From d40f16d48ec1ed9670c20ffaad1005c59a689484 Mon Sep 17 00:00:00 2001 From: Aris Adamantiadis Date: Tue, 5 Jul 2005 01:24:22 +0000 Subject: [PATCH] git-svn-id: svn+ssh://svn.berlios.de/svnroot/repos/libssh/trunk@2 7dcaeef0-15fb-0310-b436-a5af3365683c --- libssh.kdevelop | 129 ----------------------- libssh.kdevelop.pcs | Bin 230 -> 0 bytes libssh.kdevses | 29 ------ samplesftp | 1 - samplessh | Bin 35458 -> 0 bytes samplesshd | Bin 11338 -> 0 bytes ssh1/auth1.c | 202 ------------------------------------ ssh1/channels1.c | 244 -------------------------------------------- 8 files changed, 605 deletions(-) delete mode 100644 libssh.kdevelop delete mode 100644 libssh.kdevelop.pcs delete mode 100644 libssh.kdevses delete mode 120000 samplesftp delete mode 100755 samplessh delete mode 100755 samplesshd delete mode 100644 ssh1/auth1.c delete mode 100644 ssh1/channels1.c diff --git a/libssh.kdevelop b/libssh.kdevelop deleted file mode 100644 index ed5d8f41..00000000 --- a/libssh.kdevelop +++ /dev/null @@ -1,129 +0,0 @@ - - - - Aris Adamantiadis (aka spacewalker) - aris@0xbadc0de.be - $VERSION$ - KDevAutoProject - C - - - - - src/libssh - debug - - - src/libssh - executable - - - - optimized - GccOptions - GppOptions - G77Options - -O2 -g0 - - - --enable-debug=full - debug - GccOptions - GppOptions - G77Options - -O0 -g3 - - - - - - - - - - - - libtool - - - - - ada - ada_bugs_gcc - bash - bash_bugs - clanlib - fortran_bugs_gcc - gnome1 - gnustep - gtk - gtk_bugs - haskell - haskell_bugs_ghc - java_bugs_gcc - java_bugs_sun - kde2book - libstdc++ - opengl - pascal_bugs_fp - php - php_bugs - perl - perl_bugs - python - python_bugs - qt-kdev3 - ruby - ruby_bugs - sdl - stl - sw - w3c-dom-level2-html - w3c-svg - w3c-uaag10 - wxwidgets_bugs - - - Guide to the Qt Translation Tools - Qt Assistant Manual - Qt Designer Manual - Qt Reference Documentation - qmake User Guide - - - KDE Libraries (Doxygen) - - - - - - - - - - - - - true - true - true - false - true - true - true - 250 - 400 - 250 - - - - - false - false - - - *.o,*.lo,CVS - false - - - diff --git a/libssh.kdevelop.pcs b/libssh.kdevelop.pcs deleted file mode 100644 index 81a143674be60febf64c0b15b69d9ec029d60a6b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 230 zcmZQzU|?eiU~py#W?*1oWnf@nWME)$VbEvDV9004Wk_YvXGmlyV#s7DX3%FyVMt{t zW6)>FVaQ}iVkl-PX2@XBg^MOL - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/samplesftp b/samplesftp deleted file mode 120000 index 66848001..00000000 --- a/samplesftp +++ /dev/null @@ -1 +0,0 @@ -samplessh \ No newline at end of file diff --git a/samplessh b/samplessh deleted file mode 100755 index 704edbdc1f9de6c82fbf1bf3bf82f7a5c3781817..