/[LeafOK_CVS]/lbbs/src/test_ssh_server.c
ViewVC logotype

Diff of /lbbs/src/test_ssh_server.c

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.4 by sysadm, Thu Jun 5 05:24:56 2025 UTC Revision 1.10 by sysadm, Mon Sep 22 05:06:44 2025 UTC
# Line 1  Line 1 
1    /***************************************************************************
2                                            test_ssh_server.c  -  description
3                                                             -------------------
4            Copyright            : (C) 2004-2025 by Leaflet
5            Email                : leaflet@leafok.com
6     ***************************************************************************/
7    
8    /***************************************************************************
9     *                                                                         *
10     *   This program is free software; you can redistribute it and/or modify  *
11     *   it under the terms of the GNU General Public License as published by  *
12     *   the Free Software Foundation; either version 3 of the License, or     *
13     *   (at your option) any later version.                                   *
14     *                                                                         *
15     ***************************************************************************/
16    
17    // This test was written based on libssh example/proxy.c
18    
19  #include "log.h"  #include "log.h"
20  #include <stdio.h>  #include <stdio.h>
21    #include <libssh/callbacks.h>
22  #include <libssh/libssh.h>  #include <libssh/libssh.h>
23  #include <libssh/server.h>  #include <libssh/server.h>
 #include <libssh/callbacks.h>  
24    
25  #ifndef BUF_SIZE  #ifndef BUF_SIZE
26  #define BUF_SIZE 2048  #define BUF_SIZE 2048
27  #endif  #endif
28    
29  #define SSH_HOST_KEYFILE "../conf/ssh_host_rsa_key"  #define SSH_HOST_RSA_KEYFILE "../conf/ssh_host_rsa_key"
30    
31  #define USER "test"  #define USER "test"
32  #define PASSWORD "123456"  #define PASSWORD "123456"
# Line 96  int ssh_server(const char *hostaddr, uns Line 114  int ssh_server(const char *hostaddr, uns
114                  .auth_password_function = auth_password,                  .auth_password_function = auth_password,
115                  .channel_open_request_session_function = new_session_channel};                  .channel_open_request_session_function = new_session_channel};
116    
117            long int ssh_timeout = 0;
118    
119          char buf[BUF_SIZE];          char buf[BUF_SIZE];
120          char host[128] = "";          char host[128] = "";
121          int i, r;          int i, r;
122    
123          int ssh_log_level = SSH_LOG_WARNING;          int ssh_log_level = SSH_LOG_PROTOCOL;
124    
125          ssh_init();          ssh_init();
126    
# Line 108  int ssh_server(const char *hostaddr, uns Line 128  int ssh_server(const char *hostaddr, uns
128    
129          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||
130                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||
131                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_KEYFILE) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEYFILE) < 0 ||
132                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
133                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
134                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||
135                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
136                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
137                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_C_S, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
138                    ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_S_C, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
139                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
140          {          {
141                  log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));                  log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));
# Line 138  int ssh_server(const char *hostaddr, uns Line 165  int ssh_server(const char *hostaddr, uns
165                                  ssh_callbacks_init(&cb);                                  ssh_callbacks_init(&cb);
166                                  ssh_set_server_callbacks(session, &cb);                                  ssh_set_server_callbacks(session, &cb);
167    
168                                    ssh_timeout = 60; // second
169                                    if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
170                                    {
171                                            log_error("Error setting SSH options: %s\n", ssh_get_error(session));
172                                            ssh_disconnect(session);
173                                            _exit(1);
174                                    }
175    
176                                  if (ssh_handle_key_exchange(session))                                  if (ssh_handle_key_exchange(session))
177                                  {                                  {
178                                          log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));                                          log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));
179                                          return 1;                                          ssh_disconnect(session);
180                                            _exit(1);
181                                  }                                  }
182                                  ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);                                  ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
183    
# Line 171  int ssh_server(const char *hostaddr, uns Line 207  int ssh_server(const char *hostaddr, uns
207                                          log_common("Authenticated and got a channel\n");                                          log_common("Authenticated and got a channel\n");
208                                  }                                  }
209    
210                                    ssh_timeout = 0;
211                                    if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
212                                    {
213                                            log_error("Error setting SSH options: %s\n", ssh_get_error(session));
214                                            ssh_disconnect(session);
215                                            _exit(1);
216                                    }
217    
218                                  snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");                                  snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");
219                                  ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));                                  ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
220                                  do                                  do


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1