod_exp(dest,generator,exp,modulo,ctx) BN_mod_exp(dest,generator,exp,modulo,ctx)
|
||||||
#define bignum_add(dest, a, b) BN_add(dest, a, b)
|
#define bignum_num_bytes(num) BN_num_bytes(num)
|
||||||
#define bignum_sub(dest, a, b) BN_sub(dest, a, b)
|
#define bignum_num_bits(num) BN_num_bits(num)
|
||||||
#define bignum_mod(dest, a, b, ctx) BN_mod(dest, a, b, ctx)
|
#define bignum_is_bit_set(num,bit) BN_is_bit_set(num,bit)
|
||||||
#define bignum_num_bytes(num) (size_t)BN_num_bytes(num)
|
#define bignum_bn2bin(num,ptr) BN_bn2bin(num,ptr)
|
||||||
#define bignum_num_bits(num) (size_t)BN_num_bits(num)
|
|
||||||
#define bignum_is_bit_set(num,bit) BN_is_bit_set(num, (int)bit)
|
|
||||||
#define bignum_bn2bin(num,len, ptr) BN_bn2bin(num, ptr)
|
|
||||||
#define bignum_cmp(num1,num2) BN_cmp(num1,num2)
|
#define bignum_cmp(num1,num2) BN_cmp(num1,num2)
|
||||||
#define bignum_rshift1(dest, src) BN_rshift1(dest, src)
|
|
||||||
#define bignum_dup(orig, dest) do { \
|
|
||||||
if (*(dest) == NULL) { \
|
|
||||||
*(dest) = BN_dup(orig); \
|
|
||||||
} else { \
|
|
||||||
BN_copy(*(dest), orig); \
|
|
||||||
} \
|
|
||||||
} while(0)
|
|
||||||
|
|
||||||
|
|
||||||
/* Returns true if the OpenSSL is operating in FIPS mode */
|
|
||||||
#ifdef HAVE_OPENSSL_FIPS_MODE
|
|
||||||
#define ssh_fips_mode() (FIPS_mode() != 0)
|
|
||||||
#elif OPENSSL_VERSION_NUMBER >= 0x30000000L
|
|
||||||
#define ssh_fips_mode() EVP_default_properties_is_fips_enabled(NULL)
|
|
||||||
#else
|
|
||||||
#define ssh_fips_mode() false
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* HAVE_LIBCRYPTO */
|
#endif /* HAVE_LIBCRYPTO */
|
||||||
|
|
||||||
|
|||||||
@@ -50,8 +50,6 @@ typedef gcry_md_hd_t EVPCTX;
|
|||||||
#define EVP_DIGEST_LEN EVP_MAX_MD_SIZE
|
#define EVP_DIGEST_LEN EVP_MAX_MD_SIZE
|
||||||
|
|
||||||
typedef gcry_mpi_t bignum;
|
typedef gcry_mpi_t bignum;
|
||||||
typedef const struct gcry_mpi *const_bignum;
|
|
||||||
typedef void* bignum_CTX;
|
|
||||||
|
|
||||||
/* Constants for curves. */
|
/* Constants for curves. */
|
||||||
#define NID_gcrypt_nistp256 0
|
#define NID_gcrypt_nistp256 0
|
||||||
@@ -61,7 +59,6 @@ typedef void* bignum_CTX;
|
|||||||
/* missing gcrypt functions */
|
/* missing gcrypt functions */
|
||||||
int ssh_gcry_dec2bn(bignum *bn, const char *data);
|
int ssh_gcry_dec2bn(bignum *bn, const char *data);
|
||||||
char *ssh_gcry_bn2dec(bignum bn);
|
char *ssh_gcry_bn2dec(bignum bn);
|
||||||
int ssh_gcry_rand_range(bignum rnd, bignum max);
|
|
||||||
|
|
||||||
#define bignum_new() gcry_mpi_new(0)
|
#define bignum_new() gcry_mpi_new(0)
|
||||||
#define bignum_safe_free(num) do { \
|
#define bignum_safe_free(num) do { \
|
||||||
@@ -70,38 +67,20 @@ int ssh_gcry_rand_range(bignum rnd, bignum max);
|
|||||||
(num)=NULL; \
|
(num)=NULL; \
|
||||||
} \
|
} \
|
||||||
} while (0)
|
} while (0)
|
||||||
#define bignum_free(num) gcry_mpi_release(num)
|
#define bignum_set_word(bn,n) gcry_mpi_set_ui(bn,n)
|
||||||
#define bignum_ctx_new() NULL
|
#define bignum_bin2bn(bn,datalen,data) gcry_mpi_scan(data,GCRYMPI_FMT_USG,bn,datalen,NULL)
|
||||||
#define bignum_ctx_free(ctx) do {(ctx) = NULL;} while(0)
|
|
||||||
#define bignum_ctx_invalid(ctx) (ctx != NULL)
|
|
||||||
#define bignum_set_word(bn,n) (gcry_mpi_set_ui(bn,n)!=NULL ? 1 : 0)
|
|
||||||
#define bignum_bin2bn(data,datalen,dest) gcry_mpi_scan(dest,GCRYMPI_FMT_USG,data,datalen,NULL)
|
|
||||||
#define bignum_bn2dec(num) ssh_gcry_bn2dec(num)
|
#define bignum_bn2dec(num) ssh_gcry_bn2dec(num)
|
||||||
#define bignum_dec2bn(num, data) ssh_gcry_dec2bn(data, num)
|
#define bignum_dec2bn(num, data) ssh_gcry_dec2bn(data, num)
|
||||||
|
#define bignum_bn2hex(num,data) gcry_mpi_aprint(GCRYMPI_FMT_HEX,data,NULL,num)
|
||||||
#define bignum_bn2hex(num, data) \
|
#define bignum_hex2bn(num,datalen,data) gcry_mpi_scan(num,GCRYMPI_FMT_HEX,data,datalen,NULL)
|
||||||
gcry_mpi_aprint(GCRYMPI_FMT_HEX, data, NULL, (const gcry_mpi_t)num)
|
#define bignum_rand(num,bits) gcry_mpi_randomize(num,bits,GCRY_STRONG_RANDOM),gcry_mpi_set_bit(num,bits-1),gcry_mpi_set_bit(num,0)
|
||||||
|
#define bignum_mod_exp(dest,generator,exp,modulo) gcry_mpi_powm(dest,generator,exp,modulo)
|
||||||
#define bignum_hex2bn(data, num) (gcry_mpi_scan(num,GCRYMPI_FMT_HEX,data,0,NULL)==0?1:0)
|
|
||||||
#define bignum_rand(num,bits) 1,gcry_mpi_randomize(num,bits,GCRY_STRONG_RANDOM),gcry_mpi_set_bit(num,bits-1),gcry_mpi_set_bit(num,0)
|
|
||||||
#define bignum_mod_exp(dest,generator,exp,modulo, ctx) 1,gcry_mpi_powm(dest,generator,exp,modulo)
|
|
||||||
#define bignum_num_bits(num) gcry_mpi_get_nbits(num)
|
#define bignum_num_bits(num) gcry_mpi_get_nbits(num)
|
||||||
#define bignum_num_bytes(num) ((gcry_mpi_get_nbits(num)+7)/8)
|
#define bignum_num_bytes(num) ((gcry_mpi_get_nbits(num)+7)/8)
|
||||||
#define bignum_is_bit_set(num,bit) gcry_mpi_test_bit(num,bit)
|
#define bignum_is_bit_set(num,bit) gcry_mpi_test_bit(num,bit)
|
||||||
#define bignum_bn2bin(num,datalen,data) gcry_mpi_print(GCRYMPI_FMT_USG,data,datalen,NULL,num)
|
#define bignum_bn2bin(num,datalen,data) gcry_mpi_print(GCRYMPI_FMT_USG,data,datalen,NULL,num)
|
||||||
#define bignum_cmp(num1,num2) gcry_mpi_cmp(num1,num2)
|
#define bignum_cmp(num1,num2) gcry_mpi_cmp(num1,num2)
|
||||||
#define bignum_rshift1(dest, src) gcry_mpi_rshift (dest, src, 1)
|
|
||||||
#define bignum_add(dst, a, b) gcry_mpi_add(dst, a, b)
|
|
||||||
#define bignum_sub(dst, a, b) gcry_mpi_sub(dst, a, b)
|
|
||||||
#define bignum_mod(dst, a, b, ctx) 1,gcry_mpi_mod(dst, a, b)
|
|
||||||
#define bignum_rand_range(rnd, max) ssh_gcry_rand_range(rnd, max);
|
|
||||||
#define bignum_dup(orig, dest) do { \
|
|
||||||
if (*(dest) == NULL) { \
|
|
||||||
*(dest) = gcry_mpi_copy(orig); \
|
|
||||||
} else { \
|
|
||||||
gcry_mpi_set(*(dest), orig); \
|
|
||||||
} \
|
|
||||||
} while(0)
|
|
||||||
/* Helper functions for data conversions. */
|
/* Helper functions for data conversions. */
|
||||||
|
|
||||||
/* Extract an MPI from the given s-expression SEXP named NAME which is
|
/* Extract an MPI from the given s-expression SEXP named NAME which is
|
||||||
@@ -112,8 +91,6 @@ ssh_string ssh_sexp_extract_mpi(const gcry_sexp_t sexp,
|
|||||||
enum gcry_mpi_format informat,
|
enum gcry_mpi_format informat,
|
||||||
enum gcry_mpi_format outformat);
|
enum gcry_mpi_format outformat);
|
||||||
|
|
||||||
#define ssh_fips_mode() false
|
|
||||||
|
|
||||||
#endif /* HAVE_LIBGCRYPT */
|
#endif /* HAVE_LIBGCRYPT */
|
||||||
|
|
||||||
#endif /* LIBGCRYPT_H_ */
|
#endif /* LIBGCRYPT_H_ */
|
||||||
|
|||||||
@@ -60,8 +60,6 @@ typedef mbedtls_md_context_t *EVPCTX;
|
|||||||
#define EVP_DIGEST_LEN EVP_MAX_MD_SIZE
|
#define EVP_DIGEST_LEN EVP_MAX_MD_SIZE
|
||||||
|
|
||||||
typedef mbedtls_mpi *bignum;
|
typedef mbedtls_mpi *bignum;
|
||||||
typedef const mbedtls_mpi *const_bignum;
|
|
||||||
typedef void* bignum_CTX;
|
|
||||||
|
|
||||||
/* Constants for curves */
|
/* Constants for curves */
|
||||||
#define NID_mbedtls_nistp256 0
|
#define NID_mbedtls_nistp256 0
|
||||||
@@ -75,11 +73,9 @@ struct mbedtls_ecdsa_sig {
|
|||||||
|
|
||||||
bignum ssh_mbedcry_bn_new(void);
|
bignum ssh_mbedcry_bn_new(void);
|
||||||
void ssh_mbedcry_bn_free(bignum num);
|
void ssh_mbedcry_bn_free(bignum num);
|
||||||
unsigned char *ssh_mbedcry_bn2num(const_bignum num, int radix);
|
char *ssh_mbedcry_bn2num(bignum num, int radix);
|
||||||
int ssh_mbedcry_rand(bignum rnd, int bits, int top, int bottom);
|
int ssh_mbedcry_rand(bignum rnd, int bits, int top, int bottom);
|
||||||
int ssh_mbedcry_is_bit_set(bignum num, size_t pos);
|
int ssh_mbedcry_is_bit_set(bignum num, size_t pos);
|
||||||
int ssh_mbedcry_rand_range(bignum dest, bignum max);
|
|
||||||
int ssh_mbedcry_hex2bn(bignum *dest, char *data);
|
|
||||||
|
|
||||||
#define bignum_new() ssh_mbedcry_bn_new()
|
#define bignum_new() ssh_mbedcry_bn_new()
|
||||||
#define bignum_safe_free(num) do { \
|
#define bignum_safe_free(num) do { \
|
||||||
@@ -88,44 +84,22 @@ int ssh_mbedcry_hex2bn(bignum *dest, char *data);
|
|||||||
(num)=NULL; \
|
(num)=NULL; \
|
||||||
} \
|
} \
|
||||||
} while(0)
|
} while(0)
|
||||||
#define bignum_ctx_new() NULL
|
#define bignum_set_word(bn, n) mbedtls_mpi_lset(bn, n) /* TODO fix
|
||||||
#define bignum_ctx_free(num) do {(num) = NULL;} while(0)
|
|
||||||
#define bignum_ctx_invalid(ctx) (ctx == NULL?0:1)
|
|
||||||
#define bignum_set_word(bn, n) (mbedtls_mpi_lset(bn, n)==0?1:0) /* TODO fix
|
|
||||||
overflow/underflow */
|
overflow/underflow */
|
||||||
#define bignum_bin2bn(data, datalen, bn) do { \
|
#define bignum_bin2bn(data, datalen, bn) mbedtls_mpi_read_binary(bn, data, \
|
||||||
*(bn) = bignum_new(); \
|
datalen)
|
||||||
if (*(bn) != NULL) { \
|
|
||||||
mbedtls_mpi_read_binary(*(bn), data, datalen); \
|
|
||||||
} \
|
|
||||||
} while(0)
|
|
||||||
#define bignum_bn2dec(num) ssh_mbedcry_bn2num(num, 10)
|
#define bignum_bn2dec(num) ssh_mbedcry_bn2num(num, 10)
|
||||||
#define bignum_dec2bn(data, bn) mbedtls_mpi_read_string(bn, 10, data)
|
#define bignum_dec2bn(data, bn) mbedtls_mpi_read_string(bn, 10, data)
|
||||||
#define bignum_bn2hex(num, dest) (*dest)=ssh_mbedcry_bn2num(num, 16)
|
#define bignum_bn2hex(num) ssh_mbedcry_bn2num(num, 16)
|
||||||
#define bignum_hex2bn(data, dest) ssh_mbedcry_hex2bn(dest, data)
|
|
||||||
#define bignum_rand(rnd, bits) ssh_mbedcry_rand((rnd), (bits), 0, 1)
|
#define bignum_rand(rnd, bits) ssh_mbedcry_rand((rnd), (bits), 0, 1)
|
||||||
#define bignum_rand_range(rnd, max) ssh_mbedcry_rand_range(rnd, max)
|
|
||||||
#define bignum_mod_exp(dest, generator, exp, modulo, ctx) \
|
#define bignum_mod_exp(dest, generator, exp, modulo, ctx) \
|
||||||
(mbedtls_mpi_exp_mod(dest, generator, exp, modulo, NULL)==0?1:0)
|
mbedtls_mpi_exp_mod(dest, generator, exp, modulo, NULL)
|
||||||
#define bignum_add(dest, a, b) mbedtls_mpi_add_mpi(dest, a, b)
|
|
||||||
#define bignum_sub(dest, a, b) mbedtls_mpi_sub_mpi(dest, a, b)
|
|
||||||
#define bignum_mod(dest, a, b, ctx) \
|
|
||||||
(mbedtls_mpi_mod_mpi(dest, a, b) == 0 ? 1 : 0)
|
|
||||||
#define bignum_num_bytes(num) mbedtls_mpi_size(num)
|
#define bignum_num_bytes(num) mbedtls_mpi_size(num)
|
||||||
#define bignum_num_bits(num) mbedtls_mpi_bitlen(num)
|
#define bignum_num_bits(num) mbedtls_mpi_bitlen(num)
|
||||||
#define bignum_is_bit_set(num, bit) ssh_mbedcry_is_bit_set(num, bit)
|
#define bignum_is_bit_set(num, bit) ssh_mbedcry_is_bit_set(num, bit)
|
||||||
#define bignum_bn2bin(num, len, ptr) mbedtls_mpi_write_binary(num, ptr, \
|
#define bignum_bn2bin(num, ptr) mbedtls_mpi_write_binary(num, ptr, \
|
||||||
mbedtls_mpi_size(num))
|
mbedtls_mpi_size(num))
|
||||||
#define bignum_cmp(num1, num2) mbedtls_mpi_cmp_mpi(num1, num2)
|
#define bignum_cmp(num1, num2) mbedtls_mpi_cmp_mpi(num1, num2)
|
||||||
#define bignum_rshift1(dest, src) mbedtls_mpi_copy(dest, src), mbedtls_mpi_shift_r(dest, 1)
|
|
||||||
#define bignum_dup(orig, dest) do { \
|
|
||||||
if (*(dest) == NULL) { \
|
|
||||||
*(dest) = bignum_new(); \
|
|
||||||
} \
|
|
||||||
if (*(dest) != NULL) { \
|
|
||||||
mbedtls_mpi_copy(orig, *(dest)); \
|
|
||||||
} \
|
|
||||||
} while(0)
|
|
||||||
|
|
||||||
mbedtls_ctr_drbg_context *ssh_get_mbedtls_ctr_drbg_context(void);
|
mbedtls_ctr_drbg_context *ssh_get_mbedtls_ctr_drbg_context(void);
|
||||||
|
|
||||||
@@ -134,7 +108,5 @@ int ssh_mbedtls_random(void *where, int len, int strong);
|
|||||||
ssh_string make_ecpoint_string(const mbedtls_ecp_group *g, const
|
ssh_string make_ecpoint_string(const mbedtls_ecp_group *g, const
|
||||||
mbedtls_ecp_point *p);
|
mbedtls_ecp_point *p);
|
||||||
|
|
||||||
#define ssh_fips_mode() false
|
|
||||||
|
|
||||||
#endif /* HAVE_LIBMBEDCRYPTO */
|
#endif /* HAVE_LIBMBEDCRYPTO */
|
||||||
#endif /* LIBMBEDCRYPTO_H_ */
|
#endif /* LIBMBEDCRYPTO_H_ */
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
/*
|
/*
|
||||||
* This file is part of the SSH Library
|
* This file is part of the SSH Library
|
||||||
*
|
*
|
||||||
* Copyright (c) 2003-2022 by Aris Adamantiadis and the libssh team
|
* Copyright (c) 2003-2009 by Aris Adamantiadis
|
||||||
*
|
*
|
||||||
* This library is free software; you can redistribute it and/or
|
* This library is free software; you can redistribute it and/or
|
||||||
* modify it under the terms of the GNU Lesser General Public
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
@@ -21,8 +21,6 @@
|
|||||||
#ifndef _LIBSSH_H
|
#ifndef _LIBSSH_H
|
||||||
#define _LIBSSH_H
|
#define _LIBSSH_H
|
||||||
|
|
||||||
#include <libssh/libssh_version.h>
|
|
||||||
|
|
||||||
#if defined _WIN32 || defined __CYGWIN__
|
#if defined _WIN32 || defined __CYGWIN__
|
||||||
#ifdef LIBSSH_STATIC
|
#ifdef LIBSSH_STATIC
|
||||||
#define LIBSSH_API
|
#define LIBSSH_API
|
||||||
@@ -49,8 +47,6 @@
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#include <stdarg.h>
|
|
||||||
|
|
||||||
#ifdef _MSC_VER
|
#ifdef _MSC_VER
|
||||||
/* Visual Studio hasn't inttypes.h so it doesn't know uint32_t */
|
/* Visual Studio hasn't inttypes.h so it doesn't know uint32_t */
|
||||||
typedef int int32_t;
|
typedef int int32_t;
|
||||||
@@ -75,6 +71,23 @@
|
|||||||
#define SSH_STRINGIFY(s) SSH_TOSTRING(s)
|
#define SSH_STRINGIFY(s) SSH_TOSTRING(s)
|
||||||
#define SSH_TOSTRING(s) #s
|
#define SSH_TOSTRING(s) #s
|
||||||
|
|
||||||
|
/* libssh version macros */
|
||||||
|
#define SSH_VERSION_INT(a, b, c) ((a) << 16 | (b) << 8 | (c))
|
||||||
|
#define SSH_VERSION_DOT(a, b, c) a ##.## b ##.## c
|
||||||
|
#define SSH_VERSION(a, b, c) SSH_VERSION_DOT(a, b, c)
|
||||||
|
|
||||||
|
/* libssh version */
|
||||||
|
#define LIBSSH_VERSION_MAJOR 0
|
||||||
|
#define LIBSSH_VERSION_MINOR 8
|
||||||
|
#define LIBSSH_VERSION_MICRO 90
|
||||||
|
|
||||||
|
#define LIBSSH_VERSION_INT SSH_VERSION_INT(LIBSSH_VERSION_MAJOR, \
|
||||||
|
LIBSSH_VERSION_MINOR, \
|
||||||
|
LIBSSH_VERSION_MICRO)
|
||||||
|
#define LIBSSH_VERSION SSH_VERSION(LIBSSH_VERSION_MAJOR, \
|
||||||
|
LIBSSH_VERSION_MINOR, \
|
||||||
|
LIBSSH_VERSION_MICRO)
|
||||||
|
|
||||||
/* GCC have printf type attribute check. */
|
/* GCC have printf type attribute check. */
|
||||||
#ifdef __GNUC__
|
#ifdef __GNUC__
|
||||||
#define PRINTF_ATTRIBUTE(a,b) __attribute__ ((__format__ (__printf__, a, b)))
|
#define PRINTF_ATTRIBUTE(a,b) __attribute__ ((__format__ (__printf__, a, b)))
|
||||||
@@ -155,13 +168,13 @@ enum ssh_auth_e {
|
|||||||
};
|
};
|
||||||
|
|
||||||
/* auth flags */
|
/* auth flags */
|
||||||
#define SSH_AUTH_METHOD_UNKNOWN 0x0000u
|
#define SSH_AUTH_METHOD_UNKNOWN 0
|
||||||
#define SSH_AUTH_METHOD_NONE 0x0001u
|
#define SSH_AUTH_METHOD_NONE 0x0001
|
||||||
#define SSH_AUTH_METHOD_PASSWORD 0x0002u
|
#define SSH_AUTH_METHOD_PASSWORD 0x0002
|
||||||
#define SSH_AUTH_METHOD_PUBLICKEY 0x0004u
|
#define SSH_AUTH_METHOD_PUBLICKEY 0x0004
|
||||||
#define SSH_AUTH_METHOD_HOSTBASED 0x0008u
|
#define SSH_AUTH_METHOD_HOSTBASED 0x0008
|
||||||
#define SSH_AUTH_METHOD_INTERACTIVE 0x0010u
|
#define SSH_AUTH_METHOD_INTERACTIVE 0x0010
|
||||||
#define SSH_AUTH_METHOD_GSSAPI_MIC 0x0020u
|
#define SSH_AUTH_METHOD_GSSAPI_MIC 0x0020
|
||||||
|
|
||||||
/* messages */
|
/* messages */
|
||||||
enum ssh_requests_e {
|
enum ssh_requests_e {
|
||||||
@@ -280,21 +293,10 @@ enum ssh_keytypes_e{
|
|||||||
SSH_KEYTYPE_DSS=1,
|
SSH_KEYTYPE_DSS=1,
|
||||||
SSH_KEYTYPE_RSA,
|
SSH_KEYTYPE_RSA,
|
||||||
SSH_KEYTYPE_RSA1,
|
SSH_KEYTYPE_RSA1,
|
||||||
SSH_KEYTYPE_ECDSA, /* deprecated */
|
SSH_KEYTYPE_ECDSA,
|
||||||
SSH_KEYTYPE_ED25519,
|
SSH_KEYTYPE_ED25519,
|
||||||
SSH_KEYTYPE_DSS_CERT01,
|
SSH_KEYTYPE_DSS_CERT01,
|
||||||
SSH_KEYTYPE_RSA_CERT01,
|
SSH_KEYTYPE_RSA_CERT01
|
||||||
SSH_KEYTYPE_ECDSA_P256,
|
|
||||||
SSH_KEYTYPE_ECDSA_P384,
|
|
||||||
SSH_KEYTYPE_ECDSA_P521,
|
|
||||||
SSH_KEYTYPE_ECDSA_P256_CERT01,
|
|
||||||
SSH_KEYTYPE_ECDSA_P384_CERT01,
|
|
||||||
SSH_KEYTYPE_ECDSA_P521_CERT01,
|
|
||||||
SSH_KEYTYPE_ED25519_CERT01,
|
|
||||||
SSH_KEYTYPE_SK_ECDSA,
|
|
||||||
SSH_KEYTYPE_SK_ECDSA_CERT01,
|
|
||||||
SSH_KEYTYPE_SK_ED25519,
|
|
||||||
SSH_KEYTYPE_SK_ED25519_CERT01,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ssh_keycmp_e {
|
enum ssh_keycmp_e {
|
||||||
@@ -404,10 +406,6 @@ enum ssh_options_e {
|
|||||||
SSH_OPTIONS_NODELAY,
|
SSH_OPTIONS_NODELAY,
|
||||||
SSH_OPTIONS_PUBLICKEY_ACCEPTED_TYPES,
|
SSH_OPTIONS_PUBLICKEY_ACCEPTED_TYPES,
|
||||||
SSH_OPTIONS_PROCESS_CONFIG,
|
SSH_OPTIONS_PROCESS_CONFIG,
|
||||||
SSH_OPTIONS_REKEY_DATA,
|
|
||||||
SSH_OPTIONS_REKEY_TIME,
|
|
||||||
SSH_OPTIONS_RSA_MIN_SIZE,
|
|
||||||
SSH_OPTIONS_IDENTITY_AGENT,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
@@ -434,7 +432,6 @@ enum ssh_scp_request_types {
|
|||||||
enum ssh_connector_flags_e {
|
enum ssh_connector_flags_e {
|
||||||
/** Only the standard stream of the channel */
|
/** Only the standard stream of the channel */
|
||||||
SSH_CONNECTOR_STDOUT = 1,
|
SSH_CONNECTOR_STDOUT = 1,
|
||||||
SSH_CONNECTOR_STDINOUT = 1,
|
|
||||||
/** Only the exception stream of the channel */
|
/** Only the exception stream of the channel */
|
||||||
SSH_CONNECTOR_STDERR = 2,
|
SSH_CONNECTOR_STDERR = 2,
|
||||||
/** Merge both standard and exception streams */
|
/** Merge both standard and exception streams */
|
||||||
@@ -455,8 +452,6 @@ LIBSSH_API ssh_channel ssh_channel_new(ssh_session session);
|
|||||||
LIBSSH_API int ssh_channel_open_auth_agent(ssh_channel channel);
|
LIBSSH_API int ssh_channel_open_auth_agent(ssh_channel channel);
|
||||||
LIBSSH_API int ssh_channel_open_forward(ssh_channel channel, const char *remotehost,
|
LIBSSH_API int ssh_channel_open_forward(ssh_channel channel, const char *remotehost,
|
||||||
int remoteport, const char *sourcehost, int localport);
|
int remoteport, const char *sourcehost, int localport);
|
||||||
LIBSSH_API int ssh_channel_open_forward_unix(ssh_channel channel, const char *remotepath,
|
|
||||||
const char *sourcehost, int localport);
|
|
||||||
LIBSSH_API int ssh_channel_open_session(ssh_channel channel);
|
LIBSSH_API int ssh_channel_open_session(ssh_channel channel);
|
||||||
LIBSSH_API int ssh_channel_open_x11(ssh_channel channel, const char *orig_addr, int orig_port);
|
LIBSSH_API int ssh_channel_open_x11(ssh_channel channel, const char *orig_addr, int orig_port);
|
||||||
LIBSSH_API int ssh_channel_poll(ssh_channel channel, int is_stderr);
|
LIBSSH_API int ssh_channel_poll(ssh_channel channel, int is_stderr);
|
||||||
@@ -479,6 +474,8 @@ LIBSSH_API int ssh_channel_request_x11(ssh_channel channel, int single_connectio
|
|||||||
const char *cookie, int screen_number);
|
const char *cookie, int screen_number);
|
||||||
LIBSSH_API int ssh_channel_request_auth_agent(ssh_channel channel);
|
LIBSSH_API int ssh_channel_request_auth_agent(ssh_channel channel);
|
||||||
LIBSSH_API int ssh_channel_send_eof(ssh_channel channel);
|
LIBSSH_API int ssh_channel_send_eof(ssh_channel channel);
|
||||||
|
LIBSSH_API int ssh_channel_select(ssh_channel *readchans, ssh_channel *writechans, ssh_channel *exceptchans, struct
|
||||||
|
timeval * timeout);
|
||||||
LIBSSH_API void ssh_channel_set_blocking(ssh_channel channel, int blocking);
|
LIBSSH_API void ssh_channel_set_blocking(ssh_channel channel, int blocking);
|
||||||
LIBSSH_API void ssh_channel_set_counter(ssh_channel channel,
|
LIBSSH_API void ssh_channel_set_counter(ssh_channel channel,
|
||||||
ssh_counter counter);
|
ssh_counter counter);
|
||||||
@@ -509,12 +506,7 @@ LIBSSH_API char *ssh_dirname (const char *path);
|
|||||||
LIBSSH_API int ssh_finalize(void);
|
LIBSSH_API int ssh_finalize(void);
|
||||||
|
|
||||||
/* REVERSE PORT FORWARDING */
|
/* REVERSE PORT FORWARDING */
|
||||||
LIBSSH_API ssh_channel ssh_channel_open_forward_port(ssh_session session,
|
LIBSSH_API ssh_channel ssh_channel_accept_forward(ssh_session session,
|
||||||
int timeout_ms,
|
|
||||||
int *destination_port,
|
|
||||||
char **originator,
|
|
||||||
int *originator_port);
|
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_channel ssh_channel_accept_forward(ssh_session session,
|
|
||||||
int timeout_ms,
|
int timeout_ms,
|
||||||
int *destination_port);
|
int *destination_port);
|
||||||
LIBSSH_API int ssh_channel_cancel_forward(ssh_session session,
|
LIBSSH_API int ssh_channel_cancel_forward(ssh_session session,
|
||||||
@@ -555,28 +547,7 @@ SSH_DEPRECATED LIBSSH_API int ssh_get_publickey(ssh_session session, ssh_key *ke
|
|||||||
SSH_DEPRECATED LIBSSH_API int ssh_write_knownhost(ssh_session session);
|
SSH_DEPRECATED LIBSSH_API int ssh_write_knownhost(ssh_session session);
|
||||||
SSH_DEPRECATED LIBSSH_API char *ssh_dump_knownhost(ssh_session session);
|
SSH_DEPRECATED LIBSSH_API char *ssh_dump_knownhost(ssh_session session);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_is_server_known(ssh_session session);
|
SSH_DEPRECATED LIBSSH_API int ssh_is_server_known(ssh_session session);
|
||||||
SSH_DEPRECATED LIBSSH_API void ssh_print_hexa(const char *descr, const unsigned char *what, size_t len);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_channel_select(ssh_channel *readchans, ssh_channel *writechans, ssh_channel *exceptchans, struct
|
|
||||||
timeval * timeout);
|
|
||||||
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_accept_request(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_close(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_deny_request(ssh_scp scp, const char *reason);
|
|
||||||
SSH_DEPRECATED LIBSSH_API void ssh_scp_free(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_init(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_leave_directory(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_scp ssh_scp_new(ssh_session session, int mode, const char *location);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_pull_request(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_push_directory(ssh_scp scp, const char *dirname, int mode);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_push_file(ssh_scp scp, const char *filename, size_t size, int perms);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_push_file64(ssh_scp scp, const char *filename, uint64_t size, int perms);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_read(ssh_scp scp, void *buffer, size_t size);
|
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_scp_request_get_filename(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_request_get_permissions(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API size_t ssh_scp_request_get_size(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API uint64_t ssh_scp_request_get_size64(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_scp_request_get_warning(ssh_scp scp);
|
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_scp_write(ssh_scp scp, const void *buffer, size_t len);
|
|
||||||
|
|
||||||
|
|
||||||
LIBSSH_API int ssh_get_random(void *where,int len,int strong);
|
LIBSSH_API int ssh_get_random(void *where,int len,int strong);
|
||||||
@@ -605,8 +576,9 @@ LIBSSH_API int ssh_session_export_known_hosts_entry(ssh_session session,
|
|||||||
char **pentry_string);
|
char **pentry_string);
|
||||||
LIBSSH_API int ssh_session_update_known_hosts(ssh_session session);
|
LIBSSH_API int ssh_session_update_known_hosts(ssh_session session);
|
||||||
|
|
||||||
LIBSSH_API enum ssh_known_hosts_e ssh_session_get_known_hosts_entry(ssh_session session,
|
LIBSSH_API enum ssh_known_hosts_e
|
||||||
struct ssh_knownhosts_entry **pentry);
|
ssh_session_get_known_hosts_entry(ssh_session session,
|
||||||
|
struct ssh_knownhosts_entry **pentry);
|
||||||
LIBSSH_API enum ssh_known_hosts_e ssh_session_is_known_server(ssh_session session);
|
LIBSSH_API enum ssh_known_hosts_e ssh_session_is_known_server(ssh_session session);
|
||||||
|
|
||||||
/* LOGGING */
|
/* LOGGING */
|
||||||
@@ -614,10 +586,6 @@ LIBSSH_API int ssh_set_log_level(int level);
|
|||||||
LIBSSH_API int ssh_get_log_level(void);
|
LIBSSH_API int ssh_get_log_level(void);
|
||||||
LIBSSH_API void *ssh_get_log_userdata(void);
|
LIBSSH_API void *ssh_get_log_userdata(void);
|
||||||
LIBSSH_API int ssh_set_log_userdata(void *data);
|
LIBSSH_API int ssh_set_log_userdata(void *data);
|
||||||
LIBSSH_API void ssh_vlog(int verbosity,
|
|
||||||
const char *function,
|
|
||||||
const char *format,
|
|
||||||
va_list *va) PRINTF_ATTRIBUTE(3, 0);
|
|
||||||
LIBSSH_API void _ssh_log(int verbosity,
|
LIBSSH_API void _ssh_log(int verbosity,
|
||||||
const char *function,
|
const char *function,
|
||||||
const char *format, ...) PRINTF_ATTRIBUTE(3, 4);
|
const char *format, ...) PRINTF_ATTRIBUTE(3, 4);
|
||||||
@@ -628,7 +596,6 @@ SSH_DEPRECATED LIBSSH_API void ssh_log(ssh_session session,
|
|||||||
const char *format, ...) PRINTF_ATTRIBUTE(3, 4);
|
const char *format, ...) PRINTF_ATTRIBUTE(3, 4);
|
||||||
|
|
||||||
LIBSSH_API ssh_channel ssh_message_channel_request_open_reply_accept(ssh_message msg);
|
LIBSSH_API ssh_channel ssh_message_channel_request_open_reply_accept(ssh_message msg);
|
||||||
LIBSSH_API int ssh_message_channel_request_open_reply_accept_channel(ssh_message msg, ssh_channel chan);
|
|
||||||
LIBSSH_API int ssh_message_channel_request_reply_success(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_reply_success(ssh_message msg);
|
||||||
#define SSH_MESSAGE_FREE(x) \
|
#define SSH_MESSAGE_FREE(x) \
|
||||||
do { if ((x) != NULL) { ssh_message_free(x); (x) = NULL; } } while(0)
|
do { if ((x) != NULL) { ssh_message_free(x); (x) = NULL; } } while(0)
|
||||||
@@ -653,13 +620,7 @@ LIBSSH_API ssh_pcap_file ssh_pcap_file_new(void);
|
|||||||
LIBSSH_API int ssh_pcap_file_open(ssh_pcap_file pcap, const char *filename);
|
LIBSSH_API int ssh_pcap_file_open(ssh_pcap_file pcap, const char *filename);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @addtogroup libssh_auth
|
* @brief SSH authentication callback.
