/[LeafOK_CVS]/lbbs/src/test_ssh_server.c
ViewVC logotype

Diff of /lbbs/src/test_ssh_server.c

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.5 by sysadm, Thu Jun 5 14:48:15 2025 UTC Revision 1.14 by sysadm, Wed Nov 5 06:14:01 2025 UTC
# Line 1  Line 1 
1    /* SPDX-License-Identifier: GPL-3.0-or-later */
2    /*
3     * test_ssh_server
4     *   - tester for network server with SSH support
5     *
6     * Copyright (C) 2004-2025  Leaflet <leaflet@leafok.com>
7     */
8    
9    // This test was written based on libssh example/proxy.c
10    
11  #include "log.h"  #include "log.h"
12  #include <stdio.h>  #include <stdio.h>
13    #include <libssh/callbacks.h>
14  #include <libssh/libssh.h>  #include <libssh/libssh.h>
15  #include <libssh/server.h>  #include <libssh/server.h>
 #include <libssh/callbacks.h>  
16    
17  #ifndef BUF_SIZE  enum test_ssh_server_constant_t
18  #define BUF_SIZE 2048  {
19  #endif          BUF_SIZE = 2048,
20    };
21    
22  #define SSH_HOST_KEYFILE "../conf/ssh_host_rsa_key"  static const char SSH_HOST_RSA_KEYFILE[] = "../conf/ssh_host_rsa_key";
23    
24  #define USER "test"  static const char USER[] = "test";
25  #define PASSWORD "123456"  static const char PASSWORD[] = "123456";
26    
27  static ssh_channel SSH_channel;  static ssh_channel SSH_channel;
28  static int authenticated = 0;  static int authenticated = 0;
# Line 69  struct ssh_channel_callbacks_struct chan Line 80  struct ssh_channel_callbacks_struct chan
80          .channel_pty_request_function = pty_request,          .channel_pty_request_function = pty_request,
81          .channel_shell_request_function = shell_request};          .channel_shell_request_function = shell_request};
82    
83  static ssh_channel new_session_channel(ssh_session session, void *userdata)  static ssh_channel channel_open(ssh_session session, void *userdata)
84  {  {
85          (void)session;          (void)session;
86          (void)userdata;          (void)userdata;
# Line 94  int ssh_server(const char *hostaddr, uns Line 105  int ssh_server(const char *hostaddr, uns
105          struct ssh_server_callbacks_struct cb = {          struct ssh_server_callbacks_struct cb = {
106                  .userdata = NULL,                  .userdata = NULL,
107                  .auth_password_function = auth_password,                  .auth_password_function = auth_password,
108                  .channel_open_request_session_function = new_session_channel};                  .channel_open_request_session_function = channel_open};
109    
110            long int ssh_timeout = 0;
111    
112          char buf[BUF_SIZE];          char buf[BUF_SIZE];
113          char host[128] = "";          char host[128] = "";
114          int i, r;          int i, r;
115    
116          int ssh_log_level = SSH_LOG_FUNCTIONS;          int ssh_log_level = SSH_LOG_PROTOCOL;
117    
118          ssh_init();          ssh_init();
119    
# Line 108  int ssh_server(const char *hostaddr, uns Line 121  int ssh_server(const char *hostaddr, uns
121    
122          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||
123                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||
124                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_KEYFILE) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEYFILE) < 0 ||
125                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
126                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
127                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||
128                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
129                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
# Line 144  int ssh_server(const char *hostaddr, uns Line 158  int ssh_server(const char *hostaddr, uns
158                                  ssh_callbacks_init(&cb);                                  ssh_callbacks_init(&cb);
159                                  ssh_set_server_callbacks(session, &cb);                                  ssh_set_server_callbacks(session, &cb);
160    
161                                    ssh_timeout = 60; // second
162                                    if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
163                                    {
164                                            log_error("Error setting SSH options: %s\n", ssh_get_error(session));
165                                            ssh_disconnect(session);
166                                            _exit(1);
167                                    }
168    
169                                  if (ssh_handle_key_exchange(session))                                  if (ssh_handle_key_exchange(session))
170                                  {                                  {
171                                          log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));                                          log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));
172                                          return 1;                                          ssh_disconnect(session);
173                                            _exit(1);
174                                  }                                  }
175                                  ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);                                  ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
176    
# Line 177  int ssh_server(const char *hostaddr, uns Line 200  int ssh_server(const char *hostaddr, uns
200                                          log_common("Authenticated and got a channel\n");                                          log_common("Authenticated and got a channel\n");
201                                  }                                  }
202    
203                                    ssh_timeout = 0;
204                                    if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
205                                    {
206                                            log_error("Error setting SSH options: %s\n", ssh_get_error(session));
207                                            ssh_disconnect(session);
208                                            _exit(1);
209                                    }
210    
211                                  snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");                                  snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");
212                                  ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));                                  ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
213                                  do                                  do


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1