aboutsummaryrefslogtreecommitdiff
path: root/src/channels1.c
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2018-06-28 17:52:58 +0200
committerAndreas Schneider <asn@cryptomilk.org>2018-06-29 14:41:14 +0200
commit206f3ff895d3d822ac4f23426136537129f9f062 (patch)
tree59728e18437ec9308d14a50082ef831b5b158612 /src/channels1.c
parent81b4320318966e83678641a06717c301b071971b (diff)
downloadlibssh-206f3ff895d3d822ac4f23426136537129f9f062.tar.gz
libssh-206f3ff895d3d822ac4f23426136537129f9f062.tar.xz
libssh-206f3ff895d3d822ac4f23426136537129f9f062.zip
Rest in Peace SSHv1
Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
Diffstat (limited to 'src/channels1.c')
-rw-r--r--src/channels1.c397
1 files changed, 0 insertions, 397 deletions
diff --git a/src/channels1.c b/src/channels1.c
deleted file mode 100644
index e93f7bd6..00000000
--- a/src/channels1.c
+++ /dev/null
@@ -1,397 +0,0 @@
-/*
- * channels1.c - Support for SSH-1 type channels
- *
- * This file is part of the SSH Library
- *
- * Copyright (c) 2003-2008 by Aris Adamantiadis
- * Copyright (c) 2009 by Andreas Schneider <asn@cryptomilk.org>
- *
- * The SSH Library is free software; you can redistribute it and/or modify
- * it under the terms of the GNU Lesser General Public License as published by
- * the Free Software Foundation; either version 2.1 of the License, or (at your
- * option) any later version.
- *
- * The SSH Library is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
- * License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public License
- * along with the SSH Library; see the file COPYING. If not, write to
- * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
- * MA 02111-1307, USA.
- */
-
-#include "config.h"
-
-#include <string.h>
-#include <stdlib.h>
-#include <stdio.h>
-#ifndef _WIN32
-#include <arpa/inet.h>
-#endif
-#ifdef HAVE_UNISTD_H
-#include <unistd.h>
-#endif
-
-#include "libssh/priv.h"
-#include "libssh/ssh1.h"
-#include "libssh/buffer.h"
-#include "libssh/packet.h"
-#include "libssh/channels.h"
-#include "libssh/session.h"
-#include "libssh/misc.h"
-
-#ifdef WITH_SSH1
-
-/*
- * This is a big hack. In fact, SSH1 doesn't make a clever use of channels.
- * The whole packets concerning shells are sent outside of a channel.
- * Thus, an inside limitation of this behavior is that you can't only
- * request one shell.
- * The question is still how they managed to embed two "channel" into one
- * protocol.
- */
-
-int ssh_channel_open_session1(ssh_channel chan) {
- ssh_session session;
-
- if (chan == NULL) {
- return -1;
- }
- session = chan->session;
-
- /*
- * We guess we are requesting an *exec* channel. It can only have one exec
- * channel. So we abort with an error if we need more than one.
- */
- if (session->exec_channel_opened) {
- ssh_set_error(session, SSH_REQUEST_DENIED,
- "SSH1 supports only one execution channel. "
- "One has already been opened");
- return -1;
- }
- session->exec_channel_opened = 1;
- chan->request_state = SSH_CHANNEL_REQ_STATE_ACCEPTED;
- chan->state = SSH_CHANNEL_STATE_OPEN;
- chan->local_maxpacket = 32000;
- chan->local_window = 64000;
- SSH_LOG(SSH_LOG_PACKET, "Opened a SSH1 channel session");
-
- return 0;
-}
-
-/* 10 SSH_CMSG_REQUEST_PTY
- *
- * string TERM environment variable value (e.g. vt100)
- * 32-bit int terminal height, rows (e.g., 24)
- * 32-bit int terminal width, columns (e.g., 80)
- * 32-bit int terminal width, pixels (0 if no graphics) (e.g., 480)
- * 32-bit int terminal height, pixels (0 if no graphics) (e.g., 640)
- * n bytes tty modes encoded in binary
- * Some day, someone should have a look at that nasty tty encoded. It's
- * much simplier under ssh2. I just hope the defaults values are ok ...