|
||||||
*
|
|
||||||
* @{
|
|
||||||
*/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief SSH authentication callback for password and publickey auth.
|
|
||||||
*
|
*
|
||||||
* @param prompt Prompt to be displayed.
|
* @param prompt Prompt to be displayed.
|
||||||
* @param buf Buffer to save the password. You should null-terminate it.
|
* @param buf Buffer to save the password. You should null-terminate it.
|
||||||
@@ -674,8 +635,6 @@ LIBSSH_API int ssh_pcap_file_open(ssh_pcap_file pcap, const char *filename);
|
|||||||
typedef int (*ssh_auth_callback) (const char *prompt, char *buf, size_t len,
|
typedef int (*ssh_auth_callback) (const char *prompt, char *buf, size_t len,
|
||||||
int echo, int verify, void *userdata);
|
int echo, int verify, void *userdata);
|
||||||
|
|
||||||
/** @} */
|
|
||||||
|
|
||||||
LIBSSH_API ssh_key ssh_key_new(void);
|
LIBSSH_API ssh_key ssh_key_new(void);
|
||||||
#define SSH_KEY_FREE(x) \
|
#define SSH_KEY_FREE(x) \
|
||||||
do { if ((x) != NULL) { ssh_key_free(x); x = NULL; } } while(0)
|
do { if ((x) != NULL) { ssh_key_free(x); x = NULL; } } while(0)
|
||||||
@@ -688,7 +647,6 @@ LIBSSH_API int ssh_key_is_private(const ssh_key k);
|
|||||||
LIBSSH_API int ssh_key_cmp(const ssh_key k1,
|
LIBSSH_API int ssh_key_cmp(const ssh_key k1,
|
||||||
const ssh_key k2,
|
const ssh_key k2,
|
||||||
enum ssh_keycmp_e what);
|
enum ssh_keycmp_e what);
|
||||||
LIBSSH_API ssh_key ssh_key_dup(const ssh_key key);
|
|
||||||
|
|
||||||
LIBSSH_API int ssh_pki_generate(enum ssh_keytypes_e type, int parameter,
|
LIBSSH_API int ssh_pki_generate(enum ssh_keytypes_e type, int parameter,
|
||||||
ssh_key *pkey);
|
ssh_key *pkey);
|
||||||
@@ -741,9 +699,28 @@ LIBSSH_API char *ssh_get_fingerprint_hash(enum ssh_publickey_hash_type type,
|
|||||||
unsigned char *hash,
|
unsigned char *hash,
|
||||||
size_t len);
|
size_t len);
|
||||||
LIBSSH_API void ssh_print_hash(enum ssh_publickey_hash_type type, unsigned char *hash, size_t len);
|
LIBSSH_API void ssh_print_hash(enum ssh_publickey_hash_type type, unsigned char *hash, size_t len);
|
||||||
|
LIBSSH_API void ssh_print_hexa(const char *descr, const unsigned char *what, size_t len);
|
||||||
LIBSSH_API int ssh_send_ignore (ssh_session session, const char *data);
|
LIBSSH_API int ssh_send_ignore (ssh_session session, const char *data);
|
||||||
LIBSSH_API int ssh_send_debug (ssh_session session, const char *message, int always_display);
|
LIBSSH_API int ssh_send_debug (ssh_session session, const char *message, int always_display);
|
||||||
LIBSSH_API void ssh_gssapi_set_creds(ssh_session session, const ssh_gssapi_creds creds);
|
LIBSSH_API void ssh_gssapi_set_creds(ssh_session session, const ssh_gssapi_creds creds);
|
||||||
|
LIBSSH_API int ssh_scp_accept_request(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_close(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_deny_request(ssh_scp scp, const char *reason);
|
||||||
|
LIBSSH_API void ssh_scp_free(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_init(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_leave_directory(ssh_scp scp);
|
||||||
|
LIBSSH_API ssh_scp ssh_scp_new(ssh_session session, int mode, const char *location);
|
||||||
|
LIBSSH_API int ssh_scp_pull_request(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_push_directory(ssh_scp scp, const char *dirname, int mode);
|
||||||
|
LIBSSH_API int ssh_scp_push_file(ssh_scp scp, const char *filename, size_t size, int perms);
|
||||||
|
LIBSSH_API int ssh_scp_push_file64(ssh_scp scp, const char *filename, uint64_t size, int perms);
|
||||||
|
LIBSSH_API int ssh_scp_read(ssh_scp scp, void *buffer, size_t size);
|
||||||
|
LIBSSH_API const char *ssh_scp_request_get_filename(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_request_get_permissions(ssh_scp scp);
|
||||||
|
LIBSSH_API size_t ssh_scp_request_get_size(ssh_scp scp);
|
||||||
|
LIBSSH_API uint64_t ssh_scp_request_get_size64(ssh_scp scp);
|
||||||
|
LIBSSH_API const char *ssh_scp_request_get_warning(ssh_scp scp);
|
||||||
|
LIBSSH_API int ssh_scp_write(ssh_scp scp, const void *buffer, size_t len);
|
||||||
LIBSSH_API int ssh_select(ssh_channel *channels, ssh_channel *outchannels, socket_t maxfd,
|
LIBSSH_API int ssh_select(ssh_channel *channels, ssh_channel *outchannels, socket_t maxfd,
|
||||||
fd_set *readfds, struct timeval *timeout);
|
fd_set *readfds, struct timeval *timeout);
|
||||||
LIBSSH_API int ssh_service_request(ssh_session session, const char *service);
|
LIBSSH_API int ssh_service_request(ssh_session session, const char *service);
|
||||||
@@ -771,8 +748,6 @@ LIBSSH_API int ssh_userauth_publickey(ssh_session session,
|
|||||||
LIBSSH_API int ssh_userauth_agent(ssh_session session,
|
LIBSSH_API int ssh_userauth_agent(ssh_session session,
|
||||||
const char *username);
|
const char *username);
|
||||||
#endif
|
#endif
|
||||||
LIBSSH_API int ssh_userauth_publickey_auto_get_current_identity(ssh_session session,
|
|
||||||
char** value);
|
|
||||||
LIBSSH_API int ssh_userauth_publickey_auto(ssh_session session,
|
LIBSSH_API int ssh_userauth_publickey_auto(ssh_session session,
|
||||||
const char *username,
|
const char *username,
|
||||||
const char *passphrase);
|
const char *passphrase);
|
||||||
@@ -841,7 +816,6 @@ LIBSSH_API int ssh_buffer_add_data(ssh_buffer buffer, const void *data, uint32_t
|
|||||||
LIBSSH_API uint32_t ssh_buffer_get_data(ssh_buffer buffer, void *data, uint32_t requestedlen);
|
LIBSSH_API uint32_t ssh_buffer_get_data(ssh_buffer buffer, void *data, uint32_t requestedlen);
|
||||||
LIBSSH_API void *ssh_buffer_get(ssh_buffer buffer);
|
LIBSSH_API void *ssh_buffer_get(ssh_buffer buffer);
|
||||||
LIBSSH_API uint32_t ssh_buffer_get_len(ssh_buffer buffer);
|
LIBSSH_API uint32_t ssh_buffer_get_len(ssh_buffer buffer);
|
||||||
LIBSSH_API int ssh_session_set_disconnect_message(ssh_session session, const char *message);
|
|
||||||
|
|
||||||
#ifndef LIBSSH_LEGACY_0_4
|
#ifndef LIBSSH_LEGACY_0_4
|
||||||
#include "libssh/legacy.h"
|
#include "libssh/legacy.h"
|
||||||
|
|||||||
@@ -1,41 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2020 by Heiko Thiery
|
|
||||||
*
|
|
||||||
* This library is free software; you can redistribute it and/or
|
|
||||||
* modify it under the terms of the GNU Lesser General Public
|
|
||||||
* License as published by the Free Software Foundation; either
|
|
||||||
* version 2.1 of the License, or (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This library is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
* Lesser General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public
|
|
||||||
* License along with this library; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef _LIBSSH_VERSION_H
|
|
||||||
#define _LIBSSH_VERSION_H
|
|
||||||
|
|
||||||
/* libssh version macros */
|
|
||||||
#define SSH_VERSION_INT(a, b, c) ((a) << 16 | (b) << 8 | (c))
|
|
||||||
#define SSH_VERSION_DOT(a, b, c) a ##.## b ##.## c
|
|
||||||
#define SSH_VERSION(a, b, c) SSH_VERSION_DOT(a, b, c)
|
|
||||||
|
|
||||||
/* libssh version */
|
|
||||||
#define LIBSSH_VERSION_MAJOR @libssh_VERSION_MAJOR@
|
|
||||||
#define LIBSSH_VERSION_MINOR @libssh_VERSION_MINOR@
|
|
||||||
#define LIBSSH_VERSION_MICRO @libssh_VERSION_PATCH@
|
|
||||||
|
|
||||||
#define LIBSSH_VERSION_INT SSH_VERSION_INT(LIBSSH_VERSION_MAJOR, \
|
|
||||||
LIBSSH_VERSION_MINOR, \
|
|
||||||
LIBSSH_VERSION_MICRO)
|
|
||||||
#define LIBSSH_VERSION SSH_VERSION(LIBSSH_VERSION_MAJOR, \
|
|
||||||
LIBSSH_VERSION_MINOR, \
|
|
||||||
LIBSSH_VERSION_MICRO)
|
|
||||||
|
|
||||||
#endif /* _LIBSSH_VERSION_H */
|
|
||||||
@@ -369,11 +369,13 @@ public:
|
|||||||
return state;
|
return state;
|
||||||
}
|
}
|
||||||
void log(int priority, const char *format, ...){
|
void log(int priority, const char *format, ...){
|
||||||
|
char buffer[1024];
|
||||||
va_list va;
|
va_list va;
|
||||||
|
|
||||||
va_start(va, format);
|
va_start(va, format);
|
||||||
ssh_vlog(priority, "libsshpp", format, &va);
|
vsnprintf(buffer, sizeof(buffer), format, va);
|
||||||
va_end(va);
|
va_end(va);
|
||||||
|
_ssh_log(priority, "libsshpp", "%s", buffer);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** @brief copies options from a session to another
|
/** @brief copies options from a session to another
|
||||||
@@ -523,7 +525,7 @@ public:
|
|||||||
return ssh_channel_is_open(channel) != 0;
|
return ssh_channel_is_open(channel) != 0;
|
||||||
}
|
}
|
||||||
int openForward(const char *remotehost, int remoteport,
|
int openForward(const char *remotehost, int remoteport,
|
||||||
const char *sourcehost, int localport=0){
|
const char *sourcehost=NULL, int localport=0){
|
||||||
int err=ssh_channel_open_forward(channel,remotehost,remoteport,
|
int err=ssh_channel_open_forward(channel,remotehost,remoteport,
|
||||||
sourcehost, localport);
|
sourcehost, localport);
|
||||||
ssh_throw(err);
|
ssh_throw(err);
|
||||||
@@ -630,8 +632,8 @@ public:
|
|||||||
* @param is_stderr write should be done on the stderr channel (server only)
|
* @param is_stderr write should be done on the stderr channel (server only)
|
||||||
* @returns number of bytes written
|
* @returns number of bytes written
|
||||||
* @throws SshException in case of error
|
* @throws SshException in case of error
|
||||||
* @see ssh_channel_write
|
* @see channel_write
|
||||||
* @see ssh_channel_write_stderr
|
* @see channel_write_stderr
|
||||||
*/
|
*/
|
||||||
int write(const void *data, size_t len, bool is_stderr=false){
|
int write(const void *data, size_t len, bool is_stderr=false){
|
||||||
int ret;
|
int ret;
|
||||||
@@ -669,7 +671,7 @@ private:
|
|||||||
|
|
||||||
inline Channel *Session::acceptForward(int timeout_ms){
|
inline Channel *Session::acceptForward(int timeout_ms){
|
||||||
ssh_channel forward =
|
ssh_channel forward =
|
||||||
ssh_channel_open_forward_port(c_session, timeout_ms, NULL, NULL, NULL);
|
ssh_channel_accept_forward(c_session, timeout_ms, NULL);
|
||||||
ssh_throw_null(c_session,forward);
|
ssh_throw_null(c_session,forward);
|
||||||
Channel *newchan = new Channel(*this,forward);
|
Channel *newchan = new Channel(*this,forward);
|
||||||
return newchan;
|
return newchan;
|
||||||
|
|||||||
@@ -28,8 +28,7 @@ struct ssh_auth_request {
|
|||||||
int method;
|
int method;
|
||||||
char *password;
|
char *password;
|
||||||
struct ssh_key_struct *pubkey;
|
struct ssh_key_struct *pubkey;
|
||||||
char *sigtype;
|
char signature_state;
|
||||||
enum ssh_publickey_state_e signature_state;
|
|
||||||
char kbdint_response;
|
char kbdint_response;
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -103,5 +102,6 @@ SSH_PACKET_CALLBACK(ssh_packet_userauth_request);
|
|||||||
int ssh_message_handle_channel_request(ssh_session session, ssh_channel channel, ssh_buffer packet,
|
int ssh_message_handle_channel_request(ssh_session session, ssh_channel channel, ssh_buffer packet,
|
||||||
const char *request, uint8_t want_reply);
|
const char *request, uint8_t want_reply);
|
||||||
ssh_message ssh_message_pop_head(ssh_session session);
|
ssh_message ssh_message_pop_head(ssh_session session);
|
||||||
|
int ssh_message_channel_request_open_reply_accept_channel(ssh_message msg, ssh_channel chan);
|
||||||
|
|
||||||
#endif /* MESSAGES_H_ */
|
#endif /* MESSAGES_H_ */
|
||||||
|
|||||||
@@ -26,7 +26,6 @@
|
|||||||
char *ssh_get_user_home_dir(void);
|
char *ssh_get_user_home_dir(void);
|
||||||
char *ssh_get_local_username(void);
|
char *ssh_get_local_username(void);
|
||||||
int ssh_file_readaccess_ok(const char *file);
|
int ssh_file_readaccess_ok(const char *file);
|
||||||
int ssh_dir_writeable(const char *path);
|
|
||||||
|
|
||||||
char *ssh_path_expand_tilde(const char *d);
|
char *ssh_path_expand_tilde(const char *d);
|
||||||
char *ssh_path_expand_escape(ssh_session session, const char *s);
|
char *ssh_path_expand_escape(ssh_session session, const char *s);
|
||||||
@@ -51,12 +50,6 @@ struct ssh_timestamp {
|
|||||||
long useconds;
|
long useconds;
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ssh_quote_state_e {
|
|
||||||
NO_QUOTE,
|
|
||||||
SINGLE_QUOTE,
|
|
||||||
DOUBLE_QUOTE
|
|
||||||
};
|
|
||||||
|
|
||||||
struct ssh_list *ssh_list_new(void);
|
struct ssh_list *ssh_list_new(void);
|
||||||
void ssh_list_free(struct ssh_list *list);
|
void ssh_list_free(struct ssh_list *list);
|
||||||
struct ssh_iterator *ssh_list_get_iterator(const struct ssh_list *list);
|
struct ssh_iterator *ssh_list_get_iterator(const struct ssh_list *list);
|
||||||
@@ -81,7 +74,7 @@ const void *_ssh_list_pop_head(struct ssh_list *list);
|
|||||||
#define ssh_list_pop_head(type, ssh_list)\
|
#define ssh_list_pop_head(type, ssh_list)\
|
||||||
((type)_ssh_list_pop_head(ssh_list))
|
((type)_ssh_list_pop_head(ssh_list))
|
||||||
|
|
||||||
int ssh_make_milliseconds(unsigned long sec, unsigned long usec);
|
int ssh_make_milliseconds(long sec, long usec);
|
||||||
void ssh_timestamp_init(struct ssh_timestamp *ts);
|
void ssh_timestamp_init(struct ssh_timestamp *ts);
|
||||||
int ssh_timeout_elapsed(struct ssh_timestamp *ts, int timeout);
|
int ssh_timeout_elapsed(struct ssh_timestamp *ts, int timeout);
|
||||||
int ssh_timeout_update(struct ssh_timestamp *ts, int timeout);
|
int ssh_timeout_update(struct ssh_timestamp *ts, int timeout);
|
||||||
@@ -90,13 +83,4 @@ int ssh_match_group(const char *group, const char *object);
|
|||||||
|
|
||||||
void uint64_inc(unsigned char *counter);
|
void uint64_inc(unsigned char *counter);
|
||||||
|
|
||||||
void ssh_log_hexdump(const char *descr, const unsigned char *what, size_t len);
|
|
||||||
|
|
||||||
int ssh_mkdirs(const char *pathname, mode_t mode);
|
|
||||||
|
|
||||||
int ssh_quote_file_name(const char *file_name, char *buf, size_t buf_len);
|
|
||||||
int ssh_newline_vis(const char *string, char *buf, size_t buf_len);
|
|
||||||
int ssh_tmpname(char *template);
|
|
||||||
|
|
||||||
char *ssh_strreplace(const char *src, const char *pattern, const char *repl);
|
|
||||||
#endif /* MISC_H_ */
|
#endif /* MISC_H_ */
|
||||||
|
|||||||
@@ -22,7 +22,6 @@
|
|||||||
#define _OPTIONS_H
|
#define _OPTIONS_H
|
||||||
|
|
||||||
int ssh_config_parse_file(ssh_session session, const char *filename);
|
int ssh_config_parse_file(ssh_session session, const char *filename);
|
||||||
int ssh_config_parse_string(ssh_session session, const char *input);
|
|
||||||
int ssh_options_set_algo(ssh_session session,
|
int ssh_options_set_algo(ssh_session session,
|
||||||
enum ssh_kex_types_e algo,
|
enum ssh_kex_types_e algo,
|
||||||
const char *list);
|
const char *list);
|
||||||
|
|||||||
@@ -67,7 +67,7 @@ int ssh_packet_send_unimplemented(ssh_session session, uint32_t seqnum);
|
|||||||
int ssh_packet_parse_type(ssh_session session);
|
int ssh_packet_parse_type(ssh_session session);
|
||||||
//int packet_flush(ssh_session session, int enforce_blocking);
|
//int packet_flush(ssh_session session, int enforce_blocking);
|
||||||
|
|
||||||
size_t ssh_packet_socket_callback(const void *data, size_t len, void *user);
|
int ssh_packet_socket_callback(const void *data, size_t len, void *user);
|
||||||
void ssh_packet_register_socket_callback(ssh_session session, struct ssh_socket_struct *s);
|
void ssh_packet_register_socket_callback(ssh_session session, struct ssh_socket_struct *s);
|
||||||
void ssh_packet_set_callbacks(ssh_session session, ssh_packet_callbacks callbacks);
|
void ssh_packet_set_callbacks(ssh_session session, ssh_packet_callbacks callbacks);
|
||||||
void ssh_packet_remove_callbacks(ssh_session session, ssh_packet_callbacks callbacks);
|
void ssh_packet_remove_callbacks(ssh_session session, ssh_packet_callbacks callbacks);
|
||||||
@@ -80,12 +80,8 @@ int ssh_packet_decrypt(ssh_session session, uint8_t *destination, uint8_t *sourc
|
|||||||
size_t start, size_t encrypted_size);
|
size_t start, size_t encrypted_size);
|
||||||
unsigned char *ssh_packet_encrypt(ssh_session session,
|
unsigned char *ssh_packet_encrypt(ssh_session session,
|
||||||
void *packet,
|
void *packet,
|
||||||
size_t len);
|
unsigned int len);
|
||||||
int ssh_packet_hmac_verify(ssh_session session, const void *data, size_t len,
|
int ssh_packet_hmac_verify(ssh_session session,ssh_buffer buffer,
|
||||||
unsigned char *mac, enum ssh_hmac_e type);
|
unsigned char *mac, enum ssh_hmac_e type);
|
||||||
int ssh_packet_set_newkeys(ssh_session session,
|
|
||||||
enum ssh_crypto_direction_e direction);
|
|
||||||
struct ssh_crypto_struct *ssh_packet_get_current_crypto(ssh_session session,
|
|
||||||
enum ssh_crypto_direction_e direction);
|
|
||||||
|
|
||||||
#endif /* PACKET_H_ */
|
#endif /* PACKET_H_ */
|
||||||
|
|||||||
@@ -21,7 +21,6 @@
|
|||||||
#ifndef PKI_H_
|
#ifndef PKI_H_
|
||||||
#define PKI_H_
|
#define PKI_H_
|
||||||
|
|
||||||
#include <stdint.h>
|
|
||||||
#include "libssh/priv.h"
|
#include "libssh/priv.h"
|
||||||
#ifdef HAVE_OPENSSL_EC_H
|
#ifdef HAVE_OPENSSL_EC_H
|
||||||
#include <openssl/ec.h>
|
#include <openssl/ec.h>
|
||||||
@@ -29,19 +28,9 @@
|
|||||||
#ifdef HAVE_OPENSSL_ECDSA_H
|
#ifdef HAVE_OPENSSL_ECDSA_H
|
||||||
#include <openssl/ecdsa.h>
|
#include <openssl/ecdsa.h>
|
||||||
#endif
|
#endif
|
||||||
#ifdef HAVE_LIBCRYPTO
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
#endif
|
|
||||||
#include "libssh/crypto.h"
|
#include "libssh/crypto.h"
|
||||||
#if defined(HAVE_LIBCRYPTO) && defined(HAVE_OPENSSL_ED25519)
|
|
||||||
/* If using OpenSSL implementation, define the signature lenght which would be
|
|
||||||
* defined in libssh/ed25519.h otherwise */
|
|
||||||
#define ED25519_SIG_LEN 64
|
|
||||||
#else
|
|
||||||
#include "libssh/ed25519.h"
|
#include "libssh/ed25519.h"
|
||||||
#endif
|
|
||||||
/* This definition is used for both OpenSSL and internal implementations */
|
|
||||||
#define ED25519_KEY_LEN 32
|
|
||||||
|
|
||||||
#define MAX_PUBKEY_SIZE 0x100000 /* 1M */
|
#define MAX_PUBKEY_SIZE 0x100000 /* 1M */
|
||||||
#define MAX_PRIVKEY_SIZE 0x400000 /* 4M */
|
#define MAX_PRIVKEY_SIZE 0x400000 /* 4M */
|
||||||
@@ -49,7 +38,6 @@
|
|||||||
#define SSH_KEY_FLAG_EMPTY 0x0
|
#define SSH_KEY_FLAG_EMPTY 0x0
|
||||||
#define SSH_KEY_FLAG_PUBLIC 0x0001
|
#define SSH_KEY_FLAG_PUBLIC 0x0001
|
||||||
#define SSH_KEY_FLAG_PRIVATE 0x0002
|
#define SSH_KEY_FLAG_PRIVATE 0x0002
|
||||||
#define SSH_KEY_FLAG_PKCS11_URI 0x0004
|
|
||||||
|
|
||||||
struct ssh_key_struct {
|
struct ssh_key_struct {
|
||||||
enum ssh_keytypes_e type;
|
enum ssh_keytypes_e type;
|
||||||
@@ -65,31 +53,16 @@ struct ssh_key_struct {
|
|||||||
mbedtls_ecdsa_context *ecdsa;
|
mbedtls_ecdsa_context *ecdsa;
|
||||||
void *dsa;
|
void *dsa;
|
||||||
#elif defined(HAVE_LIBCRYPTO)
|
#elif defined(HAVE_LIBCRYPTO)
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
||||||
DSA *dsa;
|
DSA *dsa;
|
||||||
RSA *rsa;
|
RSA *rsa;
|
||||||
#endif /* OPENSSL_VERSION_NUMBER */
|
|
||||||
/* TODO Change to new API when the OpenSSL will support export of uncompressed EC keys
|
|
||||||
* https://github.com/openssl/openssl/pull/16624
|
|
||||||
* Move into the #if above
|
|
||||||
*/
|
|
||||||
# if defined(HAVE_OPENSSL_ECC)
|
# if defined(HAVE_OPENSSL_ECC)
|
||||||
EC_KEY *ecdsa;
|
EC_KEY *ecdsa;
|
||||||
# else
|
# else
|
||||||
void *ecdsa;
|
void *ecdsa;
|
||||||
# endif /* HAVE_OPENSSL_EC_H */
|
# endif /* HAVE_OPENSSL_EC_H */
|
||||||
/* This holds either ENGINE key for PKCS#11 support or just key in
|
|
||||||
* high-level format required by OpenSSL 3.0 */
|
|
||||||
EVP_PKEY *key;
|
|
||||||
#endif /* HAVE_LIBGCRYPT */
|
#endif /* HAVE_LIBGCRYPT */
|
||||||
#if defined(HAVE_LIBCRYPTO) && defined(HAVE_OPENSSL_ED25519)
|
|
||||||
uint8_t *ed25519_pubkey;
|
|
||||||
uint8_t *ed25519_privkey;
|
|
||||||
#else
|
|
||||||
ed25519_pubkey *ed25519_pubkey;
|
ed25519_pubkey *ed25519_pubkey;
|
||||||
ed25519_privkey *ed25519_privkey;
|
ed25519_privkey *ed25519_privkey;
|
||||||
#endif
|
|
||||||
ssh_string sk_application;
|
|
||||||
void *cert;
|
void *cert;
|
||||||
enum ssh_keytypes_e cert_type;
|
enum ssh_keytypes_e cert_type;
|
||||||
};
|
};
|
||||||
@@ -102,50 +75,35 @@ struct ssh_signature_struct {
|
|||||||
gcry_sexp_t dsa_sig;
|
gcry_sexp_t dsa_sig;
|
||||||
gcry_sexp_t rsa_sig;
|
gcry_sexp_t rsa_sig;
|
||||||
gcry_sexp_t ecdsa_sig;
|
gcry_sexp_t ecdsa_sig;
|
||||||
|
#elif defined(HAVE_LIBCRYPTO)
|
||||||
|
DSA_SIG *dsa_sig;
|
||||||
|
ssh_string rsa_sig;
|
||||||
|
# ifdef HAVE_OPENSSL_ECC
|
||||||
|
ECDSA_SIG *ecdsa_sig;
|
||||||
|
# else
|
||||||
|
void *ecdsa_sig;
|
||||||
|
# endif
|
||||||
#elif defined(HAVE_LIBMBEDCRYPTO)
|
#elif defined(HAVE_LIBMBEDCRYPTO)
|
||||||
ssh_string rsa_sig;
|
ssh_string rsa_sig;
|
||||||
struct mbedtls_ecdsa_sig ecdsa_sig;
|
struct mbedtls_ecdsa_sig ecdsa_sig;
|
||||||
#endif /* HAVE_LIBGCRYPT */
|
#endif /* HAVE_LIBGCRYPT */
|
||||||
#if !defined(HAVE_LIBCRYPTO) || !defined(HAVE_OPENSSL_ED25519)
|
|
||||||
ed25519_signature *ed25519_sig;
|
ed25519_signature *ed25519_sig;
|
||||||
#endif
|
|
||||||
ssh_string raw_sig;
|
|
||||||
|
|
||||||
/* Security Key specific additions */
|
|
||||||
uint8_t sk_flags;
|
|
||||||
uint32_t sk_counter;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
typedef struct ssh_signature_struct *ssh_signature;
|
typedef struct ssh_signature_struct *ssh_signature;
|
||||||
|
|
||||||
/* SSH Key Functions */
|
/* SSH Key Functions */
|
||||||
|
ssh_key ssh_key_dup(const ssh_key key);
|
||||||
void ssh_key_clean (ssh_key key);
|
void ssh_key_clean (ssh_key key);
|
||||||
|
|
||||||
const char *
|
const char *
|
||||||
ssh_key_get_signature_algorithm(ssh_session session,
|
ssh_key_get_signature_algorithm(ssh_session session,
|
||||||
enum ssh_keytypes_e type);
|
enum ssh_keytypes_e type);
|
||||||
enum ssh_keytypes_e ssh_key_type_from_signature_name(const char *name);
|
enum ssh_keytypes_e ssh_key_type_from_signature_name(const char *name);
|
||||||
enum ssh_keytypes_e ssh_key_type_plain(enum ssh_keytypes_e type);
|
|
||||||
enum ssh_digest_e ssh_key_type_to_hash(ssh_session session,
|
|
||||||
enum ssh_keytypes_e type);
|
|
||||||
enum ssh_digest_e ssh_key_hash_from_name(const char *name);
|
|
||||||
|
|
||||||
#define is_ecdsa_key_type(t) \
|
|
||||||
((t) >= SSH_KEYTYPE_ECDSA_P256 && (t) <= SSH_KEYTYPE_ECDSA_P521)
|
|
||||||
|
|
||||||
#define is_cert_type(kt)\
|
|
||||||
((kt) == SSH_KEYTYPE_DSS_CERT01 ||\
|
|
||||||
(kt) == SSH_KEYTYPE_RSA_CERT01 ||\
|
|
||||||
(kt) == SSH_KEYTYPE_SK_ECDSA_CERT01 ||\
|
|
||||||
(kt) == SSH_KEYTYPE_SK_ED25519_CERT01 ||\
|
|
||||||
((kt) >= SSH_KEYTYPE_ECDSA_P256_CERT01 &&\
|
|
||||||
(kt) <= SSH_KEYTYPE_ED25519_CERT01))
|
|
||||||
|
|
||||||
/* SSH Signature Functions */
|
/* SSH Signature Functions */
|
||||||
ssh_signature ssh_signature_new(void);
|
ssh_signature ssh_signature_new(void);
|
||||||
void ssh_signature_free(ssh_signature sign);
|
void ssh_signature_free(ssh_signature sign);
|
||||||
#define SSH_SIGNATURE_FREE(x) \
|
|
||||||
do { ssh_signature_free(x); x = NULL; } while(0)
|
|
||||||
|
|
||||||
int ssh_pki_export_signature_blob(const ssh_signature sign,
|
int ssh_pki_export_signature_blob(const ssh_signature sign,
|
||||||
ssh_string *sign_blob);
|
ssh_string *sign_blob);
|
||||||
@@ -155,7 +113,7 @@ int ssh_pki_import_signature_blob(const ssh_string sig_blob,
|
|||||||
int ssh_pki_signature_verify(ssh_session session,
|
int ssh_pki_signature_verify(ssh_session session,
|
||||||
ssh_signature sig,
|
ssh_signature sig,
|
||||||
const ssh_key key,
|
const ssh_key key,
|
||||||
const unsigned char *digest,
|
unsigned char *digest,
|
||||||
size_t dlen);
|
size_t dlen);
|
||||||
|
|
||||||
/* SSH Public Key Functions */
|
/* SSH Public Key Functions */
|
||||||
@@ -170,26 +128,16 @@ int ssh_pki_import_cert_blob(const ssh_string cert_blob,
|
|||||||
|
|
||||||
/* SSH Signing Functions */
|
/* SSH Signing Functions */
|
||||||
ssh_string ssh_pki_do_sign(ssh_session session, ssh_buffer sigbuf,
|
ssh_string ssh_pki_do_sign(ssh_session session, ssh_buffer sigbuf,
|
||||||
const ssh_key privatekey, enum ssh_digest_e hash_type);
|
const ssh_key privatekey);
|
||||||
ssh_string ssh_pki_do_sign_agent(ssh_session session,
|
ssh_string ssh_pki_do_sign_agent(ssh_session session,
|
||||||
struct ssh_buffer_struct *buf,
|
struct ssh_buffer_struct *buf,
|
||||||
const ssh_key pubkey);
|
const ssh_key pubkey);
|
||||||
ssh_string ssh_srv_pki_do_sign_sessionid(ssh_session session,
|
ssh_string ssh_srv_pki_do_sign_sessionid(ssh_session session,
|
||||||
const ssh_key privkey,
|
const ssh_key privkey);
|
||||||
const enum ssh_digest_e digest);
|
|
||||||
|
|
||||||
/* Temporary functions, to be removed after migration to ssh_key */
|
/* Temporary functions, to be removed after migration to ssh_key */
|
||||||
ssh_public_key ssh_pki_convert_key_to_publickey(const ssh_key key);
|
ssh_public_key ssh_pki_convert_key_to_publickey(const ssh_key key);
|
||||||
ssh_private_key ssh_pki_convert_key_to_privatekey(const ssh_key key);
|
ssh_private_key ssh_pki_convert_key_to_privatekey(const ssh_key key);
|
||||||
|
|
||||||
int ssh_key_algorithm_allowed(ssh_session session, const char *type);
|
int ssh_key_algorithm_allowed(ssh_session session, const char *type);
|
||||||
bool ssh_key_size_allowed(ssh_session session, ssh_key key);
|
|
||||||
|
|
||||||
/* Return the key size in bits */
|
|
||||||
int ssh_key_size(ssh_key key);
|
|
||||||
|
|
||||||
/* PKCS11 URI function to check if filename is a path or a PKCS11 URI */
|
|
||||||
bool ssh_pki_is_uri(const char *filename);
|
|
||||||
char *ssh_pki_export_pub_uri_from_priv_uri(const char *priv_uri);
|
|
||||||
|
|
||||||
#endif /* PKI_H_ */
|
#endif /* PKI_H_ */
|
||||||
|
|||||||
@@ -43,14 +43,6 @@ int bcrypt_pbkdf(const char *pass,
|
|||||||
/* Magic defined in OpenSSH/PROTOCOL.key */
|
/* Magic defined in OpenSSH/PROTOCOL.key */
|
||||||
#define OPENSSH_AUTH_MAGIC "openssh-key-v1"
|
#define OPENSSH_AUTH_MAGIC "openssh-key-v1"
|
||||||
|
|
||||||
/* Determine type of ssh key. */
|
|
||||||
enum ssh_key_e {
|
|
||||||
SSH_KEY_PUBLIC = 0,
|
|
||||||
SSH_KEY_PRIVATE
|
|
||||||
};
|
|
||||||
|
|
||||||
void pki_key_clean(ssh_key key);
|
|
||||||
|
|
||||||
int pki_key_ecdsa_nid_from_name(const char *name);
|
int pki_key_ecdsa_nid_from_name(const char *name);
|
||||||
const char *pki_key_ecdsa_nid_to_name(int nid);
|
const char *pki_key_ecdsa_nid_to_name(int nid);
|
||||||
const char *ssh_key_signature_to_char(enum ssh_keytypes_e type,
|
const char *ssh_key_signature_to_char(enum ssh_keytypes_e type,
|
||||||
@@ -69,8 +61,6 @@ int pki_key_compare(const ssh_key k1,
|
|||||||
const ssh_key k2,
|
const ssh_key k2,
|
||||||
enum ssh_keycmp_e what);
|
enum ssh_keycmp_e what);
|
||||||
|
|
||||||
int pki_key_check_hash_compatible(ssh_key key,
|
|
||||||
enum ssh_digest_e hash_type);
|
|
||||||
/* SSH Private Key Functions */
|
/* SSH Private Key Functions */
|
||||||
enum ssh_keytypes_e pki_privatekey_type_from_string(const char *privkey);
|
enum ssh_keytypes_e pki_privatekey_type_from_string(const char *privkey);
|
||||||
ssh_key pki_private_key_from_base64(const char *b64_key,
|
ssh_key pki_private_key_from_base64(const char *b64_key,
|
||||||
@@ -119,29 +109,30 @@ int pki_privkey_build_ecdsa(ssh_key key,
|
|||||||
ssh_string pki_publickey_to_blob(const ssh_key key);
|
ssh_string pki_publickey_to_blob(const ssh_key key);
|
||||||
|
|
||||||
/* SSH Signature Functions */
|
/* SSH Signature Functions */
|
||||||
ssh_signature pki_sign_data(const ssh_key privkey,
|
|
||||||
enum ssh_digest_e hash_type,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t input_len);
|
|
||||||
int pki_verify_data_signature(ssh_signature signature,
|
|
||||||
const ssh_key pubkey,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t input_len);
|
|
||||||
ssh_string pki_signature_to_blob(const ssh_signature sign);
|
ssh_string pki_signature_to_blob(const ssh_signature sign);
|
||||||
ssh_signature pki_signature_from_blob(const ssh_key pubkey,
|
ssh_signature pki_signature_from_blob(const ssh_key pubkey,
|
||||||
const ssh_string sig_blob,
|
const ssh_string sig_blob,
|
||||||
enum ssh_keytypes_e type,
|
enum ssh_keytypes_e type,
|
||||||
enum ssh_digest_e hash_type);
|
enum ssh_digest_e hash_type);
|
||||||
|
int pki_signature_verify(ssh_session session,
|
||||||
|
const ssh_signature sig,
|
||||||
|
const ssh_key key,
|
||||||
|
const unsigned char *hash,
|
||||||
|
size_t hlen);
|
||||||
|
|
||||||
/* SSH Signing Functions */
|
/* SSH Signing Functions */
|
||||||
ssh_signature pki_do_sign(const ssh_key privkey,
|
#define pki_do_sign(key, hash, hlen) \
|
||||||
const unsigned char *input,
|
pki_do_sign_hash(key, hash, hlen, SSH_DIGEST_AUTO)
|
||||||
size_t input_len,
|
|
||||||
enum ssh_digest_e hash_type);
|
|
||||||
ssh_signature pki_do_sign_hash(const ssh_key privkey,
|
ssh_signature pki_do_sign_hash(const ssh_key privkey,
|
||||||
const unsigned char *hash,
|
const unsigned char *hash,
|
||||||
size_t hlen,
|
size_t hlen,
|
||||||
enum ssh_digest_e hash_type);
|
enum ssh_digest_e hash_type);
|
||||||
|
#define pki_do_sign_sessionid(key, hash, hlen) \
|
||||||
|
pki_do_sign_sessionid_hash(key, hash, hlen, SSH_DIGEST_AUTO)
|
||||||
|
ssh_signature pki_do_sign_sessionid_hash(const ssh_key key,
|
||||||
|
const unsigned char *hash,
|
||||||
|
size_t hlen,
|
||||||
|
enum ssh_digest_e hash_type);
|
||||||
int pki_ed25519_sign(const ssh_key privkey, ssh_signature sig,
|
int pki_ed25519_sign(const ssh_key privkey, ssh_signature sig,
|
||||||
const unsigned char *hash, size_t hlen);
|
const unsigned char *hash, size_t hlen);
|
||||||
int pki_ed25519_verify(const ssh_key pubkey, ssh_signature sig,
|
int pki_ed25519_verify(const ssh_key pubkey, ssh_signature sig,
|
||||||
@@ -151,8 +142,8 @@ int pki_ed25519_key_cmp(const ssh_key k1,
|
|||||||
enum ssh_keycmp_e what);
|
enum ssh_keycmp_e what);
|
||||||
int pki_ed25519_key_dup(ssh_key new, const ssh_key key);
|
int pki_ed25519_key_dup(ssh_key new, const ssh_key key);
|
||||||
int pki_ed25519_public_key_to_blob(ssh_buffer buffer, ssh_key key);
|
int pki_ed25519_public_key_to_blob(ssh_buffer buffer, ssh_key key);
|
||||||
ssh_string pki_ed25519_signature_to_blob(ssh_signature sig);
|
ssh_string pki_ed25519_sig_to_blob(ssh_signature sig);
|
||||||
int pki_signature_from_ed25519_blob(ssh_signature sig, ssh_string sig_blob);
|
int pki_ed25519_sig_from_blob(ssh_signature sig, ssh_string sig_blob);
|
||||||
int pki_privkey_build_ed25519(ssh_key key,
|
int pki_privkey_build_ed25519(ssh_key key,
|
||||||
ssh_string pubkey,
|
ssh_string pubkey,
|
||||||
ssh_string privkey);
|
ssh_string privkey);
|
||||||
@@ -164,8 +155,4 @@ ssh_key ssh_pki_openssh_privkey_import(const char *text_key,
|
|||||||
ssh_string ssh_pki_openssh_privkey_export(const ssh_key privkey,
|
ssh_string ssh_pki_openssh_privkey_export(const ssh_key privkey,
|
||||||
const char *passphrase, ssh_auth_callback auth_fn, void *auth_data);
|
const char *passphrase, ssh_auth_callback auth_fn, void *auth_data);
|
||||||
|
|
||||||
/* URI Function */
|
|
||||||
int pki_uri_import(const char *uri_name, ssh_key *key, enum ssh_key_e key_type);
|
|
||||||
|
|
||||||
bool ssh_key_size_allowed_rsa(int min_size, ssh_key key);
|
|
||||||
#endif /* PKI_PRIV_H_ */
|
#endif /* PKI_PRIV_H_ */
|
||||||
|
|||||||
@@ -5,7 +5,9 @@
|
|||||||
|
|
||||||
#ifndef POLY1305_H
|
#ifndef POLY1305_H
|
||||||
#define POLY1305_H
|
#define POLY1305_H
|
||||||
#include "libssh/chacha20-poly1305-common.h"
|
|
||||||
|
#define POLY1305_KEYLEN 32
|
||||||
|
#define POLY1305_TAGLEN 16
|
||||||
|
|
||||||
void poly1305_auth(uint8_t out[POLY1305_TAGLEN], const uint8_t *m, size_t inlen,
|
void poly1305_auth(uint8_t out[POLY1305_TAGLEN], const uint8_t *m, size_t inlen,
|
||||||
const uint8_t key[POLY1305_KEYLEN])
|
const uint8_t key[POLY1305_KEYLEN])
|
||||||
|
|||||||
@@ -29,11 +29,9 @@
|
|||||||
#ifndef _LIBSSH_PRIV_H
|
#ifndef _LIBSSH_PRIV_H
|
||||||
#define _LIBSSH_PRIV_H
|
#define _LIBSSH_PRIV_H
|
||||||
|
|
||||||
#include <limits.h>
|
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdbool.h>
|
|
||||||
|
|
||||||
#if !defined(HAVE_STRTOULL)
|
#if !defined(HAVE_STRTOULL)
|
||||||
# if defined(HAVE___STRTOULL)
|
# if defined(HAVE___STRTOULL)
|
||||||
@@ -67,6 +65,11 @@ char *strndup(const char *s, size_t n);
|
|||||||
|
|
||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
|
|
||||||
|
/* Imitate define of inttypes.h */
|
||||||
|
# ifndef PRIdS
|
||||||
|
# define PRIdS "Id"
|
||||||
|
# endif
|
||||||
|
|
||||||
# ifndef PRIu64
|
# ifndef PRIu64
|
||||||
# if __WORDSIZE == 64
|
# if __WORDSIZE == 64
|
||||||
# define PRIu64 "lu"
|
# define PRIu64 "lu"
|
||||||
@@ -75,22 +78,6 @@ char *strndup(const char *s, size_t n);
|
|||||||
# endif /* __WORDSIZE */
|
# endif /* __WORDSIZE */
|
||||||
# endif /* PRIu64 */
|
# endif /* PRIu64 */
|
||||||
|
|
||||||
# ifndef PRIu32
|
|
||||||
# define PRIu32 "u"
|
|
||||||
# endif /* PRIu32 */
|
|
||||||
|
|
||||||
# ifndef PRIx64
|
|
||||||
# if __WORDSIZE == 64
|
|
||||||
# define PRIx64 "lx"
|
|
||||||
# else
|
|
||||||
# define PRIx64 "llx"
|
|
||||||
# endif /* __WORDSIZE */
|
|
||||||
# endif /* PRIx64 */
|
|
||||||
|
|
||||||
# ifndef PRIx32
|
|
||||||
# define PRIx32 "x"
|
|
||||||
# endif /* PRIx32 */
|
|
||||||
|
|
||||||
# ifdef _MSC_VER
|
# ifdef _MSC_VER
|
||||||
# include <stdio.h>
|
# include <stdio.h>
|
||||||
# include <stdarg.h> /* va_copy define check */
|
# include <stdarg.h> /* va_copy define check */
|
||||||
@@ -152,15 +139,14 @@ char *strndup(const char *s, size_t n);
|
|||||||
# endif /* _MSC_VER */
|
# endif /* _MSC_VER */
|
||||||
|
|
||||||
struct timeval;
|
struct timeval;
|
||||||
int ssh_gettimeofday(struct timeval *__p, void *__t);
|
int gettimeofday(struct timeval *__p, void *__t);
|
||||||
|
|
||||||
#define gettimeofday ssh_gettimeofday
|
|
||||||
|
|
||||||
#define _XCLOSESOCKET closesocket
|
#define _XCLOSESOCKET closesocket
|
||||||
|
|
||||||
#else /* _WIN32 */
|
#else /* _WIN32 */
|
||||||
|
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
|
#define PRIdS "zd"
|
||||||
|
|
||||||
#define _XCLOSESOCKET close
|
#define _XCLOSESOCKET close
|
||||||
|
|
||||||
@@ -170,15 +156,7 @@ int ssh_gettimeofday(struct timeval *__p, void *__t);
|
|||||||
#include "libssh/callbacks.h"
|
#include "libssh/callbacks.h"
|
||||||
|
|
||||||
/* some constants */
|
/* some constants */
|
||||||
#ifndef PATH_MAX
|
#ifndef MAX_PACKAT_LEN
|
||||||
#ifdef MAX_PATH
|
|
||||||
#define PATH_MAX MAX_PATH
|
|
||||||
#else
|
|
||||||
#define PATH_MAX 4096
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef MAX_PACKET_LEN
|
|
||||||
#define MAX_PACKET_LEN 262144
|
#define MAX_PACKET_LEN 262144
|
||||||
#endif
|
#endif
|
||||||
#ifndef ERROR_BUFFERLEN
|
#ifndef ERROR_BUFFERLEN
|
||||||
@@ -227,17 +205,7 @@ int ssh_gettimeofday(struct timeval *__p, void *__t);
|
|||||||
struct ssh_common_struct;
|
struct ssh_common_struct;
|
||||||
struct ssh_kex_struct;
|
struct ssh_kex_struct;
|
||||||
|
|
||||||
enum ssh_digest_e {
|
int ssh_get_key_params(ssh_session session, ssh_key *privkey);
|
||||||
SSH_DIGEST_AUTO=0,
|
|
||||||
SSH_DIGEST_SHA1=1,
|
|
||||||
SSH_DIGEST_SHA256,
|
|
||||||
SSH_DIGEST_SHA384,
|
|
||||||
SSH_DIGEST_SHA512,
|
|
||||||
};
|
|
||||||
|
|
||||||
int ssh_get_key_params(ssh_session session,
|
|
||||||
ssh_key *privkey,
|
|
||||||
enum ssh_digest_e *digest);
|
|
||||||
|
|
||||||
/* LOGGING */
|
/* LOGGING */
|
||||||
void ssh_log_function(int verbosity,
|
void ssh_log_function(int verbosity,
|
||||||
@@ -288,12 +256,14 @@ int ssh_auth_reply_success(ssh_session session, int partial);
|
|||||||
int ssh_send_banner(ssh_session session, int is_server);
|
int ssh_send_banner(ssh_session session, int is_server);
|
||||||
|
|
||||||
/* connect.c */
|
/* connect.c */
|
||||||
|
socket_t ssh_connect_host(ssh_session session, const char *host,const char
|
||||||
|
*bind_addr, int port, long timeout, long usec);
|
||||||
socket_t ssh_connect_host_nonblocking(ssh_session session, const char *host,
|
socket_t ssh_connect_host_nonblocking(ssh_session session, const char *host,
|
||||||
const char *bind_addr, int port);
|
const char *bind_addr, int port);
|
||||||
|
|
||||||
/* in base64.c */
|
/* in base64.c */
|
||||||
ssh_buffer base64_to_bin(const char *source);
|
ssh_buffer base64_to_bin(const char *source);
|
||||||
uint8_t *bin_to_base64(const uint8_t *source, size_t len);
|
unsigned char *bin_to_base64(const unsigned char *source, int len);
|
||||||
|
|
||||||
/* gzip.c */
|
/* gzip.c */
|
||||||
int compress_buffer(ssh_session session,ssh_buffer buf);
|
int compress_buffer(ssh_session session,ssh_buffer buf);
|
||||||
@@ -301,7 +271,7 @@ int decompress_buffer(ssh_session session,ssh_buffer buf, size_t maxlen);
|
|||||||
|
|
||||||
/* match.c */
|
/* match.c */
|
||||||
int match_pattern_list(const char *string, const char *pattern,
|
int match_pattern_list(const char *string, const char *pattern,
|
||||||
size_t len, int dolower);
|
unsigned int len, int dolower);
|
||||||
int match_hostname(const char *host, const char *pattern, unsigned int len);
|
int match_hostname(const char *host, const char *pattern, unsigned int len);
|
||||||
|
|
||||||
/* connector.c */
|
/* connector.c */
|
||||||
@@ -352,8 +322,9 @@ void explicit_bzero(void *s, size_t n);
|
|||||||
#define discard_const_p(type, ptr) ((type *)discard_const(ptr))
|
#define discard_const_p(type, ptr) ((type *)discard_const(ptr))
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the argument count of variadic arguments
|
* Get the argument cound of variadic arguments
|
||||||
*/
|
*/
|
||||||
|
#ifdef HAVE_GCC_NARG_MACRO
|
||||||
/*
|
/*
|
||||||
* Since MSVC 2010 there is a bug in passing __VA_ARGS__ to subsequent
|
* Since MSVC 2010 there is a bug in passing __VA_ARGS__ to subsequent
|
||||||
* macros as a single token, which results in:
|
* macros as a single token, which results in:
|
||||||
@@ -363,7 +334,7 @@ void explicit_bzero(void *s, size_t n);
|
|||||||
#define VA_APPLY_VARIADIC_MACRO(macro, tuple) macro tuple
|
#define VA_APPLY_VARIADIC_MACRO(macro, tuple) macro tuple
|
||||||
|
|
||||||
#define __VA_NARG__(...) \
|
#define __VA_NARG__(...) \
|
||||||
(__VA_NARG_(__VA_ARGS__, __RSEQ_N()))
|
(__VA_NARG_(_0, ## __VA_ARGS__, __RSEQ_N()) - 1)
|
||||||
#define __VA_NARG_(...) \
|
#define __VA_NARG_(...) \
|
||||||
VA_APPLY_VARIADIC_MACRO(__VA_ARG_N, (__VA_ARGS__))
|
VA_APPLY_VARIADIC_MACRO(__VA_ARG_N, (__VA_ARGS__))
|
||||||
#define __VA_ARG_N( \
|
#define __VA_ARG_N( \
|
||||||
@@ -382,6 +353,10 @@ void explicit_bzero(void *s, size_t n);
|
|||||||
29, 28, 27, 26, 25, 24, 23, 22, 21, 20, \
|
29, 28, 27, 26, 25, 24, 23, 22, 21, 20, \
|
||||||
19, 18, 17, 16, 15, 14, 13, 12, 11, 10, \
|
19, 18, 17, 16, 15, 14, 13, 12, 11, 10, \
|
||||||
9, 8, 7, 6, 5, 4, 3, 2, 1, 0
|
9, 8, 7, 6, 5, 4, 3, 2, 1, 0
|
||||||
|
#else
|
||||||
|
/* clang does not support the above construction */
|
||||||
|
#define __VA_NARG__(...) (-1)
|
||||||
|
#endif
|
||||||
|
|
||||||
#define CLOSE_SOCKET(s) do { if ((s) != SSH_INVALID_SOCKET) { _XCLOSESOCKET(s); (s) = SSH_INVALID_SOCKET;} } while(0)
|
#define CLOSE_SOCKET(s) do { if ((s) != SSH_INVALID_SOCKET) { _XCLOSESOCKET(s); (s) = SSH_INVALID_SOCKET;} } while(0)
|
||||||
|
|
||||||
@@ -411,27 +386,22 @@ void explicit_bzero(void *s, size_t n);
|
|||||||
# endif /* HAVE_FALLTHROUGH_ATTRIBUTE */
|
# endif /* HAVE_FALLTHROUGH_ATTRIBUTE */
|
||||||
#endif /* FALL_THROUGH */
|
#endif /* FALL_THROUGH */
|
||||||
|
|
||||||
#ifndef __attr_unused__
|
#ifndef __unused__
|
||||||
# ifdef HAVE_UNUSED_ATTRIBUTE
|
# ifdef HAVE_UNUSED_ATTRIBUTE
|
||||||
# define __attr_unused__ __attribute__((unused))
|
# define __unused__ __attribute__((unused))
|
||||||
# else /* HAVE_UNUSED_ATTRIBUTE */
|
# else /* HAVE_UNUSED_ATTRIBUTE */
|
||||||
# define __attr_unused__
|
# define __unused__
|
||||||
# endif /* HAVE_UNUSED_ATTRIBUTE */
|
# endif /* HAVE_UNUSED_ATTRIBUTE */
|
||||||
#endif /* __attr_unused__ */
|
#endif /* __unused__ */
|
||||||
|
|
||||||
#ifndef UNUSED_PARAM
|
#ifndef UNUSED_PARAM
|
||||||
#define UNUSED_PARAM(param) param __attr_unused__
|
#define UNUSED_PARAM(param) param __unused__
|
||||||
#endif /* UNUSED_PARAM */
|
#endif /* UNUSED_PARAM */
|
||||||
|
|
||||||
#ifndef UNUSED_VAR
|
#ifndef UNUSED_VAR
|
||||||
#define UNUSED_VAR(var) __attr_unused__ var
|
#define UNUSED_VAR(var) __unused__ var
|
||||||
#endif /* UNUSED_VAR */
|
#endif /* UNUSED_VAR */
|
||||||
|
|
||||||
void ssh_agent_state_free(void *data);
|
void ssh_agent_state_free(void *data);
|
||||||
|
|
||||||
bool is_ssh_initialized(void);
|
|
||||||
|
|
||||||
#define SSH_ERRNO_MSG_MAX 1024
|
|
||||||
char *ssh_strerror(int err_num, char *buf, size_t buflen);
|
|
||||||
|
|
||||||
#endif /* _LIBSSH_PRIV_H */
|
#endif /* _LIBSSH_PRIV_H */
|
||||||
|
|||||||
@@ -46,18 +46,7 @@ enum ssh_bind_options_e {
|
|||||||
SSH_BIND_OPTIONS_LOG_VERBOSITY,
|
SSH_BIND_OPTIONS_LOG_VERBOSITY,
|
||||||
SSH_BIND_OPTIONS_LOG_VERBOSITY_STR,
|
SSH_BIND_OPTIONS_LOG_VERBOSITY_STR,
|
||||||
SSH_BIND_OPTIONS_ECDSAKEY,
|
SSH_BIND_OPTIONS_ECDSAKEY,
|
||||||
SSH_BIND_OPTIONS_IMPORT_KEY,
|
SSH_BIND_OPTIONS_IMPORT_KEY
|
||||||
SSH_BIND_OPTIONS_KEY_EXCHANGE,
|
|
||||||
SSH_BIND_OPTIONS_CIPHERS_C_S,
|
|
||||||
SSH_BIND_OPTIONS_CIPHERS_S_C,
|
|
||||||
SSH_BIND_OPTIONS_HMAC_C_S,
|
|
||||||
SSH_BIND_OPTIONS_HMAC_S_C,
|
|
||||||
SSH_BIND_OPTIONS_CONFIG_DIR,
|
|
||||||
SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES,
|
|
||||||
SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS,
|
|
||||||
SSH_BIND_OPTIONS_PROCESS_CONFIG,
|
|
||||||
SSH_BIND_OPTIONS_MODULI,
|
|
||||||
SSH_BIND_OPTIONS_RSA_MIN_SIZE,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
typedef struct ssh_bind_struct* ssh_bind;
|
typedef struct ssh_bind_struct* ssh_bind;
|
||||||
@@ -96,9 +85,6 @@ LIBSSH_API ssh_bind ssh_bind_new(void);
|
|||||||
LIBSSH_API int ssh_bind_options_set(ssh_bind sshbind,
|
LIBSSH_API int ssh_bind_options_set(ssh_bind sshbind,
|
||||||
enum ssh_bind_options_e type, const void *value);
|
enum ssh_bind_options_e type, const void *value);
|
||||||
|
|
||||||
LIBSSH_API int ssh_bind_options_parse_config(ssh_bind sshbind,
|
|
||||||
const char *filename);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Start listening to the socket.
|
* @brief Start listening to the socket.
|
||||||
*
|
*
|
||||||
@@ -245,18 +231,6 @@ LIBSSH_API void ssh_bind_free(ssh_bind ssh_bind_o);
|
|||||||
*/
|
*/
|
||||||
LIBSSH_API void ssh_set_auth_methods(ssh_session session, int auth_methods);
|
LIBSSH_API void ssh_set_auth_methods(ssh_session session, int auth_methods);
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief Send the server's issue-banner to client.