- */
-
-int ssh_channel_request_pty_size1(ssh_channel channel, const char *terminal, int col,
- int row) {
- ssh_session session;
- ssh_string str = NULL;
-
- if (channel == NULL) {
- return SSH_ERROR;
- }
- session = channel->session;
-
- if(channel->request_state != SSH_CHANNEL_REQ_STATE_NONE &&
- channel->request_state != SSH_CHANNEL_REQ_STATE_ACCEPTED){
- ssh_set_error(session,SSH_REQUEST_DENIED,"Wrong request state");
- return SSH_ERROR;
- }
- str = ssh_string_from_char(terminal);
- if (str == NULL) {
- ssh_set_error_oom(session);
- return -1;
- }
-
- if (ssh_buffer_add_u8(session->out_buffer, SSH_CMSG_REQUEST_PTY) < 0 ||
- ssh_buffer_add_ssh_string(session->out_buffer, str) < 0) {
- ssh_string_free(str);
- return -1;
- }
- ssh_string_free(str);
-
- if (ssh_buffer_add_u32(session->out_buffer, ntohl(row)) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, ntohl(col)) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, 0) < 0 || /* x */
- ssh_buffer_add_u32(session->out_buffer, 0) < 0 || /* y */
- ssh_buffer_add_u8(session->out_buffer, 0) < 0) { /* tty things */
- return -1;
- }
-
- SSH_LOG(SSH_LOG_FUNCTIONS, "Opening a ssh1 pty");
- channel->request_state = SSH_CHANNEL_REQ_STATE_PENDING;
- if (ssh_packet_send(session) == SSH_ERROR) {
- return -1;
- }
-
- while (channel->request_state == SSH_CHANNEL_REQ_STATE_PENDING) {
- ssh_handle_packets(session, SSH_TIMEOUT_INFINITE);
- }
-
- switch(channel->request_state){
- case SSH_CHANNEL_REQ_STATE_ERROR:
- case SSH_CHANNEL_REQ_STATE_PENDING:
- case SSH_CHANNEL_REQ_STATE_NONE:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- return SSH_ERROR;
- case SSH_CHANNEL_REQ_STATE_ACCEPTED:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- SSH_LOG(SSH_LOG_RARE, "PTY: Success");
- return SSH_OK;
- case SSH_CHANNEL_REQ_STATE_DENIED:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- ssh_set_error(session, SSH_REQUEST_DENIED,
- "Server denied PTY allocation");
- SSH_LOG(SSH_LOG_RARE, "PTY: denied");
- return SSH_ERROR;
- }
- // Not reached
- return SSH_ERROR;
-}
-
-int ssh_channel_change_pty_size1(ssh_channel channel, int cols, int rows) {
- ssh_session session;
-
- if (channel == NULL) {
- return SSH_ERROR;
- }
- session = channel->session;
-
- if(channel->request_state != SSH_CHANNEL_REQ_STATE_NONE){
- ssh_set_error(session,SSH_REQUEST_DENIED,"Wrong request state");
- return SSH_ERROR;
- }
- if (ssh_buffer_add_u8(session->out_buffer, SSH_CMSG_WINDOW_SIZE) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, ntohl(rows)) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, ntohl(cols)) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, 0) < 0 ||
- ssh_buffer_add_u32(session->out_buffer, 0) < 0) {
- return SSH_ERROR;
- }
- channel->request_state=SSH_CHANNEL_REQ_STATE_PENDING;
- if (ssh_packet_send(session) == SSH_ERROR) {
- return SSH_ERROR;
- }
-
- SSH_LOG(SSH_LOG_PROTOCOL, "Change pty size send");
- while(channel->request_state==SSH_CHANNEL_REQ_STATE_PENDING){
- ssh_handle_packets(session, SSH_TIMEOUT_INFINITE);
- }
- switch(channel->request_state){
- case SSH_CHANNEL_REQ_STATE_ERROR:
- case SSH_CHANNEL_REQ_STATE_PENDING:
- case SSH_CHANNEL_REQ_STATE_NONE:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- return SSH_ERROR;
- case SSH_CHANNEL_REQ_STATE_ACCEPTED:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- SSH_LOG(SSH_LOG_PROTOCOL, "pty size changed");
- return SSH_OK;
- case SSH_CHANNEL_REQ_STATE_DENIED:
- channel->request_state=SSH_CHANNEL_REQ_STATE_NONE;
- SSH_LOG(SSH_LOG_RARE, "pty size change denied");
- ssh_set_error(session, SSH_REQUEST_DENIED, "pty size change denied");
- return SSH_ERROR;
- }
- // Not reached
- return SSH_ERROR;
-
-}
-
-int ssh_channel_request_shell1(ssh_channel channel) {
- ssh_session session;
-
- if (channel == NULL) {
- return -1;
- }
- session = channel->session;
-
- if (ssh_buffer_add_u8(session->out_buffer,SSH_CMSG_EXEC_SHELL) < 0) {