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @param[in] session The server session.
|
|
||||||
*
|
|
||||||
* @param[in] banner The server's banner.
|
|
||||||
*
|
|
||||||
* @return SSH_OK on success, SSH_ERROR on error.
|
|
||||||
*/
|
|
||||||
LIBSSH_API int ssh_send_issue_banner(ssh_session session, const ssh_string banner);
|
|
||||||
|
|
||||||
/**********************************************************
|
/**********************************************************
|
||||||
* SERVER MESSAGING
|
* SERVER MESSAGING
|
||||||
**********************************************************/
|
**********************************************************/
|
||||||
@@ -296,10 +270,8 @@ LIBSSH_API const char *ssh_message_auth_user(ssh_message msg);
|
|||||||
*
|
*
|
||||||
* @see ssh_message_get()
|
* @see ssh_message_get()
|
||||||
* @see ssh_message_type()
|
* @see ssh_message_type()
|
||||||
* @warning This function should not be used anymore as there is a
|
|
||||||
* callback based server implementation now auth_password_function.
|
|
||||||
*/
|
*/
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_message_auth_password(ssh_message msg);
|
LIBSSH_API const char *ssh_message_auth_password(ssh_message msg);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Get the publickey of the authenticated user.
|
* @brief Get the publickey of the authenticated user.
|
||||||
@@ -314,16 +286,11 @@ SSH_DEPRECATED LIBSSH_API const char *ssh_message_auth_password(ssh_message msg)
|
|||||||
* @see ssh_key_cmp()
|
* @see ssh_key_cmp()
|
||||||
* @see ssh_message_get()
|
* @see ssh_message_get()
|
||||||
* @see ssh_message_type()
|
* @see ssh_message_type()
|
||||||
* @warning This function should not be used anymore as there is a
|
|
||||||
* callback based server implementation auth_pubkey_function.
|
|
||||||
*/
|
*/
|
||||||
SSH_DEPRECATED LIBSSH_API ssh_key ssh_message_auth_pubkey(ssh_message msg);
|
LIBSSH_API ssh_key ssh_message_auth_pubkey(ssh_message msg);
|
||||||
|
|
||||||
LIBSSH_API int ssh_message_auth_kbdint_is_response(ssh_message msg);
|
LIBSSH_API int ssh_message_auth_kbdint_is_response(ssh_message msg);
|
||||||
|
LIBSSH_API enum ssh_publickey_state_e ssh_message_auth_publickey_state(ssh_message msg);
|
||||||
/* Replaced by callback based server implementation auth_pubkey_function */
|
|
||||||
SSH_DEPRECATED LIBSSH_API enum ssh_publickey_state_e ssh_message_auth_publickey_state(ssh_message msg);
|
|
||||||
|
|
||||||
LIBSSH_API int ssh_message_auth_reply_success(ssh_message msg,int partial);
|
LIBSSH_API int ssh_message_auth_reply_success(ssh_message msg,int partial);
|
||||||
LIBSSH_API int ssh_message_auth_reply_pk_ok(ssh_message msg, ssh_string algo, ssh_string pubkey);
|
LIBSSH_API int ssh_message_auth_reply_pk_ok(ssh_message msg, ssh_string algo, ssh_string pubkey);
|
||||||
LIBSSH_API int ssh_message_auth_reply_pk_ok_simple(ssh_message msg);
|
LIBSSH_API int ssh_message_auth_reply_pk_ok_simple(ssh_message msg);
|
||||||
@@ -352,12 +319,11 @@ LIBSSH_API int ssh_message_channel_request_open_destination_port(ssh_message msg
|
|||||||
|
|
||||||
LIBSSH_API ssh_channel ssh_message_channel_request_channel(ssh_message msg);
|
LIBSSH_API ssh_channel ssh_message_channel_request_channel(ssh_message msg);
|
||||||
|
|
||||||
/* Replaced by callback based server implementation function channel_pty_request_function*/
|
LIBSSH_API const char *ssh_message_channel_request_pty_term(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_message_channel_request_pty_term(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_pty_width(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_pty_width(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_pty_height(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_pty_height(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_pty_pxwidth(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_pty_pxwidth(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_pty_pxheight(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_pty_pxheight(ssh_message msg);
|
|
||||||
|
|
||||||
LIBSSH_API const char *ssh_message_channel_request_env_name(ssh_message msg);
|
LIBSSH_API const char *ssh_message_channel_request_env_name(ssh_message msg);
|
||||||
LIBSSH_API const char *ssh_message_channel_request_env_value(ssh_message msg);
|
LIBSSH_API const char *ssh_message_channel_request_env_value(ssh_message msg);
|
||||||
@@ -366,18 +332,17 @@ LIBSSH_API const char *ssh_message_channel_request_command(ssh_message msg);
|
|||||||
|
|
||||||
LIBSSH_API const char *ssh_message_channel_request_subsystem(ssh_message msg);
|
LIBSSH_API const char *ssh_message_channel_request_subsystem(ssh_message msg);
|
||||||
|
|
||||||
/* Replaced by callback based server implementation function channel_open_request_x11_function*/
|
LIBSSH_API int ssh_message_channel_request_x11_single_connection(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_x11_single_connection(ssh_message msg);
|
LIBSSH_API const char *ssh_message_channel_request_x11_auth_protocol(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_message_channel_request_x11_auth_protocol(ssh_message msg);
|
LIBSSH_API const char *ssh_message_channel_request_x11_auth_cookie(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API const char *ssh_message_channel_request_x11_auth_cookie(ssh_message msg);
|
LIBSSH_API int ssh_message_channel_request_x11_screen_number(ssh_message msg);
|
||||||
SSH_DEPRECATED LIBSSH_API int ssh_message_channel_request_x11_screen_number(ssh_message msg);
|
|
||||||
|
|
||||||
LIBSSH_API const char *ssh_message_global_request_address(ssh_message msg);
|
LIBSSH_API const char *ssh_message_global_request_address(ssh_message msg);
|
||||||
LIBSSH_API int ssh_message_global_request_port(ssh_message msg);
|
LIBSSH_API int ssh_message_global_request_port(ssh_message msg);
|
||||||
|
|
||||||
LIBSSH_API int ssh_channel_open_reverse_forward(ssh_channel channel, const char *remotehost,
|
LIBSSH_API int ssh_channel_open_reverse_forward(ssh_channel channel, const char *remotehost,
|
||||||
int remoteport, const char *sourcehost, int localport);
|
int remoteport, const char *sourcehost, int localport);
|
||||||
LIBSSH_API int ssh_channel_open_x11(ssh_channel channel,
|
LIBSSH_API int ssh_channel_open_x11(ssh_channel channel,
|
||||||
const char *orig_addr, int orig_port);
|
const char *orig_addr, int orig_port);
|
||||||
|
|
||||||
LIBSSH_API int ssh_channel_request_send_exit_status(ssh_channel channel,
|
LIBSSH_API int ssh_channel_request_send_exit_status(ssh_channel channel,
|
||||||
|
|||||||
@@ -23,7 +23,6 @@
|
|||||||
#include <stdbool.h>
|
#include <stdbool.h>
|
||||||
|
|
||||||
#include "libssh/priv.h"
|
#include "libssh/priv.h"
|
||||||
#include "libssh/callbacks.h"
|
|
||||||
#include "libssh/kex.h"
|
#include "libssh/kex.h"
|
||||||
#include "libssh/packet.h"
|
#include "libssh/packet.h"
|
||||||
#include "libssh/pcap.h"
|
#include "libssh/pcap.h"
|
||||||
@@ -31,7 +30,6 @@
|
|||||||
#include "libssh/channels.h"
|
#include "libssh/channels.h"
|
||||||
#include "libssh/poll.h"
|
#include "libssh/poll.h"
|
||||||
#include "libssh/config.h"
|
#include "libssh/config.h"
|
||||||
#include "libssh/misc.h"
|
|
||||||
|
|
||||||
/* These are the different states a SSH session can be into its life */
|
/* These are the different states a SSH session can be into its life */
|
||||||
enum ssh_session_state_e {
|
enum ssh_session_state_e {
|
||||||
@@ -50,8 +48,6 @@ enum ssh_session_state_e {
|
|||||||
|
|
||||||
enum ssh_dh_state_e {
|
enum ssh_dh_state_e {
|
||||||
DH_STATE_INIT=0,
|
DH_STATE_INIT=0,
|
||||||
DH_STATE_GROUP_SENT,
|
|
||||||
DH_STATE_REQUEST_SENT,
|
|
||||||
DH_STATE_INIT_SENT,
|
DH_STATE_INIT_SENT,
|
||||||
DH_STATE_NEWKEYS_SENT,
|
DH_STATE_NEWKEYS_SENT,
|
||||||
DH_STATE_FINISHED
|
DH_STATE_FINISHED
|
||||||
@@ -94,11 +90,10 @@ enum ssh_pending_call_e {
|
|||||||
#define SSH_OPT_FLAG_GSSAPI_AUTH 0x8
|
#define SSH_OPT_FLAG_GSSAPI_AUTH 0x8
|
||||||
|
|
||||||
/* extensions flags */
|
/* extensions flags */
|
||||||
/* negotiation enabled */
|
|
||||||
#define SSH_EXT_NEGOTIATION 0x01
|
|
||||||
/* server-sig-algs extension */
|
/* server-sig-algs extension */
|
||||||
#define SSH_EXT_SIG_RSA_SHA256 0x02
|
#define SSH_EXT_SIG_RSA_SHA256 0x01
|
||||||
#define SSH_EXT_SIG_RSA_SHA512 0x04
|
#define SSH_EXT_SIG_RSA_SHA512 0x02
|
||||||
|
#define SSH_EXT_ALL SSH_EXT_SIG_RSA_SHA256 | SSH_EXT_SIG_RSA_SHA512
|
||||||
|
|
||||||
/* members that are common to ssh_session and ssh_bind */
|
/* members that are common to ssh_session and ssh_bind */
|
||||||
struct ssh_common_struct {
|
struct ssh_common_struct {
|
||||||
@@ -118,7 +113,6 @@ struct ssh_session_struct {
|
|||||||
int openssh;
|
int openssh;
|
||||||
uint32_t send_seq;
|
uint32_t send_seq;
|
||||||
uint32_t recv_seq;
|
uint32_t recv_seq;
|
||||||
struct ssh_timestamp last_rekey_time;
|
|
||||||
|
|
||||||
int connected;
|
int connected;
|
||||||
/* !=0 when the user got a session handle */
|
/* !=0 when the user got a session handle */
|
||||||
@@ -136,18 +130,15 @@ struct ssh_session_struct {
|
|||||||
the server */
|
the server */
|
||||||
char *discon_msg; /* disconnect message from
|
char *discon_msg; /* disconnect message from
|
||||||
the remote host */
|
the remote host */
|
||||||
char *disconnect_message; /* disconnect message to be set */
|
|
||||||
ssh_buffer in_buffer;
|
ssh_buffer in_buffer;
|
||||||
PACKET in_packet;
|
PACKET in_packet;
|
||||||
ssh_buffer out_buffer;
|
ssh_buffer out_buffer;
|
||||||
struct ssh_list *out_queue; /* This list is used for delaying packets
|
|
||||||
when rekeying is required */
|
|
||||||
|
|
||||||
/* the states are used by the nonblocking stuff to remember */
|
/* the states are used by the nonblocking stuff to remember */
|
||||||
/* where it was before being interrupted */
|
/* where it was before being interrupted */
|
||||||
enum ssh_pending_call_e pending_call_state;
|
enum ssh_pending_call_e pending_call_state;
|
||||||
enum ssh_session_state_e session_state;
|
enum ssh_session_state_e session_state;
|
||||||
enum ssh_packet_state_e packet_state;
|
int packet_state;
|
||||||
enum ssh_dh_state_e dh_handshake_state;
|
enum ssh_dh_state_e dh_handshake_state;
|
||||||
enum ssh_channel_request_state_e global_req_state;
|
enum ssh_channel_request_state_e global_req_state;
|
||||||
struct ssh_agent_state_struct *agent_state;
|
struct ssh_agent_state_struct *agent_state;
|
||||||
@@ -175,7 +166,7 @@ struct ssh_session_struct {
|
|||||||
struct ssh_crypto_struct *next_crypto; /* next_crypto is going to be used after a SSH2_MSG_NEWKEYS */
|
struct ssh_crypto_struct *next_crypto; /* next_crypto is going to be used after a SSH2_MSG_NEWKEYS */
|
||||||
|
|
||||||
struct ssh_list *channels; /* linked list of channels */
|
struct ssh_list *channels; /* linked list of channels */
|
||||||
uint32_t maxchannel;
|
int maxchannel;
|
||||||
ssh_agent agent; /* ssh agent */
|
ssh_agent agent; /* ssh agent */
|
||||||
|
|
||||||
/* keyb interactive data */
|
/* keyb interactive data */
|
||||||
@@ -190,7 +181,6 @@ struct ssh_session_struct {
|
|||||||
ssh_key ed25519_key;
|
ssh_key ed25519_key;
|
||||||
/* The type of host key wanted by client */
|
/* The type of host key wanted by client */
|
||||||
enum ssh_keytypes_e hostkey;
|
enum ssh_keytypes_e hostkey;
|
||||||
enum ssh_digest_e hostkey_digest;
|
|
||||||
} srv;
|
} srv;
|
||||||
|
|
||||||
/* auths accepted by server */
|
/* auths accepted by server */
|
||||||
@@ -215,15 +205,13 @@ struct ssh_session_struct {
|
|||||||
char *sshdir;
|
char *sshdir;
|
||||||
char *knownhosts;
|
char *knownhosts;
|
||||||
char *global_knownhosts;
|
char *global_knownhosts;
|
||||||
char *wanted_methods[SSH_KEX_METHODS];
|
char *wanted_methods[10];
|
||||||
char *pubkey_accepted_types;
|
char *pubkey_accepted_types;
|
||||||
char *ProxyCommand;
|
char *ProxyCommand;
|
||||||
char *custombanner;
|
char *custombanner;
|
||||||
char *moduli_file;
|
|
||||||
char *agent_socket;
|
|
||||||
unsigned long timeout; /* seconds */
|
unsigned long timeout; /* seconds */
|
||||||
unsigned long timeout_usec;
|
unsigned long timeout_usec;
|
||||||
uint16_t port;
|
unsigned int port;
|
||||||
socket_t fd;
|
socket_t fd;
|
||||||
int StrictHostKeyChecking;
|
int StrictHostKeyChecking;
|
||||||
char compressionlevel;
|
char compressionlevel;
|
||||||
@@ -234,9 +222,6 @@ struct ssh_session_struct {
|
|||||||
int nodelay;
|
int nodelay;
|
||||||
bool config_processed;
|
bool config_processed;
|
||||||
uint8_t options_seen[SOC_MAX];
|
uint8_t options_seen[SOC_MAX];
|
||||||
uint64_t rekey_data;
|
|
||||||
uint32_t rekey_time;
|
|
||||||
int rsa_min_size;
|
|
||||||
} opts;
|
} opts;
|
||||||
/* counters */
|
/* counters */
|
||||||
ssh_counter socket_counter;
|
ssh_counter socket_counter;
|
||||||
@@ -251,7 +236,7 @@ struct ssh_session_struct {
|
|||||||
typedef int (*ssh_termination_function)(void *user);
|
typedef int (*ssh_termination_function)(void *user);
|
||||||
int ssh_handle_packets(ssh_session session, int timeout);
|
int ssh_handle_packets(ssh_session session, int timeout);
|
||||||
int ssh_handle_packets_termination(ssh_session session,
|
int ssh_handle_packets_termination(ssh_session session,
|
||||||
int timeout,
|
long timeout,
|
||||||
ssh_termination_function fct,
|
ssh_termination_function fct,
|
||||||
void *user);
|
void *user);
|
||||||
void ssh_socket_exception_callback(int code, int errno_code, void *user);
|
void ssh_socket_exception_callback(int code, int errno_code, void *user);
|
||||||
|
|||||||
@@ -201,18 +201,13 @@ struct sftp_statvfs_struct {
|
|||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Creates a new sftp session.
|
* @brief Start a new sftp session.
|
||||||
*
|
|
||||||
* This function creates a new sftp session and allocates a new sftp channel
|
|
||||||
* with the server inside of the provided ssh session. This function call is
|
|
||||||
* usually followed by the sftp_init(), which initializes SFTP protocol itself.
|
|
||||||
*
|
*
|
||||||
* @param session The ssh session to use.
|
* @param session The ssh session to use.
|
||||||
*
|
*
|
||||||
* @return A new sftp session or NULL on error.
|
* @return A new sftp session or NULL on error.
|
||||||
*
|
*
|
||||||
* @see sftp_free()
|
* @see sftp_free()
|
||||||
* @see sftp_init()
|
|
||||||
*/
|
*/
|
||||||
LIBSSH_API sftp_session sftp_new(ssh_session session);
|
LIBSSH_API sftp_session sftp_new(ssh_session session);
|
||||||
|
|
||||||
@@ -237,10 +232,7 @@ LIBSSH_API sftp_session sftp_new_channel(ssh_session session, ssh_channel channe
|
|||||||
LIBSSH_API void sftp_free(sftp_session sftp);
|
LIBSSH_API void sftp_free(sftp_session sftp);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Initialize the sftp protocol with the server.
|
* @brief Initialize the sftp session with the server.
|
||||||
*
|
|
||||||
* This function involves the SFTP protocol initialization (as described
|
|
||||||
* in the SFTP specification), including the version and extensions negotiation.
|
|
||||||
*
|
*
|
||||||
* @param sftp The sftp session to initialize.
|
* @param sftp The sftp session to initialize.
|
||||||
*
|
*
|
||||||
@@ -258,7 +250,7 @@ LIBSSH_API int sftp_init(sftp_session sftp);
|
|||||||
* @param sftp The sftp session where the error is saved.
|
* @param sftp The sftp session where the error is saved.
|
||||||
*
|
*
|
||||||
* @return The saved error (see server responses), < 0 if an error
|
* @return The saved error (see server responses), < 0 if an error
|
||||||
* in the function occurred.
|
* in the function occured.
|
||||||
*
|
*
|
||||||
* @see Server responses
|
* @see Server responses
|
||||||
*/
|
*/
|
||||||
@@ -413,7 +405,7 @@ LIBSSH_API void sftp_attributes_free(sftp_attributes file);
|
|||||||
*
|
*
|
||||||
* @param dir The sftp directory handle to close.
|
* @param dir The sftp directory handle to close.
|
||||||
*
|
*
|
||||||
* @return Returns SSH_NO_ERROR or SSH_ERROR if an error occurred.
|
* @return Returns SSH_NO_ERROR or SSH_ERROR if an error occured.
|
||||||
*/
|
*/
|
||||||
LIBSSH_API int sftp_closedir(sftp_dir dir);
|
LIBSSH_API int sftp_closedir(sftp_dir dir);
|
||||||
|
|
||||||
@@ -422,7 +414,7 @@ LIBSSH_API int sftp_closedir(sftp_dir dir);
|
|||||||
*
|
*
|
||||||
* @param file The open sftp file handle to close.
|
* @param file The open sftp file handle to close.
|
||||||
*
|
*
|
||||||
* @return Returns SSH_NO_ERROR or SSH_ERROR if an error occurred.
|
* @return Returns SSH_NO_ERROR or SSH_ERROR if an error occured.
|
||||||
*
|
*
|
||||||
* @see sftp_open()
|
* @see sftp_open()
|
||||||
*/
|
*/
|
||||||
@@ -478,7 +470,7 @@ LIBSSH_API void sftp_file_set_blocking(sftp_file handle);
|
|||||||
*
|
*
|
||||||
* @param file The opened sftp file handle to be read from.
|
* @param file The opened sftp file handle to be read from.
|
||||||
*
|
*
|
||||||
* @param buf Pointer to buffer to receive read data.
|
* @param buf Pointer to buffer to recieve read data.
|
||||||
*
|
*
|
||||||
* @param count Size of the buffer in bytes.
|
* @param count Size of the buffer in bytes.
|
||||||
*
|
*
|
||||||
@@ -527,7 +519,7 @@ LIBSSH_API int sftp_async_read_begin(sftp_file file, uint32_t len);
|
|||||||
*
|
*
|
||||||
* @param file The opened sftp file handle to be read from.
|
* @param file The opened sftp file handle to be read from.
|
||||||
*
|
*
|
||||||
* @param data Pointer to buffer to receive read data.
|
* @param data Pointer to buffer to recieve read data.
|
||||||
*
|
*
|
||||||
* @param len Size of the buffer in bytes. It should be bigger or
|
* @param len Size of the buffer in bytes. It should be bigger or
|
||||||
* equal to the length parameter of the
|
* equal to the length parameter of the
|
||||||
@@ -537,7 +529,7 @@ LIBSSH_API int sftp_async_read_begin(sftp_file file, uint32_t len);
|
|||||||
* function.
|
* function.
|
||||||
*
|
*
|
||||||
* @return Number of bytes read, 0 on EOF, SSH_ERROR if an error
|
* @return Number of bytes read, 0 on EOF, SSH_ERROR if an error
|
||||||
* occurred, SSH_AGAIN if the file is opened in nonblocking
|
* occured, SSH_AGAIN if the file is opened in nonblocking
|
||||||
* mode and the request hasn't been executed yet.
|
* mode and the request hasn't been executed yet.
|
||||||
*
|
*
|
||||||
* @warning A call to this function with an invalid identifier
|
* @warning A call to this function with an invalid identifier
|
||||||
@@ -632,7 +624,7 @@ LIBSSH_API void sftp_rewind(sftp_file file);
|
|||||||
LIBSSH_API int sftp_unlink(sftp_session sftp, const char *file);
|
LIBSSH_API int sftp_unlink(sftp_session sftp, const char *file);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Remove a directory.
|
* @brief Remove a directoy.
|
||||||
*
|
*
|
||||||
* @param sftp The sftp session handle.
|
* @param sftp The sftp session handle.
|
||||||
*
|
*
|
||||||
@@ -806,7 +798,7 @@ LIBSSH_API void sftp_statvfs_free(sftp_statvfs_t statvfs_o);
|
|||||||
/**
|
/**
|
||||||
* @brief Synchronize a file's in-core state with storage device
|
* @brief Synchronize a file's in-core state with storage device
|
||||||
*
|
*
|
||||||
* This calls the "fsync@openssh.com" extension. You should check if the
|
* This calls the "fsync@openssh.com" extention. You should check if the
|
||||||
* extensions is supported using:
|
* extensions is supported using:
|
||||||
*
|
*
|
||||||
* @code
|
* @code
|
||||||
@@ -826,9 +818,7 @@ LIBSSH_API int sftp_fsync(sftp_file file);
|
|||||||
*
|
*
|
||||||
* @param path The path to be canonicalized.
|
* @param path The path to be canonicalized.
|
||||||
*
|
*
|
||||||
* @return A pointer to the newly allocated canonicalized path,
|
* @return The canonicalize path, NULL on error.
|
||||||
* NULL on error. The caller needs to free the memory
|
|
||||||
* using ssh_string_free_char().
|
|
||||||
*/
|
*/
|
||||||
LIBSSH_API char *sftp_canonicalize_path(sftp_session sftp, const char *path);
|
LIBSSH_API char *sftp_canonicalize_path(sftp_session sftp, const char *path);
|
||||||
|
|
||||||
@@ -854,22 +844,22 @@ LIBSSH_API int sftp_server_version(sftp_session sftp);
|
|||||||
LIBSSH_API sftp_session sftp_server_new(ssh_session session, ssh_channel chan);
|
LIBSSH_API sftp_session sftp_server_new(ssh_session session, ssh_channel chan);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @brief Initialize the sftp server.
|
* @brief Intialize the sftp server.
|
||||||
*
|
*
|
||||||
* @param sftp The sftp session to init.
|
* @param sftp The sftp session to init.
|
||||||
*
|
*
|
||||||
* @return 0 on success, < 0 on error.
|
* @return 0 on success, < 0 on error.
|
||||||
*/
|
*/
|
||||||
LIBSSH_API int sftp_server_init(sftp_session sftp);
|
LIBSSH_API int sftp_server_init(sftp_session sftp);
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief Close and deallocate a sftp server session.
|
|
||||||
*
|
|
||||||
* @param sftp The sftp session handle to free.
|
|
||||||
*/
|
|
||||||
LIBSSH_API void sftp_server_free(sftp_session sftp);
|
|
||||||
#endif /* WITH_SERVER */
|
#endif /* WITH_SERVER */
|
||||||
|
|
||||||
|
/* this is not a public interface */
|
||||||
|
#define SFTP_HANDLES 256
|
||||||
|
sftp_packet sftp_packet_read(sftp_session sftp);
|
||||||
|
int sftp_packet_write(sftp_session sftp,uint8_t type, ssh_buffer payload);
|
||||||
|
void sftp_packet_free(sftp_packet packet);
|
||||||
|
int buffer_add_attributes(ssh_buffer buffer, sftp_attributes attr);
|
||||||
|
sftp_attributes sftp_parse_attr(sftp_session session, ssh_buffer buf,int expectname);
|
||||||
/* sftpserver.c */
|
/* sftpserver.c */
|
||||||
|
|
||||||
LIBSSH_API sftp_client_message sftp_get_client_message(sftp_session sftp);
|
LIBSSH_API sftp_client_message sftp_get_client_message(sftp_session sftp);
|
||||||
|
|||||||
@@ -1,32 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2003-2008 by Aris Adamantiadis
|
|
||||||
*
|
|
||||||
* This library is free software; you can redistribute it and/or
|
|
||||||
* modify it under the terms of the GNU Lesser General Public
|
|
||||||
* License as published by the Free Software Foundation; either
|
|
||||||
* version 2.1 of the License, or (at your option) any later version.
|
|
||||||
*
|
|
||||||
* This library is distributed in the hope that it will be useful,
|
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
||||||
* Lesser General Public License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public
|
|
||||||
* License along with this library; if not, write to the Free Software
|
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef SFTP_PRIV_H
|
|
||||||
#define SFTP_PRIV_H
|
|
||||||
|
|
||||||
sftp_packet sftp_packet_read(sftp_session sftp);
|
|
||||||
int sftp_packet_write(sftp_session sftp, uint8_t type, ssh_buffer payload);
|
|
||||||
void sftp_packet_free(sftp_packet packet);
|
|
||||||
int buffer_add_attributes(ssh_buffer buffer, sftp_attributes attr);
|
|
||||||
sftp_attributes sftp_parse_attr(sftp_session session,
|
|
||||||
ssh_buffer buf,
|
|
||||||
int expectname);
|
|
||||||
|
|
||||||
#endif /* SFTP_PRIV_H */
|
|
||||||
@@ -35,13 +35,13 @@ void ssh_socket_reset(ssh_socket s);
|
|||||||
void ssh_socket_free(ssh_socket s);
|
void ssh_socket_free(ssh_socket s);
|
||||||
void ssh_socket_set_fd(ssh_socket s, socket_t fd);
|
void ssh_socket_set_fd(ssh_socket s, socket_t fd);
|
||||||
socket_t ssh_socket_get_fd(ssh_socket s);
|
socket_t ssh_socket_get_fd(ssh_socket s);
|
||||||
|
#ifndef _WIN32
|
||||||
int ssh_socket_unix(ssh_socket s, const char *path);
|
int ssh_socket_unix(ssh_socket s, const char *path);
|
||||||
void ssh_execute_command(const char *command, socket_t in, socket_t out);
|
void ssh_execute_command(const char *command, socket_t in, socket_t out);
|
||||||
#ifndef _WIN32
|
|
||||||
int ssh_socket_connect_proxycommand(ssh_socket s, const char *command);
|
int ssh_socket_connect_proxycommand(ssh_socket s, const char *command);
|
||||||
#endif
|
#endif
|
||||||
void ssh_socket_close(ssh_socket s);
|
void ssh_socket_close(ssh_socket s);
|
||||||
int ssh_socket_write(ssh_socket s,const void *buffer, uint32_t len);
|
int ssh_socket_write(ssh_socket s,const void *buffer, int len);
|
||||||
int ssh_socket_is_open(ssh_socket s);
|
int ssh_socket_is_open(ssh_socket s);
|
||||||
int ssh_socket_fd_isset(ssh_socket s, fd_set *set);
|
int ssh_socket_fd_isset(ssh_socket s, fd_set *set);
|
||||||
void ssh_socket_fd_set(ssh_socket s, fd_set *set, socket_t *max_fd);
|
void ssh_socket_fd_set(ssh_socket s, fd_set *set, socket_t *max_fd);
|
||||||
@@ -63,9 +63,6 @@ void ssh_socket_set_callbacks(ssh_socket s, ssh_socket_callbacks callbacks);
|
|||||||
int ssh_socket_pollcallback(struct ssh_poll_handle_struct *p, socket_t fd, int revents, void *v_s);
|
int ssh_socket_pollcallback(struct ssh_poll_handle_struct *p, socket_t fd, int revents, void *v_s);
|
||||||
struct ssh_poll_handle_struct * ssh_socket_get_poll_handle(ssh_socket s);
|
struct ssh_poll_handle_struct * ssh_socket_get_poll_handle(ssh_socket s);
|
||||||
|
|
||||||
int ssh_socket_connect(ssh_socket s,
|
int ssh_socket_connect(ssh_socket s, const char *host, int port, const char *bind_addr);
|
||||||
const char *host,
|
|
||||||
uint16_t port,
|
|
||||||
const char *bind_addr);
|
|
||||||
|
|
||||||
#endif /* SOCKET_H_ */
|
#endif /* SOCKET_H_ */
|
||||||
|
|||||||
@@ -1,48 +0,0 @@
|
|||||||
/*
|
|
||||||
* token.h - Tokens list handling
|
|
||||||
*
|
|
||||||
* This file is part of the SSH Library
|
|
||||||
*
|
|
||||||
* Copyright (c) 2019 by Red Hat, Inc.
|
|
||||||
*
|
|
||||||
* Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
|
|
||||||
*
|
|
||||||
* The SSH Library is free software; you can redistribute it and/or modify
|
|
||||||
* it under the terms of the GNU Lesser General Public License as published by
|
|
||||||
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
||||||
* option) any later version.
|
|
||||||
*
|
|
||||||
* The SSH Library is distributed in the hope that it will be useful, but
|
|
||||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
||||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
||||||
* License for more details.
|
|
||||||
*
|
|
||||||
* You should have received a copy of the GNU Lesser General Public License
|
|
||||||
* along with the SSH Library; see the file COPYING. If not, write to
|
|
||||||
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
||||||
* MA 02111-1307, USA.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef TOKEN_H_
|
|
||||||
#define TOKEN_H_
|
|
||||||
|
|
||||||
struct ssh_tokens_st {
|
|
||||||
char *buffer;
|
|
||||||
char **tokens;
|
|
||||||
};
|
|
||||||
|
|
||||||
struct ssh_tokens_st *ssh_tokenize(const char *chain, char separator);
|
|
||||||
|
|
||||||
void ssh_tokens_free(struct ssh_tokens_st *tokens);
|
|
||||||
|
|
||||||
char *ssh_find_matching(const char *available_d,
|
|
||||||
const char *preferred_d);
|
|
||||||
|
|
||||||
char *ssh_find_all_matching(const char *available_d,
|
|
||||||
const char *preferred_d);
|
|
||||||
|
|
||||||
char *ssh_remove_duplicates(const char *list);
|
|
||||||
|
|
||||||
char *ssh_append_without_duplicates(const char *list,
|
|
||||||
const char *appended_list);
|
|
||||||
#endif /* TOKEN_H_ */
|
|
||||||
@@ -21,29 +21,34 @@
|
|||||||
#ifndef WRAPPER_H_
|
#ifndef WRAPPER_H_
|
||||||
#define WRAPPER_H_
|
#define WRAPPER_H_
|
||||||
|
|
||||||
#include <stdbool.h>
|
|
||||||
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
#include "libssh/libssh.h"
|
#include "libssh/libssh.h"
|
||||||
#include "libssh/libcrypto.h"
|
#include "libssh/libcrypto.h"
|
||||||
#include "libssh/libgcrypt.h"
|
#include "libssh/libgcrypt.h"
|
||||||
#include "libssh/libmbedcrypto.h"
|
#include "libssh/libmbedcrypto.h"
|
||||||
|
|
||||||
enum ssh_kdf_digest {
|
enum ssh_digest_e {
|
||||||
SSH_KDF_SHA1=1,
|
SSH_DIGEST_AUTO=0,
|
||||||
SSH_KDF_SHA256,
|
SSH_DIGEST_SHA1=1,
|
||||||
SSH_KDF_SHA384,
|
SSH_DIGEST_SHA256,
|
||||||
SSH_KDF_SHA512
|
SSH_DIGEST_SHA512
|
||||||
|
};
|
||||||
|
|
||||||
|
enum ssh_mac_e {
|
||||||
|
SSH_MAC_SHA1=1,
|
||||||
|
SSH_MAC_SHA256,
|
||||||
|
SSH_MAC_SHA384,
|
||||||
|
SSH_MAC_SHA512
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ssh_hmac_e {
|
enum ssh_hmac_e {
|
||||||
SSH_HMAC_SHA1 = 1,
|
SSH_HMAC_SHA1 = 1,
|
||||||
SSH_HMAC_SHA256,
|
SSH_HMAC_SHA256,
|
||||||
|
SSH_HMAC_SHA384,
|
||||||
SSH_HMAC_SHA512,
|
SSH_HMAC_SHA512,
|
||||||
SSH_HMAC_MD5,
|
SSH_HMAC_MD5,
|
||||||
SSH_HMAC_AEAD_POLY1305,
|
SSH_HMAC_AEAD_POLY1305,
|
||||||
SSH_HMAC_AEAD_GCM,
|
SSH_HMAC_AEAD_GCM
|
||||||
SSH_HMAC_NONE,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ssh_des_e {
|
enum ssh_des_e {
|
||||||
@@ -54,57 +59,48 @@ enum ssh_des_e {
|
|||||||
struct ssh_hmac_struct {
|
struct ssh_hmac_struct {
|
||||||
const char* name;
|
const char* name;
|
||||||
enum ssh_hmac_e hmac_type;
|
enum ssh_hmac_e hmac_type;
|
||||||
bool etm;
|
|
||||||
};
|
|
||||||
|
|
||||||
enum ssh_crypto_direction_e {
|
|
||||||
SSH_DIRECTION_IN = 1,
|
|
||||||
SSH_DIRECTION_OUT = 2,
|
|
||||||
SSH_DIRECTION_BOTH = 3,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct ssh_cipher_struct;
|
struct ssh_cipher_struct;
|
||||||
struct ssh_crypto_struct;
|
|
||||||
|
|
||||||
typedef struct ssh_mac_ctx_struct *ssh_mac_ctx;
|
typedef struct ssh_mac_ctx_struct *ssh_mac_ctx;
|
||||||
MD5CTX md5_init(void);
|
MD5CTX md5_init(void);
|
||||||
void md5_update(MD5CTX c, const void *data, size_t len);
|
void md5_update(MD5CTX c, const void *data, unsigned long len);
|
||||||
void md5_final(unsigned char *md,MD5CTX c);
|
void md5_final(unsigned char *md,MD5CTX c);
|
||||||
|
|
||||||
SHACTX sha1_init(void);
|
SHACTX sha1_init(void);
|
||||||
void sha1_update(SHACTX c, const void *data, size_t len);
|
void sha1_update(SHACTX c, const void *data, unsigned long len);
|
||||||
void sha1_final(unsigned char *md,SHACTX c);
|
void sha1_final(unsigned char *md,SHACTX c);
|
||||||
void sha1(const unsigned char *digest,size_t len,unsigned char *hash);
|
void sha1(unsigned char *digest,int len,unsigned char *hash);
|
||||||
|
|
||||||
SHA256CTX sha256_init(void);
|
SHA256CTX sha256_init(void);
|
||||||
void sha256_update(SHA256CTX c, const void *data, size_t len);
|
void sha256_update(SHA256CTX c, const void *data, unsigned long len);
|
||||||
void sha256_final(unsigned char *md,SHA256CTX c);
|
void sha256_final(unsigned char *md,SHA256CTX c);
|
||||||
void sha256(const unsigned char *digest, size_t len, unsigned char *hash);
|
void sha256(unsigned char *digest, int len, unsigned char *hash);
|
||||||
|
|
||||||
SHA384CTX sha384_init(void);
|
SHA384CTX sha384_init(void);
|
||||||
void sha384_update(SHA384CTX c, const void *data, size_t len);
|
void sha384_update(SHA384CTX c, const void *data, unsigned long len);
|
||||||
void sha384_final(unsigned char *md,SHA384CTX c);
|
void sha384_final(unsigned char *md,SHA384CTX c);
|
||||||
void sha384(const unsigned char *digest, size_t len, unsigned char *hash);
|
void sha384(unsigned char *digest, int len, unsigned char *hash);
|
||||||
|
|
||||||
SHA512CTX sha512_init(void);
|
SHA512CTX sha512_init(void);
|
||||||
void sha512_update(SHA512CTX c, const void *data, size_t len);
|
void sha512_update(SHA512CTX c, const void *data, unsigned long len);
|
||||||
void sha512_final(unsigned char *md,SHA512CTX c);
|
void sha512_final(unsigned char *md,SHA512CTX c);
|
||||||
void sha512(const unsigned char *digest, size_t len, unsigned char *hash);
|
void sha512(unsigned char *digest, int len, unsigned char *hash);
|
||||||
|
|
||||||
void evp(int nid, unsigned char *digest, size_t len, unsigned char *hash, unsigned int *hlen);
|
void evp(int nid, unsigned char *digest, int len, unsigned char *hash, unsigned int *hlen);
|
||||||
EVPCTX evp_init(int nid);
|
EVPCTX evp_init(int nid);
|
||||||
void evp_update(EVPCTX ctx, const void *data, size_t len);
|
void evp_update(EVPCTX ctx, const void *data, unsigned long len);
|
||||||
void evp_final(EVPCTX ctx, unsigned char *md, unsigned int *mdlen);
|
void evp_final(EVPCTX ctx, unsigned char *md, unsigned int *mdlen);
|
||||||
|
|
||||||
HMACCTX hmac_init(const void *key,size_t len, enum ssh_hmac_e type);
|
ssh_mac_ctx ssh_mac_ctx_init(enum ssh_mac_e type);
|
||||||
int hmac_update(HMACCTX c, const void *data, size_t len);
|
void ssh_mac_update(ssh_mac_ctx ctx, const void *data, unsigned long len);
|
||||||
int hmac_final(HMACCTX ctx, unsigned char *hashmacbuf, size_t *len);
|
void ssh_mac_final(unsigned char *md, ssh_mac_ctx ctx);
|
||||||
size_t hmac_digest_len(enum ssh_hmac_e type);
|
|
||||||
|
|
||||||
int ssh_kdf(struct ssh_crypto_struct *crypto,
|
HMACCTX hmac_init(const void *key,int len, enum ssh_hmac_e type);
|
||||||
unsigned char *key, size_t key_len,
|
void hmac_update(HMACCTX c, const void *data, unsigned long len);
|
||||||
int key_type, unsigned char *output,
|
void hmac_final(HMACCTX ctx,unsigned char *hashmacbuf,unsigned int *len);
|
||||||
size_t requested_len);
|
size_t hmac_digest_len(enum ssh_hmac_e type);
|
||||||
|
|
||||||
int crypt_set_algorithms_client(ssh_session session);
|
int crypt_set_algorithms_client(ssh_session session);
|
||||||
int crypt_set_algorithms_server(ssh_session session);
|
int crypt_set_algorithms_server(ssh_session session);
|
||||||
@@ -118,13 +114,6 @@ void ssh_crypto_finalize(void);
|
|||||||
void ssh_cipher_clear(struct ssh_cipher_struct *cipher);
|
void ssh_cipher_clear(struct ssh_cipher_struct *cipher);
|
||||||
struct ssh_hmac_struct *ssh_get_hmactab(void);
|
struct ssh_hmac_struct *ssh_get_hmactab(void);
|
||||||
struct ssh_cipher_struct *ssh_get_ciphertab(void);
|
struct ssh_cipher_struct *ssh_get_ciphertab(void);
|
||||||
const char *ssh_hmac_type_to_string(enum ssh_hmac_e hmac_type, bool etm);
|
const char *ssh_hmac_type_to_string(enum ssh_hmac_e hmac_type);
|
||||||
|
|
||||||
#if defined(HAVE_LIBCRYPTO) && OPENSSL_VERSION_NUMBER >= 0x30000000L
|
|
||||||
int evp_build_pkey(const char* name, OSSL_PARAM_BLD *param_bld, EVP_PKEY **pkey, int selection);
|
|
||||||
int evp_dup_dsa_pkey(const ssh_key key, ssh_key new, int demote);
|
|
||||||
int evp_dup_rsa_pkey(const ssh_key key, ssh_key new, int demote);
|
|
||||||
int evp_dup_ecdsa_pkey(const ssh_key key, ssh_key new, int demote);
|
|
||||||
#endif /* HAVE_LIBCRYPTO && OPENSSL_VERSION_NUMBER */
|
|
||||||
|
|
||||||
#endif /* WRAPPER_H_ */
|
#endif /* WRAPPER_H_ */
|
||||||
|
|||||||
15
libssh-config.cmake.in
Normal file
15
libssh-config.cmake.in
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
@PACKAGE_INIT@
|
||||||
|
|
||||||
|
if (EXISTS "${CMAKE_CURRENT_LIST_DIR}/CMakeCache.txt")
|
||||||
|
# In tree build
|
||||||
|
set_and_check(LIBSSH_INCLUDE_DIR "${CMAKE_CURRENT_LIST_DIR}/include")
|
||||||
|
set_and_check(LIBSSH_LIBRARIES "${CMAKE_CURRENT_LIST_DIR}/lib/@LIBSSH_LIBRARY_NAME@")
|
||||||
|
else()
|
||||||
|
set_and_check(LIBSSH_INCLUDE_DIR "@PACKAGE_INCLUDE_INSTALL_DIR@")
|
||||||
|
set_and_check(LIBSSH_LIBRARIES "@PACKAGE_LIB_INSTALL_DIR@/@LIBSSH_LIBRARY_NAME@")
|
||||||
|
endif()
|
||||||
|
|
||||||
|
# For backward compatibility
|
||||||
|
set(LIBSSH_LIBRARY ${LIBSSH_LIBRARIES})
|
||||||
|
|
||||||
|
mark_as_advanced(LIBSSH_LIBRARIES LIBSSH_LIBRARY LIBSSH_INCLUDE_DIR)
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
Name: ${PROJECT_NAME}
|
Name: ${PROJECT_NAME}
|
||||||
Description: The SSH Library
|
Description: The SSH Library
|
||||||
Version: ${PROJECT_VERSION}
|
Version: ${PROJECT_VERSION}
|
||||||
Libs: -L${CMAKE_INSTALL_FULL_LIBDIR} -lssh
|
Libs: -L${LIB_INSTALL_DIR} -lssh
|
||||||
Cflags: -I${CMAKE_INSTALL_FULL_INCLUDEDIR}
|
Cflags: -I${INCLUDE_INSTALL_DIR}
|
||||||
|
|
||||||
|
|||||||
200
obj/build_make.sh
Executable file
200
obj/build_make.sh
Executable file
@@ -0,0 +1,200 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Last Change: 2008-06-18 14:13:46
|
||||||
|
#
|
||||||
|
# Script to build libssh on UNIX.
|
||||||
|
#
|
||||||
|
# Copyright (c) 2006-2007 Andreas Schneider <asn@cryptomilk.org>
|
||||||
|
#
|
||||||
|
|
||||||
|
SOURCE_DIR=".."
|
||||||
|
|
||||||
|
LANG=C
|
||||||
|
export LANG
|
||||||
|
|
||||||
|
SCRIPT="$0"
|
||||||
|
COUNT=0
|
||||||
|
while [ -L "${SCRIPT}" ]
|
||||||
|
do
|
||||||
|
SCRIPT=$(readlink ${SCRIPT})
|
||||||
|
COUNT=$(expr ${COUNT} + 1)
|
||||||
|
if [ ${COUNT} -gt 100 ]; then
|
||||||
|
echo "Too many symbolic links"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
BUILDDIR=$(dirname ${SCRIPT})
|
||||||
|
|
||||||
|
cleanup_and_exit () {
|
||||||
|
if test "$1" = 0 -o -z "$1" ; then
|
||||||
|
exit 0
|
||||||
|
else
|
||||||
|
exit $1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
function configure() {
|
||||||
|
if [ -n "${CMAKEDIR}" ]; then
|
||||||
|
${CMAKEDIR}/bin/cmake "$@" ${SOURCE_DIR} || cleanup_and_exit $?
|
||||||
|
else
|
||||||
|
cmake "$@" ${SOURCE_DIR} || cleanup_and_exit $?
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
function compile() {
|
||||||
|
if [ -f /proc/cpuinfo ]; then
|
||||||
|
CPUCOUNT=$(grep -c processor /proc/cpuinfo)
|
||||||
|
elif test `uname` = "SunOS" ; then
|
||||||
|
CPUCOUNT=$(psrinfo -p)
|
||||||
|
else
|
||||||
|
CPUCOUNT="1"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "${CPUCOUNT}" -gt "1" ]; then
|
||||||
|
${MAKE} -j${CPUCOUNT} $1 || cleanup_and_exit $?
|
||||||
|
else
|
||||||
|
${MAKE} $1 || exit $?
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
function clean_build_dir() {
|
||||||
|
find ! -path "*.svn*" ! -name "*.bat" ! -name "*.sh" ! -name "." -print0 | xargs -0 rm -rf
|
||||||
|
}
|
||||||
|
|
||||||
|
function usage () {
|
||||||
|
echo "Usage: `basename $0` [--prefix /install_prefix|--build [debug|final]|--clean|--verbose|--libsuffix (32|64)|--help|--clang|--cmakedir /directory|--make
|
||||||
|
(gmake|make)|--ccompiler(gcc|cc)|--withstaticlib|--unittesting|--clientunittesting|--withserver|--withoutsymbolversioning]"
|
||||||
|
cleanup_and_exit
|
||||||
|
}
|
||||||
|
|
||||||
|
cd ${BUILDDIR}
|
||||||
|
|
||||||
|
# the default CMake options:
|
||||||
|
OPTIONS="--graphviz=${BUILDDIR}/libssh.dot"
|
||||||
|
|
||||||
|
# the default 'make' utility:
|
||||||
|
MAKE="make"
|
||||||
|
|
||||||
|
while test -n "$1"; do
|
||||||
|
PARAM="$1"
|
||||||
|
ARG="$2"
|
||||||
|
shift
|
||||||
|
case ${PARAM} in
|
||||||
|
*-*=*)
|
||||||
|
ARG=${PARAM#*=}
|
||||||
|
PARAM=${PARAM%%=*}
|
||||||
|
set -- "----noarg=${PARAM}" "$@"
|
||||||
|
esac
|
||||||
|
case ${PARAM} in
|
||||||
|
*-help|-h)
|
||||||
|
#echo_help
|
||||||
|
usage
|
||||||
|
cleanup_and_exit
|
||||||
|
;;
|
||||||
|
*-build)
|
||||||
|
DOMAKE="1"
|
||||||
|
BUILD_TYPE="${ARG}"
|
||||||
|
test -n "${BUILD_TYPE}" && shift
|
||||||
|
;;
|
||||||
|
*-clean)
|
||||||
|
clean_build_dir
|
||||||
|
cleanup_and_exit
|
||||||
|
;;
|
||||||
|
*-clang)
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++"
|
||||||
|
;;
|
||||||
|
*-verbose)
|
||||||
|
DOVERBOSE="1"
|
||||||
|
;;
|
||||||
|
*-memtest)
|
||||||
|
OPTIONS="${OPTIONS} -DMEM_NULL_TESTS=ON"
|
||||||
|
;;
|
||||||
|
*-libsuffix)
|
||||||
|
OPTIONS="${OPTIONS} -DLIB_SUFFIX=${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-prefix)
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_INSTALL_PREFIX=${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-sysconfdir)
|
||||||
|
OPTIONS="${OPTIONS} -DSYSCONF_INSTALL_DIR=${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-cmakedir)
|
||||||
|
CMAKEDIR="${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-make)
|
||||||
|
MAKE="${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-ccompiler)
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_C_COMPILER=${ARG}"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*-withstaticlib)
|
||||||
|
OPTIONS="${OPTIONS} -DWITH_STATIC_LIB=ON"
|
||||||
|
;;
|
||||||
|
*-unittesting)
|
||||||
|
OPTIONS="${OPTIONS} -DUNIT_TESTING=ON"
|
||||||
|
;;
|
||||||
|
*-clientunittesting)
|
||||||
|
OPTIONS="${OPTIONS} -DCLIENT_TESTING=ON"
|
||||||
|
;;
|
||||||
|
*-withserver)
|
||||||
|
OPTIONS="${OPTIONS} -DWITH_SERVER=ON"
|
||||||
|
;;
|
||||||
|
*-withoutsymbolversioning)
|
||||||
|
OPTIONS="${OPTIONS} -DWITH_SYMBOL_VERSIONING=OFF"
|
||||||
|
;;
|
||||||
|
*-finalrelease)
|
||||||
|
OPTIONS="${OPTIONS} -DWITH_FINAL=ON"
|
||||||
|
;;
|
||||||
|
----noarg)
|
||||||
|
echo "$ARG does not take an argument"
|
||||||
|
cleanup_and_exit
|
||||||
|
;;
|
||||||
|
-*)
|
||||||
|
echo Unknown Option "$PARAM". Exit.
|
||||||
|
cleanup_and_exit 1
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
usage
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
if [ "${DOMAKE}" == "1" ]; then
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_BUILD_TYPE=${BUILD_TYPE}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -n "${DOVERBOSE}" ]; then
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_VERBOSE_MAKEFILE=1"
|
||||||
|
else
|
||||||
|
OPTIONS="${OPTIONS} -DCMAKE_VERBOSE_MAKEFILE=0"
|
||||||
|
fi
|
||||||
|
|
||||||
|
test -f "${BUILDDIR}/.build.log" && rm -f ${BUILDDIR}/.build.log
|
||||||
|
touch ${BUILDDIR}/.build.log
|
||||||
|
# log everything from here to .build.log
|
||||||
|
exec 1> >(exec -a 'build logging tee' tee -a ${BUILDDIR}/.build.log) 2>&1
|
||||||
|
echo "${HOST} started build at $(date)."