- return -1;
- }
-
- if (ssh_packet_send(session) == SSH_ERROR) {
- return -1;
- }
-
- SSH_LOG(SSH_LOG_RARE, "Launched a shell");
-
- return 0;
-}
-
-int ssh_channel_request_exec1(ssh_channel channel, const char *cmd) {
- ssh_session session;
- ssh_string command = NULL;
-
- if (channel == NULL) {
- return -1;
- }
- session = channel->session;
-
- command = ssh_string_from_char(cmd);
- if (command == NULL) {
- return -1;
- }
-
- if (ssh_buffer_add_u8(session->out_buffer, SSH_CMSG_EXEC_CMD) < 0 ||
- ssh_buffer_add_ssh_string(session->out_buffer, command) < 0) {
- ssh_string_free(command);
- return -1;
- }
- ssh_string_free(command);
-
- if(ssh_packet_send(session) == SSH_ERROR) {
- return -1;
- }
-
- SSH_LOG(SSH_LOG_RARE, "Executing %s ...", cmd);
-
- return 0;
-}
-
-SSH_PACKET_CALLBACK(ssh_packet_data1){
- ssh_channel channel = ssh_get_channel1(session);
- ssh_string str = NULL;
- int is_stderr=(type==SSH_SMSG_STDOUT_DATA ? 0 : 1);
- (void)user;
-
- if (channel == NULL) {
- return SSH_PACKET_NOT_USED;
- }
-
- str = ssh_buffer_get_ssh_string(packet);
- if (str == NULL) {
- SSH_LOG(SSH_LOG_FUNCTIONS, "Invalid data packet !");
- return SSH_PACKET_USED;
- }
-
- SSH_LOG(SSH_LOG_PROTOCOL,
- "Adding %" PRIdS " bytes data in %d",
- ssh_string_len(str), is_stderr);
-
- if (channel_default_bufferize(channel, ssh_string_data(str), ssh_string_len(str),
- is_stderr) < 0) {
- ssh_string_free(str);
- return SSH_PACKET_USED;
- }
- ssh_string_free(str);
-
- return SSH_PACKET_USED;
-}
-
-SSH_PACKET_CALLBACK(ssh_packet_close1){
- ssh_channel channel = ssh_get_channel1(session);
- uint32_t status;
- int rc;
-
- (void)type;
- (void)user;
-
- if (channel == NULL) {
- return SSH_PACKET_NOT_USED;
- }
-
- ssh_buffer_get_u32(packet, &status);
- /*
- * It's much more than a channel closing. spec says it's the last
- * message sent by server (strange)
- */
-
- /* actually status is lost somewhere */
- channel->state = SSH_CHANNEL_STATE_CLOSED;
- channel->remote_eof = 1;
-
- rc = ssh_buffer_add_u8(session->out_buffer, SSH_CMSG_EXIT_CONFIRMATION);
- if (rc < 0) {
- return SSH_PACKET_NOT_USED;
- }
- ssh_packet_send(session);
-
- return SSH_PACKET_USED;
-}
-
-SSH_PACKET_CALLBACK(ssh_packet_exist_status1){
- ssh_channel channel = ssh_get_channel1(session);
- uint32_t status;
- (void)type;
- (void)user;
-
- if (channel == NULL) {
- return SSH_PACKET_NOT_USED;
- }
-
- ssh_buffer_get_u32(packet, &status);
- channel->state = SSH_CHANNEL_STATE_CLOSED;
- channel->remote_eof = 1;
- channel->exit_status = ntohl(status);
-
- return SSH_PACKET_USED;
-}
-
-
-int ssh_channel_write1(ssh_channel channel, const void *data, int len) {
- ssh_session session;
- int origlen = len;
- int effectivelen;
- const unsigned char *ptr=data;
-
- if (channel == NULL) {
- return -1;
- }
- session = channel->session;
-
- while (len > 0) {
- if (ssh_buffer_add_u8(session->out_buffer, SSH_CMSG_STDIN_DATA) < 0) {
- return -1;
- }
-
- effectivelen = len > 32000 ? 32000 : len;
-
- if (ssh_buffer_add_u32(session->out_buffer, htonl(effectivelen)) < 0 ||
- ssh_buffer_add_data(session->out_buffer, ptr, effectivelen) < 0) {
- return -1;
- }
-
- ptr += effectivelen;
- len -= effectivelen;
-
- if (ssh_packet_send(session) == SSH_ERROR) {
- return -1;
- }
- ssh_handle_packets(session, SSH_TIMEOUT_NONBLOCKING);
- if (channel->counter != NULL) {
- channel->counter->out_bytes += effectivelen;
- }
- }
- if (ssh_blocking_flush(session,SSH_TIMEOUT_USER) == SSH_ERROR)
- return -1;
- return origlen;
-}
-
-ssh_channel ssh_get_channel1(ssh_session session){
- struct ssh_iterator *it;
-
- if (session == NULL) {
- return NULL;
- }
-
- /* With SSH1, the channel is always the first one */
- if(session->channels != NULL){
- it = ssh_list_get_iterator(session->channels);
- if(it)
- return ssh_iterator_value(ssh_channel, it);
- }
- return NULL;
-}
-#endif /* WITH_SSH1 */