|
||||||
|
echo
|
||||||
|
|
||||||
|
configure ${OPTIONS} "$@"
|
||||||
|
|
||||||
|
if [ -n "${DOMAKE}" ]; then
|
||||||
|
test -n "${DOVERBOSE}" && compile VERBOSE=1 || compile
|
||||||
|
fi
|
||||||
|
|
||||||
|
DOT=$(which dot 2>/dev/null)
|
||||||
|
if [ -n "${DOT}" ]; then
|
||||||
|
${DOT} -Tpng -o${BUILDDIR}/libssh.png ${BUILDDIR}/libssh.dot
|
||||||
|
${DOT} -Tsvg -o${BUILDDIR}/libssh.svg ${BUILDDIR}/libssh.dot
|
||||||
|
fi
|
||||||
|
|
||||||
|
exec >&0 2>&0 # so that the logging tee finishes
|
||||||
|
sleep 1 # wait till tee terminates
|
||||||
|
|
||||||
|
cleanup_and_exit 0
|
||||||
@@ -1 +1 @@
|
|||||||
4.9.2
|
4.7.2
|
||||||
@@ -1,415 +0,0 @@
|
|||||||
_ssh_log
|
|
||||||
buffer_free
|
|
||||||
buffer_get
|
|
||||||
buffer_get_len
|
|
||||||
buffer_new
|
|
||||||
channel_accept_x11
|
|
||||||
channel_change_pty_size
|
|
||||||
channel_close
|
|
||||||
channel_forward_accept
|
|
||||||
channel_forward_cancel
|
|
||||||
channel_forward_listen
|
|
||||||
channel_free
|
|
||||||
channel_get_exit_status
|
|
||||||
channel_get_session
|
|
||||||
channel_is_closed
|
|
||||||
channel_is_eof
|
|
||||||
channel_is_open
|
|
||||||
channel_new
|
|
||||||
channel_open_forward
|
|
||||||
channel_open_session
|
|
||||||
channel_poll
|
|
||||||
channel_read
|
|
||||||
channel_read_buffer
|
|
||||||
channel_read_nonblocking
|
|
||||||
channel_request_env
|
|
||||||
channel_request_exec
|
|
||||||
channel_request_pty
|
|
||||||
channel_request_pty_size
|
|
||||||
channel_request_send_signal
|
|
||||||
channel_request_sftp
|
|
||||||
channel_request_shell
|
|
||||||
channel_request_subsystem
|
|
||||||
channel_request_x11
|
|
||||||
channel_select
|
|
||||||
channel_send_eof
|
|
||||||
channel_set_blocking
|
|
||||||
channel_write
|
|
||||||
channel_write_stderr
|
|
||||||
privatekey_free
|
|
||||||
privatekey_from_file
|
|
||||||
publickey_free
|
|
||||||
publickey_from_file
|
|
||||||
publickey_from_privatekey
|
|
||||||
publickey_to_string
|
|
||||||
sftp_async_read
|
|
||||||
sftp_async_read_begin
|
|
||||||
sftp_attributes_free
|
|
||||||
sftp_canonicalize_path
|
|
||||||
sftp_chmod
|
|
||||||
sftp_chown
|
|
||||||
sftp_client_message_free
|
|
||||||
sftp_client_message_get_data
|
|
||||||
sftp_client_message_get_filename
|
|
||||||
sftp_client_message_get_flags
|
|
||||||
sftp_client_message_get_submessage
|
|
||||||
sftp_client_message_get_type
|
|
||||||
sftp_client_message_set_filename
|
|
||||||
sftp_close
|
|
||||||
sftp_closedir
|
|
||||||
sftp_dir_eof
|
|
||||||
sftp_extension_supported
|
|
||||||
sftp_extensions_get_count
|
|
||||||
sftp_extensions_get_data
|
|
||||||
sftp_extensions_get_name
|
|
||||||
sftp_file_set_blocking
|
|
||||||
sftp_file_set_nonblocking
|
|
||||||
sftp_free
|
|
||||||
sftp_fstat
|
|
||||||
sftp_fstatvfs
|
|
||||||
sftp_fsync
|
|
||||||
sftp_get_client_message
|
|
||||||
sftp_get_error
|
|
||||||
sftp_handle
|
|
||||||
sftp_handle_alloc
|
|
||||||
sftp_handle_remove
|
|
||||||
sftp_init
|
|
||||||
sftp_lstat
|
|
||||||
sftp_mkdir
|
|
||||||
sftp_new
|
|
||||||
sftp_new_channel
|
|
||||||
sftp_open
|
|
||||||
sftp_opendir
|
|
||||||
sftp_read
|
|
||||||
sftp_readdir
|
|
||||||
sftp_readlink
|
|
||||||
sftp_rename
|
|
||||||
sftp_reply_attr
|
|
||||||
sftp_reply_data
|
|
||||||
sftp_reply_handle
|
|
||||||
sftp_reply_name
|
|
||||||
sftp_reply_names
|
|
||||||
sftp_reply_names_add
|
|
||||||
sftp_reply_status
|
|
||||||
sftp_rewind
|
|
||||||
sftp_rmdir
|
|
||||||
sftp_seek
|
|
||||||
sftp_seek64
|
|
||||||
sftp_send_client_message
|
|
||||||
sftp_server_init
|
|
||||||
sftp_server_new
|
|
||||||
sftp_server_version
|
|
||||||
sftp_setstat
|
|
||||||
sftp_stat
|
|
||||||
sftp_statvfs
|
|
||||||
sftp_statvfs_free
|
|
||||||
sftp_symlink
|
|
||||||
sftp_tell
|
|
||||||
sftp_tell64
|
|
||||||
sftp_unlink
|
|
||||||
sftp_utimes
|
|
||||||
sftp_write
|
|
||||||
ssh_accept
|
|
||||||
ssh_add_channel_callbacks
|
|
||||||
ssh_auth_list
|
|
||||||
ssh_basename
|
|
||||||
ssh_bind_accept
|
|
||||||
ssh_bind_accept_fd
|
|
||||||
ssh_bind_fd_toaccept
|
|
||||||
ssh_bind_free
|
|
||||||
ssh_bind_get_fd
|
|
||||||
ssh_bind_listen
|
|
||||||
ssh_bind_new
|
|
||||||
ssh_bind_options_set
|
|
||||||
ssh_bind_set_blocking
|
|
||||||
ssh_bind_set_callbacks
|
|
||||||
ssh_bind_set_fd
|
|
||||||
ssh_blocking_flush
|
|
||||||
ssh_buffer_add_data
|
|
||||||
ssh_buffer_free
|
|
||||||
ssh_buffer_get
|
|
||||||
ssh_buffer_get_data
|
|
||||||
ssh_buffer_get_len
|
|
||||||
ssh_buffer_new
|
|
||||||
ssh_buffer_reinit
|
|
||||||
ssh_channel_accept_forward
|
|
||||||
ssh_channel_accept_x11
|
|
||||||
ssh_channel_cancel_forward
|
|
||||||
ssh_channel_change_pty_size
|
|
||||||
ssh_channel_close
|
|
||||||
ssh_channel_free
|
|
||||||
ssh_channel_get_exit_status
|
|
||||||
ssh_channel_get_session
|
|
||||||
ssh_channel_is_closed
|
|
||||||
ssh_channel_is_eof
|
|
||||||
ssh_channel_is_open
|
|
||||||
ssh_channel_listen_forward
|
|
||||||
ssh_channel_new
|
|
||||||
ssh_channel_open_auth_agent
|
|
||||||
ssh_channel_open_forward
|
|
||||||
ssh_channel_open_reverse_forward
|
|
||||||
ssh_channel_open_session
|
|
||||||
ssh_channel_open_x11
|
|
||||||
ssh_channel_poll
|
|
||||||
ssh_channel_poll_timeout
|
|
||||||
ssh_channel_read
|
|
||||||
ssh_channel_read_nonblocking
|
|
||||||
ssh_channel_read_timeout
|
|
||||||
ssh_channel_request_auth_agent
|
|
||||||
ssh_channel_request_env
|
|
||||||
ssh_channel_request_exec
|
|
||||||
ssh_channel_request_pty
|
|
||||||
ssh_channel_request_pty_size
|
|
||||||
ssh_channel_request_send_break
|
|
||||||
ssh_channel_request_send_exit_signal
|
|
||||||
ssh_channel_request_send_exit_status
|
|
||||||
ssh_channel_request_send_signal
|
|
||||||
ssh_channel_request_sftp
|
|
||||||
ssh_channel_request_shell
|
|
||||||
ssh_channel_request_subsystem
|
|
||||||
ssh_channel_request_x11
|
|
||||||
ssh_channel_select
|
|
||||||
ssh_channel_send_eof
|
|
||||||
ssh_channel_set_blocking
|
|
||||||
ssh_channel_set_counter
|
|
||||||
ssh_channel_window_size
|
|
||||||
ssh_channel_write
|
|
||||||
ssh_channel_write_stderr
|
|
||||||
ssh_clean_pubkey_hash
|
|
||||||
ssh_connect
|
|
||||||
ssh_connector_free
|
|
||||||
ssh_connector_new
|
|
||||||
ssh_connector_set_in_channel
|
|
||||||
ssh_connector_set_in_fd
|
|
||||||
ssh_connector_set_out_channel
|
|
||||||
ssh_connector_set_out_fd
|
|
||||||
ssh_copyright
|
|
||||||
ssh_dirname
|
|
||||||
ssh_disconnect
|
|
||||||
ssh_dump_knownhost
|
|
||||||
ssh_event_add_connector
|
|
||||||
ssh_event_add_fd
|
|
||||||
ssh_event_add_session
|
|
||||||
ssh_event_dopoll
|
|
||||||
ssh_event_free
|
|
||||||
ssh_event_new
|
|
||||||
ssh_event_remove_connector
|
|
||||||
ssh_event_remove_fd
|
|
||||||
ssh_event_remove_session
|
|
||||||
ssh_execute_message_callbacks
|
|
||||||
ssh_finalize
|
|
||||||
ssh_forward_accept
|
|
||||||
ssh_forward_cancel
|
|
||||||
ssh_forward_listen
|
|
||||||
ssh_free
|
|
||||||
ssh_get_cipher_in
|
|
||||||
ssh_get_cipher_out
|
|
||||||
ssh_get_clientbanner
|
|
||||||
ssh_get_disconnect_message
|
|
||||||
ssh_get_error
|
|
||||||
ssh_get_error_code
|
|
||||||
ssh_get_fd
|
|
||||||
ssh_get_fingerprint_hash
|
|
||||||
ssh_get_hexa
|
|
||||||
ssh_get_hmac_in
|
|
||||||
ssh_get_hmac_out
|
|
||||||
ssh_get_issue_banner
|
|
||||||
ssh_get_kex_algo
|
|
||||||
ssh_get_log_callback
|
|
||||||
ssh_get_log_level
|
|
||||||
ssh_get_log_userdata
|
|
||||||
ssh_get_openssh_version
|
|
||||||
ssh_get_poll_flags
|
|
||||||
ssh_get_pubkey
|
|
||||||
ssh_get_pubkey_hash
|
|
||||||
ssh_get_publickey
|
|
||||||
ssh_get_publickey_hash
|
|
||||||
ssh_get_random
|
|
||||||
ssh_get_server_publickey
|
|
||||||
ssh_get_serverbanner
|
|
||||||
ssh_get_status
|
|
||||||
ssh_get_version
|
|
||||||
ssh_getpass
|
|
||||||
ssh_gssapi_get_creds
|
|
||||||
ssh_gssapi_set_creds
|
|
||||||
ssh_handle_key_exchange
|
|
||||||
ssh_init
|
|
||||||
ssh_is_blocking
|
|
||||||
ssh_is_connected
|
|
||||||
ssh_is_server_known
|
|
||||||
ssh_key_cmp
|
|
||||||
ssh_key_free
|
|
||||||
ssh_key_is_private
|
|
||||||
ssh_key_is_public
|
|
||||||
ssh_key_new
|
|
||||||
ssh_key_type
|
|
||||||
ssh_key_type_from_name
|
|
||||||
ssh_key_type_to_char
|
|
||||||
ssh_known_hosts_parse_line
|
|
||||||
ssh_knownhosts_entry_free
|
|
||||||
ssh_log
|
|
||||||
ssh_message_auth_interactive_request
|
|
||||||
ssh_message_auth_kbdint_is_response
|
|
||||||
ssh_message_auth_password
|
|
||||||
ssh_message_auth_pubkey
|
|
||||||
ssh_message_auth_publickey
|
|
||||||
ssh_message_auth_publickey_state
|
|
||||||
ssh_message_auth_reply_pk_ok
|
|
||||||
ssh_message_auth_reply_pk_ok_simple
|
|
||||||
ssh_message_auth_reply_success
|
|
||||||
ssh_message_auth_set_methods
|
|
||||||
ssh_message_auth_user
|
|
||||||
ssh_message_channel_request_channel
|
|
||||||
ssh_message_channel_request_command
|
|
||||||
ssh_message_channel_request_env_name
|
|
||||||
ssh_message_channel_request_env_value
|
|
||||||
ssh_message_channel_request_open_destination
|
|
||||||
ssh_message_channel_request_open_destination_port
|
|
||||||
ssh_message_channel_request_open_originator
|
|
||||||
ssh_message_channel_request_open_originator_port
|
|
||||||
ssh_message_channel_request_open_reply_accept
|
|
||||||
ssh_message_channel_request_pty_height
|
|
||||||
ssh_message_channel_request_pty_pxheight
|
|
||||||
ssh_message_channel_request_pty_pxwidth
|
|
||||||
ssh_message_channel_request_pty_term
|
|
||||||
ssh_message_channel_request_pty_width
|
|
||||||
ssh_message_channel_request_reply_success
|
|
||||||
ssh_message_channel_request_subsystem
|
|
||||||
ssh_message_channel_request_x11_auth_cookie
|
|
||||||
ssh_message_channel_request_x11_auth_protocol
|
|
||||||
ssh_message_channel_request_x11_screen_number
|
|
||||||
ssh_message_channel_request_x11_single_connection
|
|
||||||
ssh_message_free
|
|
||||||
ssh_message_get
|
|
||||||
ssh_message_global_request_address
|
|
||||||
ssh_message_global_request_port
|
|
||||||
ssh_message_global_request_reply_success
|
|
||||||
ssh_message_reply_default
|
|
||||||
ssh_message_retrieve
|
|
||||||
ssh_message_service_reply_success
|
|
||||||
ssh_message_service_service
|
|
||||||
ssh_message_subtype
|
|
||||||
ssh_message_type
|
|
||||||
ssh_mkdir
|
|
||||||
ssh_new
|
|
||||||
ssh_options_copy
|
|
||||||
ssh_options_get
|
|
||||||
ssh_options_get_port
|
|
||||||
ssh_options_getopt
|
|
||||||
ssh_options_parse_config
|
|
||||||
ssh_options_set
|
|
||||||
ssh_pcap_file_close
|
|
||||||
ssh_pcap_file_free
|
|
||||||
ssh_pcap_file_new
|
|
||||||
ssh_pcap_file_open
|
|
||||||
ssh_pki_copy_cert_to_privkey
|
|
||||||
ssh_pki_export_privkey_base64
|
|
||||||
ssh_pki_export_privkey_file
|
|
||||||
ssh_pki_export_privkey_to_pubkey
|
|
||||||
ssh_pki_export_pubkey_base64
|
|
||||||
ssh_pki_export_pubkey_file
|
|
||||||
ssh_pki_generate
|
|
||||||
ssh_pki_import_cert_base64
|
|
||||||
ssh_pki_import_cert_file
|
|
||||||
ssh_pki_import_privkey_base64
|
|
||||||
ssh_pki_import_privkey_file
|
|
||||||
ssh_pki_import_pubkey_base64
|
|
||||||
ssh_pki_import_pubkey_file
|
|
||||||
ssh_pki_key_ecdsa_name
|
|
||||||
ssh_print_hash
|
|
||||||
ssh_print_hexa
|
|
||||||
ssh_privatekey_type
|
|
||||||
ssh_publickey_to_file
|
|
||||||
ssh_remove_channel_callbacks
|
|
||||||
ssh_scp_accept_request
|
|
||||||
ssh_scp_close
|
|
||||||
ssh_scp_deny_request
|
|
||||||
ssh_scp_free
|
|
||||||
ssh_scp_init
|
|
||||||
ssh_scp_leave_directory
|
|
||||||
ssh_scp_new
|
|
||||||
ssh_scp_pull_request
|
|
||||||
ssh_scp_push_directory
|
|
||||||
ssh_scp_push_file
|
|
||||||
ssh_scp_push_file64
|
|
||||||
ssh_scp_read
|
|
||||||
ssh_scp_request_get_filename
|
|
||||||
ssh_scp_request_get_permissions
|
|
||||||
ssh_scp_request_get_size
|
|
||||||
ssh_scp_request_get_size64
|
|
||||||
ssh_scp_request_get_warning
|
|
||||||
ssh_scp_write
|
|
||||||
ssh_select
|
|
||||||
ssh_send_debug
|
|
||||||
ssh_send_ignore
|
|
||||||
ssh_send_keepalive
|
|
||||||
ssh_server_init_kex
|
|
||||||
ssh_service_request
|
|
||||||
ssh_session_export_known_hosts_entry
|
|
||||||
ssh_session_has_known_hosts_entry
|
|
||||||
ssh_session_is_known_server
|
|
||||||
ssh_session_update_known_hosts
|
|
||||||
ssh_set_agent_channel
|
|
||||||
ssh_set_agent_socket
|
|
||||||
ssh_set_auth_methods
|
|
||||||
ssh_set_blocking
|
|
||||||
ssh_set_callbacks
|
|
||||||
ssh_set_channel_callbacks
|
|
||||||
ssh_set_counters
|
|
||||||
ssh_set_fd_except
|
|
||||||
ssh_set_fd_toread
|
|
||||||
ssh_set_fd_towrite
|
|
||||||
ssh_set_log_callback
|
|
||||||
ssh_set_log_level
|
|
||||||
ssh_set_log_userdata
|
|
||||||
ssh_set_message_callback
|
|
||||||
ssh_set_pcap_file
|
|
||||||
ssh_set_server_callbacks
|
|
||||||
ssh_silent_disconnect
|
|
||||||
ssh_string_burn
|
|
||||||
ssh_string_copy
|
|
||||||
ssh_string_data
|
|
||||||
ssh_string_fill
|
|
||||||
ssh_string_free
|
|
||||||
ssh_string_free_char
|
|
||||||
ssh_string_from_char
|
|
||||||
ssh_string_get_char
|
|
||||||
ssh_string_len
|
|
||||||
ssh_string_new
|
|
||||||
ssh_string_to_char
|
|
||||||
ssh_threads_get_noop
|
|
||||||
ssh_threads_get_pthread
|
|
||||||
ssh_threads_set_callbacks
|
|
||||||
ssh_try_publickey_from_file
|
|
||||||
ssh_userauth_agent
|
|
||||||
ssh_userauth_agent_pubkey
|
|
||||||
ssh_userauth_autopubkey
|
|
||||||
ssh_userauth_gssapi
|
|
||||||
ssh_userauth_kbdint
|
|
||||||
ssh_userauth_kbdint_getanswer
|
|
||||||
ssh_userauth_kbdint_getinstruction
|
|
||||||
ssh_userauth_kbdint_getname
|
|
||||||
ssh_userauth_kbdint_getnanswers
|
|
||||||
ssh_userauth_kbdint_getnprompts
|
|
||||||
ssh_userauth_kbdint_getprompt
|
|
||||||
ssh_userauth_kbdint_setanswer
|
|
||||||
ssh_userauth_list
|
|
||||||
ssh_userauth_none
|
|
||||||
ssh_userauth_offer_pubkey
|
|
||||||
ssh_userauth_password
|
|
||||||
ssh_userauth_privatekey_file
|
|
||||||
ssh_userauth_pubkey
|
|
||||||
ssh_userauth_publickey
|
|
||||||
ssh_userauth_publickey_auto
|
|
||||||
ssh_userauth_try_publickey
|
|
||||||
ssh_version
|
|
||||||
ssh_write_knownhost
|
|
||||||
string_burn
|
|
||||||
string_copy
|
|
||||||
string_data
|
|
||||||
string_fill
|
|
||||||
string_free
|
|
||||||
string_from_char
|
|
||||||
string_len
|
|
||||||
string_new
|
|
||||||
string_to_char
|
|
||||||
@@ -1,415 +0,0 @@
|
|||||||
_ssh_log
|
|
||||||
buffer_free
|
|
||||||
buffer_get
|
|
||||||
buffer_get_len
|
|
||||||
buffer_new
|
|
||||||
channel_accept_x11
|
|
||||||
channel_change_pty_size
|
|
||||||
channel_close
|
|
||||||
channel_forward_accept
|
|
||||||
channel_forward_cancel
|
|
||||||
channel_forward_listen
|
|
||||||
channel_free
|
|
||||||
channel_get_exit_status
|
|
||||||
channel_get_session
|
|
||||||
channel_is_closed
|
|
||||||
channel_is_eof
|
|
||||||
channel_is_open
|
|
||||||
channel_new
|
|
||||||
channel_open_forward
|
|
||||||
channel_open_session
|
|
||||||
channel_poll
|
|
||||||
channel_read
|
|
||||||
channel_read_buffer
|
|
||||||
channel_read_nonblocking
|
|
||||||
channel_request_env
|
|
||||||
channel_request_exec
|
|
||||||
channel_request_pty
|
|
||||||
channel_request_pty_size
|
|
||||||
channel_request_send_signal
|
|
||||||
channel_request_sftp
|
|
||||||
channel_request_shell
|
|
||||||
channel_request_subsystem
|
|
||||||
channel_request_x11
|
|
||||||
channel_select
|
|
||||||
channel_send_eof
|
|
||||||
channel_set_blocking
|
|
||||||
channel_write
|
|
||||||
channel_write_stderr
|
|
||||||
privatekey_free
|
|
||||||
privatekey_from_file
|
|
||||||
publickey_free
|
|
||||||
publickey_from_file
|
|
||||||
publickey_from_privatekey
|
|
||||||
publickey_to_string
|
|
||||||
sftp_async_read
|
|
||||||
sftp_async_read_begin
|
|
||||||
sftp_attributes_free
|
|
||||||
sftp_canonicalize_path
|
|
||||||
sftp_chmod
|
|
||||||
sftp_chown
|
|
||||||
sftp_client_message_free
|
|
||||||
sftp_client_message_get_data
|
|
||||||
sftp_client_message_get_filename
|
|
||||||
sftp_client_message_get_flags
|
|
||||||
sftp_client_message_get_submessage
|
|
||||||
sftp_client_message_get_type
|
|
||||||
sftp_client_message_set_filename
|
|
||||||
sftp_close
|
|
||||||
sftp_closedir
|
|
||||||
sftp_dir_eof
|
|
||||||
sftp_extension_supported
|
|
||||||
sftp_extensions_get_count
|
|
||||||
sftp_extensions_get_data
|
|
||||||
sftp_extensions_get_name
|
|
||||||
sftp_file_set_blocking
|
|
||||||
sftp_file_set_nonblocking
|
|
||||||
sftp_free
|
|
||||||
sftp_fstat
|
|
||||||
sftp_fstatvfs
|
|
||||||
sftp_fsync
|
|
||||||
sftp_get_client_message
|
|
||||||
sftp_get_error
|
|
||||||
sftp_handle
|
|
||||||
sftp_handle_alloc
|
|
||||||
sftp_handle_remove
|
|
||||||
sftp_init
|
|
||||||
sftp_lstat
|
|
||||||
sftp_mkdir
|
|
||||||
sftp_new
|
|
||||||
sftp_new_channel
|
|
||||||
sftp_open
|
|
||||||
sftp_opendir
|
|
||||||
sftp_read
|
|
||||||
sftp_readdir
|
|
||||||
sftp_readlink
|
|
||||||
sftp_rename
|
|
||||||
sftp_reply_attr
|
|
||||||
sftp_reply_data
|
|
||||||
sftp_reply_handle
|
|
||||||
sftp_reply_name
|
|
||||||
sftp_reply_names
|
|
||||||
sftp_reply_names_add
|
|
||||||
sftp_reply_status
|
|
||||||
sftp_rewind
|
|
||||||
sftp_rmdir
|
|
||||||
sftp_seek
|
|
||||||
sftp_seek64
|
|
||||||
sftp_send_client_message
|
|
||||||
sftp_server_init
|
|
||||||
sftp_server_new
|
|
||||||
sftp_server_version
|
|
||||||
sftp_setstat
|
|
||||||
sftp_stat
|
|
||||||
sftp_statvfs
|
|
||||||
sftp_statvfs_free
|
|
||||||
sftp_symlink
|
|
||||||
sftp_tell
|
|
||||||
sftp_tell64
|
|
||||||
sftp_unlink
|
|
||||||
sftp_utimes
|
|
||||||
sftp_write
|
|
||||||
ssh_accept
|
|
||||||
ssh_add_channel_callbacks
|
|
||||||
ssh_auth_list
|
|
||||||
ssh_basename
|
|
||||||
ssh_bind_accept
|
|
||||||
ssh_bind_accept_fd
|
|
||||||
ssh_bind_fd_toaccept
|
|
||||||
ssh_bind_free
|
|
||||||
ssh_bind_get_fd
|
|
||||||
ssh_bind_listen
|
|
||||||
ssh_bind_new
|
|
||||||
ssh_bind_options_set
|
|
||||||
ssh_bind_set_blocking
|
|
||||||
ssh_bind_set_callbacks
|
|
||||||
ssh_bind_set_fd
|
|
||||||
ssh_blocking_flush
|
|
||||||
ssh_buffer_add_data
|
|
||||||
ssh_buffer_free
|
|
||||||
ssh_buffer_get
|
|
||||||
ssh_buffer_get_data
|
|
||||||
ssh_buffer_get_len
|
|
||||||
ssh_buffer_new
|
|
||||||
ssh_buffer_reinit
|
|
||||||
ssh_channel_accept_forward
|
|
||||||
ssh_channel_accept_x11
|
|
||||||
ssh_channel_cancel_forward
|
|
||||||
ssh_channel_change_pty_size
|
|
||||||
ssh_channel_close
|
|
||||||
ssh_channel_free
|
|
||||||
ssh_channel_get_exit_status
|
|
||||||
ssh_channel_get_session
|
|
||||||
ssh_channel_is_closed
|
|
||||||
ssh_channel_is_eof
|
|
||||||
ssh_channel_is_open
|
|
||||||
ssh_channel_listen_forward
|
|
||||||
ssh_channel_new
|
|
||||||
ssh_channel_open_auth_agent
|
|
||||||
ssh_channel_open_forward
|
|
||||||
ssh_channel_open_reverse_forward
|
|
||||||
ssh_channel_open_session
|
|
||||||
ssh_channel_open_x11
|
|
||||||
ssh_channel_poll
|
|
||||||
ssh_channel_poll_timeout
|
|
||||||
ssh_channel_read
|
|
||||||
ssh_channel_read_nonblocking
|
|
||||||
ssh_channel_read_timeout
|
|
||||||
ssh_channel_request_auth_agent
|
|
||||||
ssh_channel_request_env
|
|
||||||
ssh_channel_request_exec
|
|
||||||
ssh_channel_request_pty
|
|
||||||
ssh_channel_request_pty_size
|
|
||||||
ssh_channel_request_send_break
|
|
||||||
ssh_channel_request_send_exit_signal
|
|
||||||
ssh_channel_request_send_exit_status
|
|
||||||
ssh_channel_request_send_signal
|
|
||||||
ssh_channel_request_sftp
|
|
||||||
ssh_channel_request_shell
|
|
||||||
ssh_channel_request_subsystem
|
|
||||||
ssh_channel_request_x11
|
|
||||||
ssh_channel_select
|
|
||||||
ssh_channel_send_eof
|
|
||||||
ssh_channel_set_blocking
|
|
||||||
ssh_channel_set_counter
|
|
||||||
ssh_channel_window_size
|
|
||||||
ssh_channel_write
|
|
||||||
ssh_channel_write_stderr
|
|
||||||
ssh_clean_pubkey_hash
|
|
||||||
ssh_connect
|
|
||||||
ssh_connector_free
|
|
||||||
ssh_connector_new
|
|
||||||
ssh_connector_set_in_channel
|
|
||||||
ssh_connector_set_in_fd
|
|
||||||
ssh_connector_set_out_channel
|
|
||||||
ssh_connector_set_out_fd
|
|
||||||
ssh_copyright
|
|
||||||
ssh_dirname
|
|
||||||
ssh_disconnect
|
|
||||||
ssh_dump_knownhost
|
|
||||||
ssh_event_add_connector
|
|
||||||
ssh_event_add_fd
|
|
||||||
ssh_event_add_session
|
|
||||||
ssh_event_dopoll
|
|
||||||
ssh_event_free
|
|
||||||
ssh_event_new
|
|
||||||
ssh_event_remove_connector
|
|
||||||
ssh_event_remove_fd
|
|
||||||
ssh_event_remove_session
|
|
||||||
ssh_execute_message_callbacks
|
|
||||||
ssh_finalize
|
|
||||||
ssh_forward_accept
|
|
||||||
ssh_forward_cancel
|
|
||||||
ssh_forward_listen
|
|
||||||
ssh_free
|
|
||||||
ssh_get_cipher_in
|
|
||||||
ssh_get_cipher_out
|
|
||||||
ssh_get_clientbanner
|
|
||||||
ssh_get_disconnect_message
|
|
||||||
ssh_get_error
|
|
||||||
ssh_get_error_code
|
|
||||||
ssh_get_fd
|
|
||||||
ssh_get_fingerprint_hash
|
|
||||||
ssh_get_hexa
|
|
||||||
ssh_get_hmac_in
|
|
||||||
ssh_get_hmac_out
|
|
||||||
ssh_get_issue_banner
|
|
||||||
ssh_get_kex_algo
|
|
||||||
ssh_get_log_callback
|
|
||||||
ssh_get_log_level
|
|
||||||
ssh_get_log_userdata
|
|
||||||
ssh_get_openssh_version
|
|
||||||
ssh_get_poll_flags
|
|
||||||
ssh_get_pubkey
|
|
||||||
ssh_get_pubkey_hash
|
|
||||||
ssh_get_publickey
|
|
||||||
ssh_get_publickey_hash
|
|
||||||
ssh_get_random
|
|
||||||
ssh_get_server_publickey
|
|
||||||
ssh_get_serverbanner
|
|
||||||
ssh_get_status
|
|
||||||
ssh_get_version
|
|
||||||
ssh_getpass
|
|
||||||
ssh_gssapi_get_creds
|
|
||||||
ssh_gssapi_set_creds
|
|
||||||
ssh_handle_key_exchange
|
|
||||||
ssh_init
|
|
||||||
ssh_is_blocking
|
|
||||||
ssh_is_connected
|
|
||||||
ssh_is_server_known
|
|
||||||
ssh_key_cmp
|
|
||||||
ssh_key_free
|
|
||||||
ssh_key_is_private
|
|
||||||
ssh_key_is_public
|
|
||||||
ssh_key_new
|
|
||||||
ssh_key_type
|
|
||||||
ssh_key_type_from_name
|
|
||||||
ssh_key_type_to_char
|
|
||||||
ssh_known_hosts_parse_line
|
|
||||||
ssh_knownhosts_entry_free
|
|
||||||
ssh_log
|
|
||||||
ssh_message_auth_interactive_request
|
|
||||||
ssh_message_auth_kbdint_is_response
|
|
||||||
ssh_message_auth_password
|
|
||||||
ssh_message_auth_pubkey
|
|
||||||
ssh_message_auth_publickey
|
|
||||||
ssh_message_auth_publickey_state
|
|
||||||
ssh_message_auth_reply_pk_ok
|
|
||||||
ssh_message_auth_reply_pk_ok_simple
|
|
||||||
ssh_message_auth_reply_success
|
|
||||||
ssh_message_auth_set_methods
|
|
||||||
ssh_message_auth_user
|
|
||||||
ssh_message_channel_request_channel
|
|
||||||
ssh_message_channel_request_command
|
|
||||||
ssh_message_channel_request_env_name
|
|
||||||
ssh_message_channel_request_env_value
|
|
||||||
ssh_message_channel_request_open_destination
|
|
||||||
ssh_message_channel_request_open_destination_port
|
|
||||||
ssh_message_channel_request_open_originator
|
|
||||||
ssh_message_channel_request_open_originator_port
|
|
||||||
ssh_message_channel_request_open_reply_accept
|
|
||||||
ssh_message_channel_request_pty_height
|
|
||||||
ssh_message_channel_request_pty_pxheight
|
|
||||||
ssh_message_channel_request_pty_pxwidth
|
|
||||||
ssh_message_channel_request_pty_term
|
|
||||||
ssh_message_channel_request_pty_width
|
|
||||||
ssh_message_channel_request_reply_success
|
|
||||||
ssh_message_channel_request_subsystem
|
|
||||||
ssh_message_channel_request_x11_auth_cookie
|
|
||||||
ssh_message_channel_request_x11_auth_protocol
|
|
||||||
ssh_message_channel_request_x11_screen_number
|
|
||||||
ssh_message_channel_request_x11_single_connection
|
|
||||||
ssh_message_free
|
|
||||||
ssh_message_get
|
|
||||||
ssh_message_global_request_address
|
|
||||||
ssh_message_global_request_port
|
|
||||||
ssh_message_global_request_reply_success
|
|
||||||
ssh_message_reply_default
|
|
||||||
ssh_message_retrieve
|
|
||||||
ssh_message_service_reply_success
|
|
||||||
ssh_message_service_service
|
|
||||||
ssh_message_subtype
|
|
||||||
ssh_message_type
|
|
||||||
ssh_mkdir
|
|
||||||
ssh_new
|
|
||||||
ssh_options_copy
|
|
||||||
ssh_options_get
|
|
||||||
ssh_options_get_port
|
|
||||||
ssh_options_getopt
|
|
||||||
ssh_options_parse_config
|
|
||||||
ssh_options_set
|
|
||||||
ssh_pcap_file_close
|
|
||||||
ssh_pcap_file_free
|
|
||||||
ssh_pcap_file_new
|
|
||||||
ssh_pcap_file_open
|
|
||||||
ssh_pki_copy_cert_to_privkey
|
|
||||||
ssh_pki_export_privkey_base64
|
|
||||||
ssh_pki_export_privkey_file
|
|
||||||
ssh_pki_export_privkey_to_pubkey
|
|
||||||
ssh_pki_export_pubkey_base64
|
|
||||||
ssh_pki_export_pubkey_file
|
|
||||||
ssh_pki_generate
|
|
||||||
ssh_pki_import_cert_base64
|
|
||||||
ssh_pki_import_cert_file
|
|
||||||
ssh_pki_import_privkey_base64
|
|
||||||
ssh_pki_import_privkey_file
|
|
||||||
ssh_pki_import_pubkey_base64
|
|
||||||
ssh_pki_import_pubkey_file
|
|
||||||
ssh_pki_key_ecdsa_name
|
|
||||||
ssh_print_hash
|
|
||||||
ssh_print_hexa
|
|
||||||
ssh_privatekey_type
|
|
||||||
ssh_publickey_to_file
|
|
||||||
ssh_remove_channel_callbacks
|
|
||||||
ssh_scp_accept_request
|
|
||||||
ssh_scp_close
|
|
||||||
ssh_scp_deny_request
|
|
||||||
ssh_scp_free
|
|
||||||
ssh_scp_init
|
|
||||||
ssh_scp_leave_directory
|
|
||||||
ssh_scp_new
|
|
||||||
ssh_scp_pull_request
|
|
||||||
ssh_scp_push_directory
|
|
||||||
ssh_scp_push_file
|
|
||||||
ssh_scp_push_file64
|
|
||||||
ssh_scp_read
|
|
||||||
ssh_scp_request_get_filename
|
|
||||||
ssh_scp_request_get_permissions
|
|
||||||
ssh_scp_request_get_size
|
|
||||||
ssh_scp_request_get_size64
|
|
||||||
ssh_scp_request_get_warning
|
|
||||||
ssh_scp_write
|
|
||||||
ssh_select
|
|
||||||
ssh_send_debug
|
|
||||||
ssh_send_ignore
|
|
||||||
ssh_send_keepalive
|
|
||||||
ssh_server_init_kex
|
|
||||||
ssh_service_request
|
|
||||||
ssh_session_export_known_hosts_entry
|
|
||||||
ssh_session_has_known_hosts_entry
|
|
||||||
ssh_session_is_known_server
|
|
||||||
ssh_session_update_known_hosts
|
|
||||||
ssh_set_agent_channel
|
|
||||||
ssh_set_agent_socket
|
|
||||||
ssh_set_auth_methods
|
|
||||||
ssh_set_blocking
|
|
||||||
ssh_set_callbacks
|
|
||||||
ssh_set_channel_callbacks
|
|
||||||
ssh_set_counters
|
|
||||||
ssh_set_fd_except
|
|
||||||
ssh_set_fd_toread
|
|
||||||
ssh_set_fd_towrite
|
|
||||||
ssh_set_log_callback
|
|
||||||
ssh_set_log_level
|
|
||||||
ssh_set_log_userdata
|
|
||||||
ssh_set_message_callback
|
|
||||||
ssh_set_pcap_file
|
|
||||||
ssh_set_server_callbacks
|
|
||||||
ssh_silent_disconnect
|
|
||||||
ssh_string_burn
|
|
||||||
ssh_string_copy
|
|
||||||
ssh_string_data
|
|
||||||
ssh_string_fill
|
|
||||||
ssh_string_free
|
|
||||||
ssh_string_free_char
|
|
||||||
ssh_string_from_char
|
|
||||||
ssh_string_get_char
|
|
||||||
ssh_string_len
|
|
||||||
ssh_string_new
|
|
||||||
ssh_string_to_char
|
|
||||||
ssh_threads_get_noop
|
|
||||||
ssh_threads_get_pthread
|
|
||||||
ssh_threads_set_callbacks
|
|
||||||
ssh_try_publickey_from_file
|
|
||||||
ssh_userauth_agent
|
|
||||||
ssh_userauth_agent_pubkey
|
|
||||||
ssh_userauth_autopubkey
|
|
||||||
ssh_userauth_gssapi
|
|
||||||
ssh_userauth_kbdint
|
|
||||||
ssh_userauth_kbdint_getanswer
|
|
||||||
ssh_userauth_kbdint_getinstruction
|
|
||||||
ssh_userauth_kbdint_getname
|
|
||||||
ssh_userauth_kbdint_getnanswers
|
|
||||||
ssh_userauth_kbdint_getnprompts
|
|
||||||
ssh_userauth_kbdint_getprompt
|
|
||||||
ssh_userauth_kbdint_setanswer
|
|
||||||
ssh_userauth_list
|
|
||||||
ssh_userauth_none
|
|
||||||
ssh_userauth_offer_pubkey
|
|
||||||
ssh_userauth_password
|
|
||||||
ssh_userauth_privatekey_file
|
|
||||||
ssh_userauth_pubkey
|
|
||||||
ssh_userauth_publickey
|
|
||||||
ssh_userauth_publickey_auto
|
|
||||||
ssh_userauth_try_publickey
|
|
||||||
ssh_version
|
|
||||||
ssh_write_knownhost
|
|
||||||
string_burn
|
|
||||||
string_copy
|
|
||||||
string_data
|
|
||||||
string_fill
|
|
||||||
string_free
|
|
||||||
string_from_char
|
|
||||||
string_len
|
|
||||||
string_new
|
|
||||||
string_to_char
|
|
||||||
@@ -1,419 +0,0 @@
|
|||||||
_ssh_log
|
|
||||||
buffer_free
|
|
||||||
buffer_get
|
|
||||||
buffer_get_len
|
|
||||||
buffer_new
|
|
||||||
channel_accept_x11
|
|
||||||
channel_change_pty_size
|
|
||||||
channel_close
|
|
||||||
channel_forward_accept
|
|
||||||
channel_forward_cancel
|
|
||||||
channel_forward_listen
|
|
||||||
channel_free
|
|
||||||
channel_get_exit_status
|
|
||||||
channel_get_session
|
|
||||||
channel_is_closed
|
|
||||||
channel_is_eof
|
|
||||||
channel_is_open
|
|
||||||
channel_new
|
|
||||||
channel_open_forward
|
|
||||||
channel_open_session
|
|
||||||
channel_poll
|
|
||||||
channel_read
|
|
||||||
channel_read_buffer
|
|
||||||
channel_read_nonblocking
|
|
||||||
channel_request_env
|
|
||||||
channel_request_exec
|
|
||||||
channel_request_pty
|
|
||||||
channel_request_pty_size
|
|
||||||
channel_request_send_signal
|
|
||||||
channel_request_sftp
|
|
||||||
channel_request_shell
|
|
||||||
channel_request_subsystem
|
|
||||||
channel_request_x11
|
|
||||||
channel_select
|
|
||||||
channel_send_eof
|
|
||||||
channel_set_blocking
|
|
||||||
channel_write
|
|
||||||
channel_write_stderr
|
|
||||||
privatekey_free
|
|
||||||
privatekey_from_file
|
|
||||||
publickey_free
|
|
||||||
publickey_from_file
|
|
||||||
publickey_from_privatekey
|
|
||||||
publickey_to_string
|
|
||||||
sftp_async_read
|
|
||||||
sftp_async_read_begin
|
|
||||||
sftp_attributes_free
|
|
||||||
sftp_canonicalize_path
|
|
||||||
sftp_chmod
|
|
||||||
sftp_chown
|
|
||||||
sftp_client_message_free
|
|
||||||
sftp_client_message_get_data
|
|
||||||
sftp_client_message_get_filename
|
|
||||||
sftp_client_message_get_flags
|
|
||||||
sftp_client_message_get_submessage
|
|
||||||
sftp_client_message_get_type
|
|
||||||
sftp_client_message_set_filename
|
|
||||||
sftp_close
|
|
||||||
sftp_closedir
|
|
||||||
sftp_dir_eof
|
|
||||||
sftp_extension_supported
|
|
||||||
sftp_extensions_get_count
|
|
||||||
sftp_extensions_get_data
|
|
||||||
sftp_extensions_get_name
|
|
||||||
sftp_file_set_blocking
|
|
||||||
sftp_file_set_nonblocking
|
|
||||||
sftp_free
|
|
||||||
sftp_fstat
|
|
||||||
sftp_fstatvfs
|
|
||||||
sftp_fsync
|
|
||||||
sftp_get_client_message
|
|
||||||
sftp_get_error
|
|
||||||
sftp_handle
|
|
||||||
sftp_handle_alloc
|
|
||||||
sftp_handle_remove
|
|
||||||
sftp_init
|
|
||||||
sftp_lstat
|
|
||||||
sftp_mkdir
|
|
||||||
sftp_new
|
|
||||||
sftp_new_channel
|
|
||||||
sftp_open
|
|
||||||
sftp_opendir
|
|
||||||
sftp_read
|
|
||||||
sftp_readdir
|
|
||||||
sftp_readlink
|
|
||||||
sftp_rename
|
|
||||||
sftp_reply_attr
|
|
||||||
sftp_reply_data
|
|
||||||
sftp_reply_handle
|
|
||||||
sftp_reply_name
|
|
||||||
sftp_reply_names
|
|
||||||
sftp_reply_names_add
|
|
||||||
sftp_reply_status
|
|
||||||
sftp_rewind
|
|
||||||
sftp_rmdir
|
|
||||||
sftp_seek
|
|
||||||
sftp_seek64
|
|
||||||
sftp_send_client_message
|
|
||||||
sftp_server_free
|
|
||||||
sftp_server_init
|
|
||||||
sftp_server_new
|
|
||||||
sftp_server_version
|
|
||||||
sftp_setstat
|
|
||||||
sftp_stat
|
|
||||||
sftp_statvfs
|
|
||||||
sftp_statvfs_free
|
|
||||||
sftp_symlink
|
|
||||||
sftp_tell
|
|
||||||
sftp_tell64
|
|
||||||
sftp_unlink
|
|
||||||
sftp_utimes
|
|
||||||
sftp_write
|
|
||||||
ssh_accept
|
|
||||||
ssh_add_channel_callbacks
|
|
||||||
ssh_auth_list
|
|
||||||
ssh_basename
|
|
||||||
ssh_bind_accept
|
|
||||||
ssh_bind_accept_fd
|
|
||||||
ssh_bind_fd_toaccept
|
|
||||||
ssh_bind_free
|
|
||||||
ssh_bind_get_fd
|
|
||||||
ssh_bind_listen
|
|
||||||
ssh_bind_new
|
|
||||||
ssh_bind_options_parse_config
|
|
||||||
ssh_bind_options_set
|
|
||||||
ssh_bind_set_blocking
|
|
||||||
ssh_bind_set_callbacks
|
|
||||||
ssh_bind_set_fd
|
|
||||||
ssh_blocking_flush
|
|
||||||
ssh_buffer_add_data
|
|
||||||
ssh_buffer_free
|
|
||||||
ssh_buffer_get
|
|
||||||
ssh_buffer_get_data
|
|
||||||
ssh_buffer_get_len
|
|
||||||
ssh_buffer_new
|
|
||||||
ssh_buffer_reinit
|
|
||||||
ssh_channel_accept_forward
|
|
||||||
ssh_channel_accept_x11
|
|
||||||
ssh_channel_cancel_forward
|
|
||||||
ssh_channel_change_pty_size
|
|
||||||
ssh_channel_close
|
|
||||||
ssh_channel_free
|
|
||||||
ssh_channel_get_exit_status
|
|
||||||
ssh_channel_get_session
|
|
||||||
ssh_channel_is_closed
|
|
||||||
ssh_channel_is_eof
|
|
||||||
ssh_channel_is_open
|
|
||||||
ssh_channel_listen_forward
|
|
||||||
ssh_channel_new
|
|
||||||
ssh_channel_open_auth_agent
|
|
||||||
ssh_channel_open_forward
|
|
||||||
ssh_channel_open_forward_unix
|
|
||||||
ssh_channel_open_reverse_forward
|
|
||||||
ssh_channel_open_session
|
|
||||||
ssh_channel_open_x11
|
|
||||||
ssh_channel_poll
|
|
||||||
ssh_channel_poll_timeout
|
|
||||||
ssh_channel_read
|
|
||||||
ssh_channel_read_nonblocking
|
|
||||||
ssh_channel_read_timeout
|
|
||||||
ssh_channel_request_auth_agent
|
|
||||||
ssh_channel_request_env
|
|
||||||
ssh_channel_request_exec
|
|
||||||
ssh_channel_request_pty
|
|
||||||
ssh_channel_request_pty_size
|
|
||||||
ssh_channel_request_send_break
|
|
||||||
ssh_channel_request_send_exit_signal
|
|
||||||
ssh_channel_request_send_exit_status
|
|
||||||
ssh_channel_request_send_signal
|
|
||||||
ssh_channel_request_sftp
|
|
||||||
ssh_channel_request_shell
|
|
||||||
ssh_channel_request_subsystem
|
|
||||||
ssh_channel_request_x11
|
|
||||||
ssh_channel_select
|
|
||||||
ssh_channel_send_eof
|
|
||||||
ssh_channel_set_blocking
|
|
||||||
ssh_channel_set_counter
|
|
||||||
ssh_channel_window_size
|
|
||||||
ssh_channel_write
|
|
||||||
ssh_channel_write_stderr
|
|
||||||
ssh_clean_pubkey_hash
|
|
||||||
ssh_connect
|
|
||||||
ssh_connector_free
|
|
||||||
ssh_connector_new
|
|
||||||
ssh_connector_set_in_channel
|
|
||||||
ssh_connector_set_in_fd
|
|
||||||
ssh_connector_set_out_channel
|
|
||||||
ssh_connector_set_out_fd
|
|
||||||
ssh_copyright
|
|
||||||
ssh_dirname
|
|
||||||
ssh_disconnect
|
|
||||||
ssh_dump_knownhost
|
|
||||||
ssh_event_add_connector
|
|
||||||
ssh_event_add_fd
|
|
||||||
ssh_event_add_session
|
|
||||||
ssh_event_dopoll
|
|
||||||
ssh_event_free
|
|
||||||
ssh_event_new
|
|
||||||
ssh_event_remove_connector
|
|
||||||
ssh_event_remove_fd
|
|
||||||
ssh_event_remove_session
|
|
||||||
ssh_execute_message_callbacks
|
|
||||||
ssh_finalize
|
|
||||||
ssh_forward_accept
|
|
||||||
ssh_forward_cancel
|
|
||||||
ssh_forward_listen
|
|
||||||
ssh_free
|
|
||||||
ssh_get_cipher_in
|
|
||||||
ssh_get_cipher_out
|
|
||||||
ssh_get_clientbanner
|
|
||||||
ssh_get_disconnect_message
|
|
||||||
ssh_get_error
|
|
||||||
ssh_get_error_code
|
|
||||||
ssh_get_fd
|
|
||||||
ssh_get_fingerprint_hash
|
|
||||||
ssh_get_hexa
|
|
||||||
ssh_get_hmac_in
|
|
||||||
ssh_get_hmac_out
|
|
||||||
ssh_get_issue_banner
|
|
||||||
ssh_get_kex_algo
|
|
||||||
ssh_get_log_callback
|
|
||||||
ssh_get_log_level
|
|
||||||
ssh_get_log_userdata
|
|
||||||
ssh_get_openssh_version
|
|
||||||
ssh_get_poll_flags
|
|
||||||
ssh_get_pubkey
|
|
||||||
ssh_get_pubkey_hash
|
|
||||||
ssh_get_publickey
|
|
||||||
ssh_get_publickey_hash
|
|
||||||
ssh_get_random
|
|
||||||
ssh_get_server_publickey
|
|
||||||
ssh_get_serverbanner
|
|
||||||
ssh_get_status
|
|
||||||
ssh_get_version
|
|
||||||
ssh_getpass
|
|
||||||
ssh_gssapi_get_creds
|
|
||||||
ssh_gssapi_set_creds
|
|
||||||
ssh_handle_key_exchange
|
|
||||||
ssh_init
|
|
||||||
ssh_is_blocking
|
|
||||||
ssh_is_connected
|
|
||||||
ssh_is_server_known
|
|
||||||
ssh_key_cmp
|
|
||||||
ssh_key_free
|
|
||||||
ssh_key_is_private
|
|
||||||
ssh_key_is_public
|
|
||||||
ssh_key_new
|
|
||||||
ssh_key_type
|
|
||||||
ssh_key_type_from_name
|
|
||||||
ssh_key_type_to_char
|
|
||||||
ssh_known_hosts_parse_line
|
|
||||||
ssh_knownhosts_entry_free
|
|
||||||
ssh_log
|
|
||||||
ssh_message_auth_interactive_request
|
|
||||||
ssh_message_auth_kbdint_is_response
|
|
||||||
ssh_message_auth_password
|
|
||||||
ssh_message_auth_pubkey
|
|
||||||
ssh_message_auth_publickey
|
|
||||||
ssh_message_auth_publickey_state
|
|
||||||
ssh_message_auth_reply_pk_ok
|
|
||||||
ssh_message_auth_reply_pk_ok_simple
|
|
||||||
ssh_message_auth_reply_success
|
|
||||||
ssh_message_auth_set_methods
|
|
||||||
ssh_message_auth_user
|
|
||||||
ssh_message_channel_request_channel
|
|
||||||
ssh_message_channel_request_command
|
|
||||||
ssh_message_channel_request_env_name
|
|
||||||
ssh_message_channel_request_env_value
|
|
||||||
ssh_message_channel_request_open_destination
|
|
||||||
ssh_message_channel_request_open_destination_port
|
|
||||||
ssh_message_channel_request_open_originator
|
|
||||||
ssh_message_channel_request_open_originator_port
|
|
||||||
ssh_message_channel_request_open_reply_accept
|
|
||||||
ssh_message_channel_request_open_reply_accept_channel
|
|
||||||
ssh_message_channel_request_pty_height
|
|
||||||
ssh_message_channel_request_pty_pxheight
|
|
||||||
ssh_message_channel_request_pty_pxwidth
|
|
||||||
ssh_message_channel_request_pty_term
|
|
||||||
ssh_message_channel_request_pty_width
|
|
||||||
ssh_message_channel_request_reply_success
|
|
||||||
ssh_message_channel_request_subsystem
|
|
||||||
ssh_message_channel_request_x11_auth_cookie
|
|
||||||
ssh_message_channel_request_x11_auth_protocol
|
|
||||||
ssh_message_channel_request_x11_screen_number
|
|
||||||
ssh_message_channel_request_x11_single_connection
|
|
||||||
ssh_message_free
|
|
||||||
ssh_message_get
|
|
||||||
ssh_message_global_request_address
|
|
||||||
ssh_message_global_request_port
|
|
||||||
ssh_message_global_request_reply_success
|
|
||||||
ssh_message_reply_default
|
|
||||||
ssh_message_retrieve
|
|
||||||
ssh_message_service_reply_success
|
|
||||||
ssh_message_service_service
|
|
||||||
ssh_message_subtype
|
|
||||||
ssh_message_type
|
|
||||||
ssh_mkdir
|
|
||||||
ssh_new
|
|
||||||
ssh_options_copy
|
|
||||||
ssh_options_get
|
|
||||||
ssh_options_get_port
|
|
||||||
ssh_options_getopt
|
|
||||||
ssh_options_parse_config
|
|
||||||
ssh_options_set
|
|
||||||
ssh_pcap_file_close
|
|
||||||
ssh_pcap_file_free
|
|
||||||
ssh_pcap_file_new
|
|
||||||
ssh_pcap_file_open
|
|
||||||
ssh_pki_copy_cert_to_privkey
|
|
||||||
ssh_pki_export_privkey_base64
|
|
||||||
ssh_pki_export_privkey_file
|
|
||||||
ssh_pki_export_privkey_to_pubkey
|
|
||||||
ssh_pki_export_pubkey_base64
|
|
||||||
ssh_pki_export_pubkey_file
|
|
||||||
ssh_pki_generate
|
|
||||||
ssh_pki_import_cert_base64
|
|
||||||
ssh_pki_import_cert_file
|
|
||||||
ssh_pki_import_privkey_base64
|
|
||||||
ssh_pki_import_privkey_file
|
|
||||||
ssh_pki_import_pubkey_base64
|
|
||||||
ssh_pki_import_pubkey_file
|
|
||||||
ssh_pki_key_ecdsa_name
|
|
||||||
ssh_print_hash
|
|
||||||
ssh_print_hexa
|
|
||||||
ssh_privatekey_type
|
|
||||||
ssh_publickey_to_file
|
|
||||||
ssh_remove_channel_callbacks
|
|
||||||
ssh_scp_accept_request
|
|
||||||
ssh_scp_close
|
|
||||||
ssh_scp_deny_request
|
|
||||||
ssh_scp_free
|
|
||||||
ssh_scp_init
|
|
||||||
ssh_scp_leave_directory
|
|
||||||
ssh_scp_new
|
|
||||||
ssh_scp_pull_request
|
|
||||||
ssh_scp_push_directory
|
|
||||||
ssh_scp_push_file
|
|
||||||
ssh_scp_push_file64
|
|
||||||
ssh_scp_read
|
|
||||||
ssh_scp_request_get_filename
|
|
||||||
ssh_scp_request_get_permissions
|
|
||||||
ssh_scp_request_get_size
|
|
||||||
ssh_scp_request_get_size64
|
|
||||||
ssh_scp_request_get_warning
|
|
||||||
ssh_scp_write
|
|
||||||
ssh_select
|
|
||||||
ssh_send_debug
|
|
||||||
ssh_send_ignore
|
|
||||||
ssh_send_keepalive
|
|
||||||
ssh_server_init_kex
|
|
||||||
ssh_service_request
|
|
||||||
ssh_session_export_known_hosts_entry
|
|
||||||
ssh_session_has_known_hosts_entry
|
|
||||||
ssh_session_is_known_server
|
|
||||||
ssh_session_update_known_hosts
|
|
||||||
ssh_set_agent_channel
|
|
||||||
ssh_set_agent_socket
|
|
||||||
ssh_set_auth_methods
|
|
||||||
ssh_set_blocking
|
|
||||||
ssh_set_callbacks
|
|
||||||
ssh_set_channel_callbacks
|
|
||||||
ssh_set_counters
|
|
||||||
ssh_set_fd_except
|
|
||||||
ssh_set_fd_toread
|
|
||||||
ssh_set_fd_towrite
|
|
||||||
ssh_set_log_callback
|
|
||||||
ssh_set_log_level
|
|
||||||
ssh_set_log_userdata
|
|
||||||
ssh_set_message_callback
|
|
||||||
ssh_set_pcap_file
|
|
||||||
ssh_set_server_callbacks
|
|
||||||
ssh_silent_disconnect
|
|
||||||
ssh_string_burn
|
|
||||||
ssh_string_copy
|
|
||||||
ssh_string_data
|
|
||||||
ssh_string_fill
|
|
||||||
ssh_string_free
|
|
||||||
ssh_string_free_char
|
|
||||||
ssh_string_from_char
|
|
||||||
ssh_string_get_char
|
|
||||||
ssh_string_len
|
|
||||||
ssh_string_new
|
|
||||||
ssh_string_to_char
|
|
||||||
ssh_threads_get_noop
|
|
||||||
ssh_threads_get_pthread
|
|
||||||
ssh_threads_set_callbacks
|
|
||||||
ssh_try_publickey_from_file
|
|
||||||
ssh_userauth_agent
|
|
||||||
ssh_userauth_agent_pubkey
|
|
||||||
ssh_userauth_autopubkey
|
|
||||||
ssh_userauth_gssapi
|
|
||||||
ssh_userauth_kbdint
|
|
||||||
ssh_userauth_kbdint_getanswer
|
|
||||||
ssh_userauth_kbdint_getinstruction
|
|
||||||
ssh_userauth_kbdint_getname
|
|
||||||
ssh_userauth_kbdint_getnanswers
|
|
||||||
ssh_userauth_kbdint_getnprompts
|
|
||||||
ssh_userauth_kbdint_getprompt
|
|
||||||
ssh_userauth_kbdint_setanswer
|
|
||||||
ssh_userauth_list
|
|
||||||
ssh_userauth_none
|
|
||||||
ssh_userauth_offer_pubkey
|
|
||||||
ssh_userauth_password
|
|
||||||
ssh_userauth_privatekey_file
|
|
||||||
ssh_userauth_pubkey
|
|
||||||
ssh_userauth_publickey
|
|
||||||
ssh_userauth_publickey_auto
|
|
||||||
ssh_userauth_try_publickey
|
|
||||||
ssh_version
|
|
||||||
ssh_write_knownhost
|
|
||||||
string_burn
|
|
||||||
string_copy
|
|
||||||
string_data
|
|
||||||
string_fill
|
|
||||||
string_free
|
|
||||||
string_from_char
|
|
||||||
string_len
|
|
||||||
string_new
|
|
||||||
string_to_char
|
|
||||||
@@ -1,421 +0,0 @@
|
|||||||
_ssh_log
|
|
||||||
buffer_free
|
|
||||||
buffer_get
|
|
||||||
buffer_get_len
|
|
||||||
buffer_new
|
|
||||||
channel_accept_x11
|
|
||||||
channel_change_pty_size
|
|
||||||
channel_close
|
|
||||||
channel_forward_accept
|
|
||||||
channel_forward_cancel
|
|
||||||
channel_forward_listen
|
|
||||||
channel_free
|
|
||||||
channel_get_exit_status
|
|
||||||
channel_get_session
|
|
||||||
channel_is_closed
|
|
||||||
channel_is_eof
|
|
||||||
channel_is_open
|
|
||||||
channel_new
|
|
||||||
channel_open_forward
|
|
||||||
channel_open_session
|
|
||||||
channel_poll
|
|
||||||
channel_read
|
|
||||||
channel_read_buffer
|
|
||||||
channel_read_nonblocking
|
|
||||||
channel_request_env
|
|
||||||
channel_request_exec
|
|
||||||
channel_request_pty
|
|
||||||
channel_request_pty_size
|
|
||||||
channel_request_send_signal
|
|
||||||
channel_request_sftp
|
|
||||||
channel_request_shell
|
|
||||||
channel_request_subsystem
|
|
||||||
channel_request_x11
|
|
||||||
channel_select
|
|
||||||
channel_send_eof
|
|
||||||
channel_set_blocking
|
|
||||||
channel_write
|
|
||||||
channel_write_stderr
|
|
||||||
privatekey_free
|
|
||||||
privatekey_from_file
|
|
||||||
publickey_free
|
|
||||||
publickey_from_file
|
|
||||||
publickey_from_privatekey
|
|
||||||
publickey_to_string
|
|
||||||
sftp_async_read
|
|
||||||
sftp_async_read_begin
|
|
||||||
sftp_attributes_free
|
|
||||||
sftp_canonicalize_path
|
|
||||||
sftp_chmod
|
|
||||||
sftp_chown
|
|
||||||
sftp_client_message_free
|
|
||||||
sftp_client_message_get_data
|
|
||||||
sftp_client_message_get_filename
|
|
||||||
sftp_client_message_get_flags
|
|
||||||
sftp_client_message_get_submessage
|
|
||||||
sftp_client_message_get_type
|
|
||||||
sftp_client_message_set_filename
|
|
||||||
sftp_close
|
|
||||||
sftp_closedir
|
|
||||||
sftp_dir_eof
|
|
||||||
sftp_extension_supported
|
|
||||||
sftp_extensions_get_count
|
|
||||||
sftp_extensions_get_data
|
|
||||||
sftp_extensions_get_name
|
|
||||||
sftp_file_set_blocking
|
|
||||||
sftp_file_set_nonblocking
|
|
||||||
sftp_free
|
|
||||||
sftp_fstat
|
|
||||||
sftp_fstatvfs
|
|
||||||
sftp_fsync
|
|
||||||
sftp_get_client_message
|
|
||||||
sftp_get_error
|
|
||||||
sftp_handle
|
|
||||||
sftp_handle_alloc
|
|
||||||
sftp_handle_remove
|
|
||||||
sftp_init
|
|
||||||
sftp_lstat
|
|
||||||
sftp_mkdir
|
|
||||||
sftp_new
|
|
||||||
sftp_new_channel
|
|
||||||
sftp_open
|
|
||||||
sftp_opendir
|
|
||||||
sftp_read
|
|
||||||
sftp_readdir
|
|
||||||
sftp_readlink
|
|
||||||
sftp_rename
|
|
||||||
sftp_reply_attr
|
|
||||||
sftp_reply_data
|
|
||||||
sftp_reply_handle
|
|
||||||
sftp_reply_name
|
|
||||||
sftp_reply_names
|
|
||||||
sftp_reply_names_add
|
|
||||||
sftp_reply_status
|
|
||||||
sftp_rewind
|
|
||||||
sftp_rmdir
|
|
||||||
sftp_seek
|
|
||||||
sftp_seek64
|
|
||||||
sftp_send_client_message
|
|
||||||
sftp_server_free
|
|
||||||
sftp_server_init
|
|
||||||
sftp_server_new
|
|
||||||
sftp_server_version
|
|
||||||
sftp_setstat
|
|
||||||
sftp_stat
|
|
||||||
sftp_statvfs
|
|
||||||
sftp_statvfs_free
|
|
||||||
sftp_symlink
|
|
||||||
sftp_tell
|
|
||||||
sftp_tell64
|
|
||||||
sftp_unlink
|
|
||||||
sftp_utimes
|
|
||||||
sftp_write
|
|
||||||
ssh_accept
|
|
||||||
ssh_add_channel_callbacks
|
|
||||||
ssh_auth_list
|
|
||||||
ssh_basename
|
|
||||||
ssh_bind_accept
|
|
||||||
ssh_bind_accept_fd
|
|
||||||
ssh_bind_fd_toaccept
|
|
||||||
ssh_bind_free
|
|
||||||
ssh_bind_get_fd
|
|
||||||
ssh_bind_listen
|
|
||||||
ssh_bind_new
|
|
||||||
ssh_bind_options_parse_config
|
|
||||||
ssh_bind_options_set
|
|
||||||
ssh_bind_set_blocking
|
|
||||||
ssh_bind_set_callbacks
|
|
||||||
ssh_bind_set_fd
|
|
||||||
ssh_blocking_flush
|
|
||||||
ssh_buffer_add_data
|
|
||||||
ssh_buffer_free
|
|
||||||
ssh_buffer_get
|
|
||||||
ssh_buffer_get_data
|
|
||||||
ssh_buffer_get_len
|
|
||||||
ssh_buffer_new
|
|
||||||
ssh_buffer_reinit
|
|
||||||
ssh_channel_accept_forward
|
|
||||||
ssh_channel_accept_x11
|
|
||||||
ssh_channel_cancel_forward
|
|
||||||
ssh_channel_change_pty_size
|
|
||||||
ssh_channel_close
|
|
||||||
ssh_channel_free
|
|
||||||
ssh_channel_get_exit_status
|
|
||||||
ssh_channel_get_session
|
|
||||||
ssh_channel_is_closed
|
|
||||||
ssh_channel_is_eof
|
|
||||||
ssh_channel_is_open
|
|
||||||
ssh_channel_listen_forward
|
|
||||||
ssh_channel_new
|
|
||||||
ssh_channel_open_auth_agent
|
|
||||||
ssh_channel_open_forward
|
|
||||||
ssh_channel_open_forward_unix
|
|
||||||
ssh_channel_open_reverse_forward
|
|
||||||
ssh_channel_open_session
|
|
||||||
ssh_channel_open_x11
|
|
||||||
ssh_channel_poll
|
|
||||||
ssh_channel_poll_timeout
|
|
||||||
ssh_channel_read
|
|
||||||
ssh_channel_read_nonblocking
|
|
||||||
ssh_channel_read_timeout
|
|
||||||
ssh_channel_request_auth_agent
|
|
||||||
ssh_channel_request_env
|
|
||||||
ssh_channel_request_exec
|
|
||||||
ssh_channel_request_pty
|
|
||||||
ssh_channel_request_pty_size
|
|
||||||
ssh_channel_request_send_break
|
|
||||||
ssh_channel_request_send_exit_signal
|
|
||||||
ssh_channel_request_send_exit_status
|
|
||||||
ssh_channel_request_send_signal
|
|
||||||
ssh_channel_request_sftp
|
|
||||||
ssh_channel_request_shell
|
|
||||||
ssh_channel_request_subsystem
|
|
||||||
ssh_channel_request_x11
|
|
||||||
ssh_channel_select
|
|
||||||
ssh_channel_send_eof
|
|
||||||
ssh_channel_set_blocking
|
|
||||||
ssh_channel_set_counter
|
|
||||||
ssh_channel_window_size
|
|
||||||
ssh_channel_write
|
|
||||||
ssh_channel_write_stderr
|
|
||||||
ssh_clean_pubkey_hash
|
|
||||||
ssh_connect
|
|
||||||
ssh_connector_free
|
|
||||||
ssh_connector_new
|
|
||||||
ssh_connector_set_in_channel
|
|
||||||
ssh_connector_set_in_fd
|
|
||||||
ssh_connector_set_out_channel
|
|
||||||
ssh_connector_set_out_fd
|
|
||||||
ssh_copyright
|
|
||||||
ssh_dirname
|
|
||||||
ssh_disconnect
|
|
||||||
ssh_dump_knownhost
|
|
||||||
ssh_event_add_connector
|
|
||||||
ssh_event_add_fd
|
|
||||||
ssh_event_add_session
|
|
||||||
ssh_event_dopoll
|
|
||||||
ssh_event_free
|
|
||||||
ssh_event_new
|
|
||||||
ssh_event_remove_connector
|
|
||||||
ssh_event_remove_fd
|
|
||||||
ssh_event_remove_session
|
|
||||||
ssh_execute_message_callbacks
|
|
||||||
ssh_finalize
|
|
||||||
ssh_forward_accept
|
|
||||||
ssh_forward_cancel
|
|
||||||
ssh_forward_listen
|
|
||||||
ssh_free
|
|
||||||
ssh_get_cipher_in
|
|
||||||
ssh_get_cipher_out
|
|
||||||
ssh_get_clientbanner
|
|
||||||
ssh_get_disconnect_message
|
|
||||||
ssh_get_error
|
|
||||||
ssh_get_error_code
|
|
||||||
ssh_get_fd
|
|
||||||
ssh_get_fingerprint_hash
|
|
||||||
ssh_get_hexa
|
|
||||||
ssh_get_hmac_in
|
|
||||||
ssh_get_hmac_out
|
|
||||||
ssh_get_issue_banner
|
|
||||||
ssh_get_kex_algo
|
|
||||||
ssh_get_log_callback
|
|
||||||
ssh_get_log_level
|
|
||||||
ssh_get_log_userdata
|
|
||||||
ssh_get_openssh_version
|
|
||||||
ssh_get_poll_flags
|
|
||||||
ssh_get_pubkey
|
|
||||||
ssh_get_pubkey_hash
|
|
||||||
ssh_get_publickey
|
|
||||||
ssh_get_publickey_hash
|
|
||||||
ssh_get_random
|
|
||||||
ssh_get_server_publickey
|
|
||||||
ssh_get_serverbanner
|
|
||||||
ssh_get_status
|
|
||||||
ssh_get_version
|
|
||||||
ssh_getpass
|
|
||||||
ssh_gssapi_get_creds
|
|
||||||
ssh_gssapi_set_creds
|
|
||||||
ssh_handle_key_exchange
|
|
||||||
ssh_init
|
|
||||||
ssh_is_blocking
|
|
||||||
ssh_is_connected
|
|
||||||
ssh_is_server_known
|
|
||||||
ssh_key_cmp
|
|
||||||
ssh_key_free
|
|
||||||
ssh_key_is_private
|
|
||||||
ssh_key_is_public
|
|
||||||
ssh_key_new
|
|
||||||
ssh_key_type
|
|
||||||
ssh_key_type_from_name
|
|
||||||
ssh_key_type_to_char
|
|
||||||
ssh_known_hosts_parse_line
|
|
||||||
ssh_knownhosts_entry_free
|
|
||||||
ssh_log
|
|
||||||
ssh_message_auth_interactive_request
|
|
||||||
ssh_message_auth_kbdint_is_response
|
|
||||||
ssh_message_auth_password
|
|
||||||
ssh_message_auth_pubkey
|
|
||||||
ssh_message_auth_publickey
|
|
||||||
ssh_message_auth_publickey_state
|
|
||||||
ssh_message_auth_reply_pk_ok
|
|
||||||
ssh_message_auth_reply_pk_ok_simple
|
|
||||||
ssh_message_auth_reply_success
|
|
||||||
ssh_message_auth_set_methods
|
|
||||||
ssh_message_auth_user
|
|
||||||
ssh_message_channel_request_channel
|
|
||||||
ssh_message_channel_request_command
|
|
||||||
ssh_message_channel_request_env_name
|
|
||||||
ssh_message_channel_request_env_value
|
|
||||||
ssh_message_channel_request_open_destination
|
|
||||||
ssh_message_channel_request_open_destination_port
|
|
||||||
ssh_message_channel_request_open_originator
|
|
||||||
ssh_message_channel_request_open_originator_port
|
|
||||||
ssh_message_channel_request_open_reply_accept
|
|
||||||
ssh_message_channel_request_open_reply_accept_channel
|
|
||||||
ssh_message_channel_request_pty_height
|
|
||||||
ssh_message_channel_request_pty_pxheight
|
|
||||||
ssh_message_channel_request_pty_pxwidth
|
|
||||||
ssh_message_channel_request_pty_term
|
|
||||||
ssh_message_channel_request_pty_width
|
|
||||||
ssh_message_channel_request_reply_success
|
|
||||||
ssh_message_channel_request_subsystem
|
|
||||||
ssh_message_channel_request_x11_auth_cookie
|
|
||||||
ssh_message_channel_request_x11_auth_protocol
|
|
||||||
ssh_message_channel_request_x11_screen_number
|
|
||||||
ssh_message_channel_request_x11_single_connection
|
|
||||||
ssh_message_free
|
|
||||||
ssh_message_get
|
|
||||||
ssh_message_global_request_address
|
|
||||||
ssh_message_global_request_port
|
|
||||||
ssh_message_global_request_reply_success
|
|
||||||
ssh_message_reply_default
|
|
||||||
ssh_message_retrieve
|
|
||||||
ssh_message_service_reply_success
|
|
||||||
ssh_message_service_service
|
|
||||||
ssh_message_subtype
|
|
||||||
ssh_message_type
|
|
||||||
ssh_mkdir
|
|
||||||
ssh_new
|
|
||||||
ssh_options_copy
|
|
||||||
ssh_options_get
|
|
||||||
ssh_options_get_port
|
|
||||||
ssh_options_getopt
|
|
||||||
ssh_options_parse_config
|
|
||||||
ssh_options_set
|
|
||||||
ssh_pcap_file_close
|
|
||||||
ssh_pcap_file_free
|
|
||||||
ssh_pcap_file_new
|
|
||||||
ssh_pcap_file_open
|
|
||||||
ssh_pki_copy_cert_to_privkey
|
|
||||||
ssh_pki_export_privkey_base64
|
|
||||||
ssh_pki_export_privkey_file
|
|
||||||
ssh_pki_export_privkey_to_pubkey
|
|
||||||
ssh_pki_export_pubkey_base64
|
|
||||||
ssh_pki_export_pubkey_file
|
|
||||||
ssh_pki_generate
|
|
||||||
ssh_pki_import_cert_base64
|
|
||||||
ssh_pki_import_cert_file
|
|
||||||
ssh_pki_import_privkey_base64
|
|
||||||
ssh_pki_import_privkey_file
|
|
||||||
ssh_pki_import_pubkey_base64
|
|
||||||
ssh_pki_import_pubkey_file
|
|
||||||
ssh_pki_key_ecdsa_name
|
|
||||||
ssh_print_hash
|
|
||||||
ssh_print_hexa
|
|
||||||
ssh_privatekey_type
|
|
||||||
ssh_publickey_to_file
|
|
||||||
ssh_remove_channel_callbacks
|
|
||||||
ssh_scp_accept_request
|
|
||||||
ssh_scp_close
|
|
||||||
ssh_scp_deny_request
|
|
||||||
ssh_scp_free
|
|
||||||
ssh_scp_init
|
|
||||||
ssh_scp_leave_directory
|
|
||||||
ssh_scp_new
|
|
||||||
ssh_scp_pull_request
|
|
||||||
ssh_scp_push_directory
|
|
||||||
ssh_scp_push_file
|
|
||||||
ssh_scp_push_file64
|
|
||||||
ssh_scp_read
|
|
||||||
ssh_scp_request_get_filename
|
|
||||||
ssh_scp_request_get_permissions
|
|
||||||
ssh_scp_request_get_size
|
|
||||||
ssh_scp_request_get_size64
|
|
||||||
ssh_scp_request_get_warning
|
|
||||||
ssh_scp_write
|
|
||||||
ssh_select
|
|
||||||
ssh_send_debug
|
|
||||||
ssh_send_ignore
|
|
||||||
ssh_send_keepalive
|
|
||||||
ssh_server_init_kex
|
|
||||||
ssh_service_request
|
|
||||||
ssh_session_export_known_hosts_entry
|
|
||||||
ssh_session_get_known_hosts_entry
|
|
||||||
ssh_session_has_known_hosts_entry
|
|
||||||
ssh_session_is_known_server
|
|
||||||
ssh_session_update_known_hosts
|
|
||||||
ssh_set_agent_channel
|
|
||||||
ssh_set_agent_socket
|
|
||||||
ssh_set_auth_methods
|
|
||||||
ssh_set_blocking
|
|
||||||
ssh_set_callbacks
|
|
||||||
ssh_set_channel_callbacks
|
|
||||||
ssh_set_counters
|
|
||||||
ssh_set_fd_except
|
|
||||||
ssh_set_fd_toread
|
|
||||||
ssh_set_fd_towrite
|
|
||||||
ssh_set_log_callback
|
|
||||||
ssh_set_log_level
|
|
||||||
ssh_set_log_userdata
|
|
||||||
ssh_set_message_callback
|
|
||||||
ssh_set_pcap_file
|
|
||||||
ssh_set_server_callbacks
|
|
||||||
ssh_silent_disconnect
|
|
||||||
ssh_string_burn
|
|
||||||
ssh_string_copy
|
|
||||||
ssh_string_data
|
|
||||||
ssh_string_fill
|
|
||||||
ssh_string_free
|
|
||||||
ssh_string_free_char
|
|
||||||
ssh_string_from_char
|
|
||||||
ssh_string_get_char
|
|
||||||
ssh_string_len
|
|
||||||
ssh_string_new
|
|
||||||
ssh_string_to_char
|
|
||||||
ssh_threads_get_default
|
|
||||||
ssh_threads_get_noop
|
|
||||||
ssh_threads_get_pthread
|
|
||||||
ssh_threads_set_callbacks
|
|
||||||
ssh_try_publickey_from_file
|
|
||||||
ssh_userauth_agent
|
|
||||||
ssh_userauth_agent_pubkey
|
|
||||||
ssh_userauth_autopubkey
|
|
||||||
ssh_userauth_gssapi
|
|
||||||
ssh_userauth_kbdint
|
|
||||||
ssh_userauth_kbdint_getanswer
|
|
||||||
ssh_userauth_kbdint_getinstruction
|
|
||||||
ssh_userauth_kbdint_getname
|
|
||||||
ssh_userauth_kbdint_getnanswers
|
|
||||||
ssh_userauth_kbdint_getnprompts
|
|
||||||
ssh_userauth_kbdint_getprompt
|
|
||||||
ssh_userauth_kbdint_setanswer
|
|
||||||
ssh_userauth_list
|
|
||||||
ssh_userauth_none
|
|
||||||
ssh_userauth_offer_pubkey
|
|
||||||
ssh_userauth_password
|
|
||||||
ssh_userauth_privatekey_file
|
|
||||||
ssh_userauth_pubkey
|
|
||||||
ssh_userauth_publickey
|
|
||||||
ssh_userauth_publickey_auto
|
|
||||||
ssh_userauth_try_publickey
|
|
||||||
ssh_version
|
|
||||||
ssh_write_knownhost
|
|
||||||
string_burn
|
|
||||||
string_copy
|
|
||||||
string_data
|
|
||||||
string_fill
|
|
||||||
string_free
|
|
||||||
string_from_char
|
|
||||||
string_len
|
|
||||||
string_new
|
|
||||||
string_to_char
|
|
||||||
@@ -1,427 +0,0 @@
|
|||||||
_ssh_log
|
|
||||||
buffer_free
|
|
||||||
buffer_get
|
|
||||||
buffer_get_len
|
|
||||||
buffer_new
|
|
||||||
channel_accept_x11
|
|
||||||
channel_change_pty_size
|
|
||||||
channel_close
|
|
||||||
channel_forward_accept
|
|
||||||
channel_forward_cancel
|
|
||||||
channel_forward_listen
|
|
||||||
channel_free
|
|
||||||
channel_get_exit_status
|
|
||||||
channel_get_session
|
|
||||||
channel_is_closed
|
|
||||||
channel_is_eof
|
|
||||||
channel_is_open
|
|
||||||
channel_new
|
|
||||||
channel_open_forward
|
|
||||||
channel_open_session
|
|
||||||
channel_poll
|
|
||||||
channel_read
|
|
||||||
channel_read_buffer
|
|
||||||
channel_read_nonblocking
|
|
||||||
channel_request_env
|
|
||||||
channel_request_exec
|
|
||||||
channel_request_pty
|
|
||||||
channel_request_pty_size
|
|
||||||
channel_request_send_signal
|
|
||||||
channel_request_sftp
|
|
||||||
channel_request_shell
|
|
||||||
channel_request_subsystem
|
|
||||||
channel_request_x11
|
|
||||||
channel_select
|
|
||||||
channel_send_eof
|
|
||||||
channel_set_blocking
|
|
||||||
channel_write
|
|
||||||
channel_write_stderr
|
|
||||||
privatekey_free
|
|
||||||
privatekey_from_file
|
|
||||||
publickey_free
|
|
||||||
publickey_from_file
|
|
||||||
publickey_from_privatekey
|
|
||||||
publickey_to_string
|
|
||||||
sftp_async_read
|
|
||||||
sftp_async_read_begin
|
|
||||||
sftp_attributes_free
|
|
||||||
sftp_canonicalize_path
|
|
||||||
sftp_chmod
|
|
||||||
sftp_chown
|
|
||||||
sftp_client_message_free
|
|
||||||
sftp_client_message_get_data
|
|
||||||
sftp_client_message_get_filename
|
|
||||||
sftp_client_message_get_flags
|
|
||||||
sftp_client_message_get_submessage
|
|
||||||
sftp_client_message_get_type
|
|
||||||
sftp_client_message_set_filename
|
|
||||||
sftp_close
|
|
||||||
sftp_closedir
|
|
||||||
sftp_dir_eof
|
|
||||||
sftp_extension_supported
|
|
||||||
sftp_extensions_get_count
|
|
||||||
sftp_extensions_get_data
|
|
||||||
sftp_extensions_get_name
|
|
||||||
sftp_file_set_blocking
|
|
||||||
sftp_file_set_nonblocking
|
|
||||||
sftp_free
|
|
||||||
sftp_fstat
|
|
||||||
sftp_fstatvfs
|
|
||||||
sftp_fsync
|
|
||||||
sftp_get_client_message
|
|
||||||
sftp_get_error
|
|
||||||
sftp_handle
|
|
||||||
sftp_handle_alloc
|
|
||||||
sftp_handle_remove
|
|
||||||
sftp_init
|
|
||||||
sftp_lstat
|
|
||||||
sftp_mkdir
|
|
||||||
sftp_new
|
|
||||||
sftp_new_channel
|
|
||||||
sftp_open
|
|
||||||
sftp_opendir
|
|
||||||
sftp_read
|
|
||||||
sftp_readdir
|
|
||||||
sftp_readlink
|
|
||||||
sftp_rename
|
|
||||||
sftp_reply_attr
|
|
||||||
sftp_reply_data
|
|
||||||
sftp_reply_handle
|
|
||||||
sftp_reply_name
|
|
||||||
sftp_reply_names
|
|
||||||
sftp_reply_names_add
|
|
||||||
sftp_reply_status
|
|
||||||
sftp_rewind
|
|
||||||
sftp_rmdir
|
|
||||||
sftp_seek
|
|
||||||
sftp_seek64
|
|
||||||
sftp_send_client_message
|
|
||||||
sftp_server_free
|
|
||||||
sftp_server_init
|
|
||||||
sftp_server_new
|
|
||||||
sftp_server_version
|
|
||||||
sftp_setstat
|
|
||||||
sftp_stat
|
|
||||||
sftp_statvfs
|
|
||||||
sftp_statvfs_free
|
|
||||||
sftp_symlink
|
|
||||||
sftp_tell
|
|
||||||
sftp_tell64
|
|
||||||
sftp_unlink
|
|
||||||
sftp_utimes
|
|
||||||
sftp_write
|
|
||||||
ssh_accept
|
|
||||||
ssh_add_channel_callbacks
|
|
||||||
ssh_auth_list
|
|
||||||
ssh_basename
|
|
||||||
ssh_bind_accept
|
|
||||||
ssh_bind_accept_fd
|
|
||||||
ssh_bind_fd_toaccept
|
|
||||||
ssh_bind_free
|
|
||||||
ssh_bind_get_fd
|
|
||||||
ssh_bind_listen
|
|
||||||
ssh_bind_new
|
|
||||||
ssh_bind_options_parse_config
|
|
||||||
ssh_bind_options_set
|
|
||||||
ssh_bind_set_blocking
|
|
||||||
ssh_bind_set_callbacks
|
|
||||||
ssh_bind_set_fd
|
|
||||||
ssh_blocking_flush
|
|
||||||
ssh_buffer_add_data
|
|
||||||
ssh_buffer_free
|
|
||||||
ssh_buffer_get
|
|
||||||
ssh_buffer_get_data
|
|
||||||
ssh_buffer_get_len
|
|
||||||
ssh_buffer_new
|
|
||||||
ssh_buffer_reinit
|
|
||||||
ssh_channel_accept_forward
|
|
||||||
ssh_channel_accept_x11
|
|
||||||
ssh_channel_cancel_forward
|
|
||||||
ssh_channel_change_pty_size
|
|
||||||
ssh_channel_close
|
|
||||||
ssh_channel_free
|
|
||||||
ssh_channel_get_exit_status
|
|
||||||
ssh_channel_get_session
|
|
||||||
ssh_channel_is_closed
|
|
||||||
ssh_channel_is_eof
|
|
||||||
ssh_channel_is_open
|
|
||||||
ssh_channel_listen_forward
|
|
||||||
ssh_channel_new
|
|
||||||
ssh_channel_open_auth_agent
|
|
||||||
ssh_channel_open_forward
|
|
||||||
ssh_channel_open_forward_port
|
|
||||||
ssh_channel_open_forward_unix
|
|
||||||
ssh_channel_open_reverse_forward
|
|
||||||
ssh_channel_open_session
|
|
||||||
ssh_channel_open_x11
|
|
||||||
ssh_channel_poll
|
|
||||||
ssh_channel_poll_timeout
|
|
||||||
ssh_channel_read
|
|
||||||
ssh_channel_read_nonblocking
|
|
||||||
ssh_channel_read_timeout
|
|
||||||
ssh_channel_request_auth_agent
|
|
||||||
ssh_channel_request_env
|
|
||||||
ssh_channel_request_exec
|
|
||||||
ssh_channel_request_pty
|
|
||||||
ssh_channel_request_pty_size
|
|
||||||
ssh_channel_request_send_break
|
|
||||||
ssh_channel_request_send_exit_signal
|
|
||||||
ssh_channel_request_send_exit_status
|
|
||||||
ssh_channel_request_send_signal
|
|
||||||
ssh_channel_request_sftp
|
|
||||||
ssh_channel_request_shell
|
|
||||||
ssh_channel_request_subsystem
|
|
||||||
ssh_channel_request_x11
|
|
||||||
ssh_channel_select
|
|
||||||
ssh_channel_send_eof
|
|
||||||
ssh_channel_set_blocking
|
|
||||||
ssh_channel_set_counter
|
|
||||||
ssh_channel_window_size
|
|
||||||
ssh_channel_write
|
|
||||||
ssh_channel_write_stderr
|
|
||||||
ssh_clean_pubkey_hash
|
|
||||||
ssh_connect
|
|
||||||
ssh_connector_free
|
|
||||||
ssh_connector_new
|
|
||||||
ssh_connector_set_in_channel
|
|
||||||
ssh_connector_set_in_fd
|
|
||||||
ssh_connector_set_out_channel
|
|
||||||
ssh_connector_set_out_fd
|
|
||||||
ssh_copyright
|
|
||||||
ssh_dirname
|
|
||||||
ssh_disconnect
|
|
||||||
ssh_dump_knownhost
|
|
||||||
ssh_event_add_connector
|
|
||||||
ssh_event_add_fd
|
|
||||||
ssh_event_add_session
|
|
||||||
ssh_event_dopoll
|
|
||||||
ssh_event_free
|
|
||||||
ssh_event_new
|
|
||||||
ssh_event_remove_connector
|
|
||||||
ssh_event_remove_fd
|
|
||||||
ssh_event_remove_session
|
|
||||||
ssh_execute_message_callbacks
|
|
||||||
ssh_finalize
|
|
||||||
ssh_forward_accept
|
|
||||||
ssh_forward_cancel
|
|
||||||
ssh_forward_listen
|
|
||||||
ssh_free
|
|
||||||
ssh_get_cipher_in
|
|
||||||
ssh_get_cipher_out
|
|
||||||
ssh_get_clientbanner
|
|
||||||
ssh_get_disconnect_message
|
|
||||||
ssh_get_error
|
|
||||||
ssh_get_error_code
|
|
||||||
ssh_get_fd
|
|
||||||
ssh_get_fingerprint_hash
|
|
||||||
ssh_get_hexa
|
|
||||||
ssh_get_hmac_in
|
|
||||||
ssh_get_hmac_out
|
|
||||||
ssh_get_issue_banner
|
|
||||||
ssh_get_kex_algo
|
|
||||||
ssh_get_log_callback
|
|
||||||
ssh_get_log_level
|
|
||||||
ssh_get_log_userdata
|
|
||||||
ssh_get_openssh_version
|
|
||||||
ssh_get_poll_flags
|
|
||||||
ssh_get_pubkey
|
|
||||||
ssh_get_pubkey_hash
|
|
||||||
ssh_get_publickey
|
|
||||||
ssh_get_publickey_hash
|
|
||||||
ssh_get_random
|
|
||||||
ssh_get_server_publickey
|
|
||||||
ssh_get_serverbanner
|
|
||||||
ssh_get_status
|
|
||||||
ssh_get_version
|
|
||||||
ssh_getpass
|
|
||||||
ssh_gssapi_get_creds
|
|
||||||
ssh_gssapi_set_creds
|
|
||||||
ssh_handle_key_exchange
|
|
||||||
ssh_init
|
|
||||||
ssh_is_blocking
|
|
||||||
ssh_is_connected
|
|
||||||
ssh_is_server_known
|
|
||||||
ssh_key_cmp
|
|
||||||
ssh_key_dup
|
|
||||||
ssh_key_free
|
|
||||||
ssh_key_is_private
|
|
||||||
ssh_key_is_public
|
|
||||||
ssh_key_new
|
|
||||||
ssh_key_type
|
|
||||||
ssh_key_type_from_name
|
|
||||||
ssh_key_type_to_char
|
|
||||||
ssh_known_hosts_parse_line
|
|
||||||
ssh_knownhosts_entry_free
|
|
||||||
ssh_log
|
|
||||||
ssh_message_auth_interactive_request
|
|
||||||
ssh_message_auth_kbdint_is_response
|
|
||||||
ssh_message_auth_password
|
|
||||||
ssh_message_auth_pubkey
|
|
||||||
ssh_message_auth_publickey
|
|
||||||
ssh_message_auth_publickey_state
|
|
||||||
ssh_message_auth_reply_pk_ok
|
|
||||||
ssh_message_auth_reply_pk_ok_simple
|
|
||||||
ssh_message_auth_reply_success
|
|
||||||
ssh_message_auth_set_methods
|
|
||||||
ssh_message_auth_user
|
|
||||||
ssh_message_channel_request_channel
|
|
||||||
ssh_message_channel_request_command
|
|
||||||
ssh_message_channel_request_env_name
|
|
||||||
ssh_message_channel_request_env_value
|
|
||||||
ssh_message_channel_request_open_destination
|
|
||||||
ssh_message_channel_request_open_destination_port
|
|
||||||
ssh_message_channel_request_open_originator
|
|
||||||
ssh_message_channel_request_open_originator_port
|
|
||||||
ssh_message_channel_request_open_reply_accept
|
|
||||||
ssh_message_channel_request_open_reply_accept_channel
|
|
||||||
ssh_message_channel_request_pty_height
|
|
||||||
ssh_message_channel_request_pty_pxheight
|
|
||||||
ssh_message_channel_request_pty_pxwidth
|
|
||||||
ssh_message_channel_request_pty_term
|
|
||||||
ssh_message_channel_request_pty_width
|
|
||||||
ssh_message_channel_request_reply_success
|
|
||||||
ssh_message_channel_request_subsystem
|
|
||||||
ssh_message_channel_request_x11_auth_cookie
|
|
||||||
ssh_message_channel_request_x11_auth_protocol
|
|
||||||
ssh_message_channel_request_x11_screen_number
|
|
||||||
ssh_message_channel_request_x11_single_connection
|
|
||||||
ssh_message_free
|
|
||||||
ssh_message_get
|
|
||||||
ssh_message_global_request_address
|
|
||||||
ssh_message_global_request_port
|
|
||||||
ssh_message_global_request_reply_success
|
|
||||||
ssh_message_reply_default
|
|
||||||
ssh_message_retrieve
|
|
||||||
ssh_message_service_reply_success
|
|
||||||
ssh_message_service_service
|
|
||||||
ssh_message_subtype
|
|
||||||
ssh_message_type
|
|
||||||
ssh_mkdir
|
|
||||||
ssh_new
|
|
||||||
ssh_options_copy
|
|
||||||
ssh_options_get
|
|
||||||
ssh_options_get_port
|
|
||||||
ssh_options_getopt
|
|
||||||
ssh_options_parse_config
|
|
||||||
ssh_options_set
|
|
||||||
ssh_pcap_file_close
|
|
||||||
ssh_pcap_file_free
|
|
||||||
ssh_pcap_file_new
|
|
||||||
ssh_pcap_file_open
|
|
||||||
ssh_pki_copy_cert_to_privkey
|
|
||||||
ssh_pki_export_privkey_base64
|
|
||||||
ssh_pki_export_privkey_file
|
|
||||||
ssh_pki_export_privkey_to_pubkey
|
|
||||||
ssh_pki_export_pubkey_base64
|
|
||||||
ssh_pki_export_pubkey_file
|
|
||||||
ssh_pki_generate
|
|
||||||
ssh_pki_import_cert_base64
|
|
||||||
ssh_pki_import_cert_file
|
|
||||||
ssh_pki_import_privkey_base64
|
|
||||||
ssh_pki_import_privkey_file
|
|
||||||
ssh_pki_import_pubkey_base64
|
|
||||||
ssh_pki_import_pubkey_file
|
|
||||||
ssh_pki_key_ecdsa_name
|
|
||||||
ssh_print_hash
|
|
||||||
ssh_print_hexa
|
|
||||||
ssh_privatekey_type
|
|
||||||
ssh_publickey_to_file
|
|
||||||
ssh_remove_channel_callbacks
|
|
||||||
ssh_scp_accept_request
|
|
||||||
ssh_scp_close
|
|
||||||
ssh_scp_deny_request
|
|
||||||
ssh_scp_free
|
|
||||||
ssh_scp_init
|
|
||||||
ssh_scp_leave_directory
|
|
||||||
ssh_scp_new
|
|
||||||
ssh_scp_pull_request
|
|
||||||
ssh_scp_push_directory
|
|
||||||
ssh_scp_push_file
|
|
||||||
ssh_scp_push_file64
|
|
||||||
ssh_scp_read
|
|
||||||
ssh_scp_request_get_filename
|
|
||||||
ssh_scp_request_get_permissions
|
|
||||||
ssh_scp_request_get_size
|
|
||||||
ssh_scp_request_get_size64
|
|
||||||
ssh_scp_request_get_warning
|
|
||||||
ssh_scp_write
|
|
||||||
ssh_select
|
|
||||||
ssh_send_debug
|
|
||||||
ssh_send_ignore
|
|
||||||
ssh_send_issue_banner
|
|
||||||
ssh_send_keepalive
|
|
||||||
ssh_server_init_kex
|
|
||||||
ssh_service_request
|
|
||||||
ssh_session_export_known_hosts_entry
|
|
||||||
ssh_session_get_known_hosts_entry
|
|
||||||
ssh_session_has_known_hosts_entry
|
|
||||||
ssh_session_is_known_server
|
|
||||||
ssh_session_set_disconnect_message
|
|
||||||
ssh_session_update_known_hosts
|
|
||||||
ssh_set_agent_channel
|
|
||||||
ssh_set_agent_socket
|
|
||||||
ssh_set_auth_methods
|
|
||||||
ssh_set_blocking
|
|
||||||
ssh_set_callbacks
|
|
||||||
ssh_set_channel_callbacks
|
|
||||||
ssh_set_counters
|
|
||||||
ssh_set_fd_except
|
|
||||||
ssh_set_fd_toread
|
|
||||||
ssh_set_fd_towrite
|
|
||||||
ssh_set_log_callback
|
|
||||||
ssh_set_log_level
|
|
||||||
ssh_set_log_userdata
|
|
||||||
ssh_set_message_callback
|
|
||||||
ssh_set_pcap_file
|
|
||||||
ssh_set_server_callbacks
|
|
||||||
ssh_silent_disconnect
|
|
||||||
ssh_string_burn
|
|
||||||
ssh_string_copy
|
|
||||||
ssh_string_data
|
|
||||||
ssh_string_fill
|
|
||||||
ssh_string_free
|
|
||||||
ssh_string_free_char
|
|
||||||
ssh_string_from_char
|
|
||||||
ssh_string_get_char
|
|
||||||
ssh_string_len
|
|
||||||
ssh_string_new
|
|
||||||
ssh_string_to_char
|
|
||||||
ssh_threads_get_default
|
|
||||||
ssh_threads_get_noop
|
|
||||||
ssh_threads_get_pthread
|
|
||||||
ssh_threads_set_callbacks
|
|
||||||
ssh_try_publickey_from_file
|
|
||||||
ssh_userauth_agent
|
|
||||||
ssh_userauth_agent_pubkey
|
|
||||||
ssh_userauth_autopubkey
|
|
||||||
ssh_userauth_gssapi
|
|
||||||
ssh_userauth_kbdint
|
|
||||||
ssh_userauth_kbdint_getanswer
|
|
||||||
ssh_userauth_kbdint_getinstruction
|
|
||||||
ssh_userauth_kbdint_getname
|
|
||||||
ssh_userauth_kbdint_getnanswers
|
|
||||||
ssh_userauth_kbdint_getnprompts
|
|
||||||
ssh_userauth_kbdint_getprompt
|
|
||||||
ssh_userauth_kbdint_setanswer
|
|
||||||
ssh_userauth_list
|
|
||||||
ssh_userauth_none
|
|
||||||
ssh_userauth_offer_pubkey
|
|
||||||
ssh_userauth_password
|
|
||||||
ssh_userauth_privatekey_file
|
|
||||||
ssh_userauth_pubkey
|
|
||||||
ssh_userauth_publickey
|
|
||||||
ssh_userauth_publickey_auto
|
|
||||||
ssh_userauth_publickey_auto_get_current_identity
|
|
||||||
ssh_userauth_try_publickey
|
|
||||||
ssh_version
|
|
||||||
ssh_vlog
|
|
||||||
ssh_write_knownhost
|
|
||||||
string_burn
|
|
||||||
string_copy
|
|
||||||
string_data
|
|
||||||
string_fill
|
|
||||||
string_free
|
|
||||||
string_from_char
|
|
||||||
string_len
|
|
||||||
string_new
|
|
||||||
string_to_char
|
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user