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 35458 zcmb<-^>JfjWMqH=CI&kO5O0IL16T+`GB7Mi1arZJ1A_$vCxZin3WFj88v_FaD+2=q zOq~Oi1*3m}3}awmfYBUa6Brnn85kH?7#J8Vm>>ccOb`=bv4+;E6Kkn=$LETH-Ttj)8$e4Jw9AaUpSppllTe z1_luZ1_nU}1_mhxNLp70<#`4M1|0?l25zW25Tyzt7#JAr85kJM7$D_?IaCZpv4aQ( z1_mVt1_loX1_ogU1_n?X0tp*4FfeE{FfiCLFff2}wH5;d11S5zlC>2B14AH4AryN< zX>61+3j+hp{UG@bAOaL;XyTus;_S?*>RX`VAip7-0}E$RT0<7+f<`DPtdPYgLd^lC zLu7GSo&cp)L57e2VdW51IYTl7s(V0w2g$`VqKd=ZnT@8t7^IkifuSBvTnL&FLFEpz zdtiBY8k+jq(2TwSO&k<&ASi$1y>MugYHPPZ1mUcwY!VPA=H=24&sDI_r)b9g122^gbfbxL^LxU|Sg)%U} z(t`<_dRYDoM-!h2HJ=q~P6wJfx=f(>Xd%%c17nK@%^5ioZn@uYrpHMH9DyCTIb0yg(Hp)pfVg z+_?an4!@&`FM?{-L^Ee5)cu@j;-ESdq{RiAP9{Lp2`t?jqp6<;HK&gS)KdERzXGZr zWCjQep~crhkRYgDMKh-nD*lfdlFp|<&4JllfM(7jsJ%*P;-GvBGAazs{N*4)1_p*~ zH1RD^bIQQtybKx!sOi53EDqJoz`y{jr+U!DS3#9LMhkyfIxk0aC#=aFgeHCpYR(ii z^DjZgH=&6aK*f)t*$b*`K~n8F;^iQkIjf-Q=PDB@{6GGGUKxTmOET}mJcBta7 z(abpyHRnH?xCS(wdC=V13^E+lu0a!TfU2)R3m-42cq3YVxd}B#3C$c>ePNC!4vWWd zG;vtCC83G;L(MNl6NiS6WoOlC-X25Kyvszo#B0@S~2aj0j=$xJFP z&d@8)XDBYth)+)~iBBym$}a-*ic@n^lS>$qGZORiQgh-#bb4xhK}ltNab{I2SV?Jd zYEfcoNk)8jQc7lC3CMtgqWs)~5{7t}NIyqkPiL^Qywq|q4Klx=G$}i^GCm`*ID?@$ zt)w8nC^a!9C9?>^Nh?ZCg|PAqQuE+;7o`@KrWTjP7iXmA? zjxSCvF3!wHcpc^;xNnLx;=$&|XXoXY=Vjy5fj({Kx*;ai+ql9*Rqo(f5r1x28=mXTVK zh)pp=yt|LTlcP_(znfdIYe;;Eqmz$oJXmFBaeQ%VQCVscB<$c$fTRadVg!dahyijE zI8{QkMP_kvX=;2DC@Vl5f$qfg)RH_%+AoGBA-G|n#D@rTY&t<<3{808BoXgb79W(F zo>^RyTI8IQSX`W1%n%=+o|~T+UtE${R1zN#%DTy*94nuJsI9$>g($Z5) ziW$;VOF*&1kXf8qQc}rKTvC*moLHQioLj(<22}`(qr4P`;*yliJdlFok|KuU%=Em( z9ESM#;*z42(gKFu)ZF6K5{Bfo+{EnEqQr8BlH~N%5>TE1=}RptV#qH5C!I7%+@@A! zmN3M}=VT@&LtUDi2r)e;6>LdzMiE0=L1{@bLrF3yT1!fb7~)e?5=#;p;^UKwiy^ug z;#2cd7~Fk4ot)#1^o;aC9V!MUFoYF$prQ?0UBHCkG)NqV85o$LeNK=FhzFuk%>roz ziNItT8Bo=L?1IRF#6c{O2qV;7gl-TEgkh>cY!C*i+{4TO9Sve&D3!|O1er1)+CaGh ztuH~{F;L$Mqz8my?R8Ld4%CMQiGeVz{S6WajTeB#Kp58E0*QnA^&l}2hP8)4;-Ik! zkQfO6fZ7Y{--3Ju5(8svNIeY_hxi37%D{mn4s9ZXB?OSfp;?;h`r=69 zAV0&zHIT$XcEiLCkiNaC8 zNgOl|0}=z_1SE0fagGcmapbX>0wi(Jcm&7{5UxNHNAAZoAc@1;ARzS}NaCQe4UiZJ zPe2j}jq!lQKzIg{IIQml5?_EM4jPvMiGlD6ByrGq3`h)wHz0|_+N2=y9Z2G^F&mKh z0VHwQ7%E8o1d=#tOa~+e!WWRlVPldY@f%3uu(2SJ_yZ(y(3lKJ41`}GiG#*^Kw=>L z0ZAM*)&UX&;U7riurVNzID-u${UeVzaUhAq+Ik@M0!ZSpzB@=<0!bV;1_%;YKoSRy z7lFh;SOZBMG^PX+17QOsanRTmNDPE6ki?9u#&!{eYpV4e+A-$s?wJe!2CxbKBx+P*#PF>0`Wo7_ObxXzXalghWlP7fcd9Dd{7no zG62j!1mc6L&X*2g{w@$7RAs(20P{D2_@Jutr2?403d9FhkuL?n{6!!>sA_!40OrpE z@j+GM%MbrR{+$HkgQ~)p55W8`5Fb$7 zd$|D2&jRs5Rou%7V15#a531T;Hh}q2AU>!{dszVH2Z8vYs_bO~nC}JRgQ~EX0bsrp zh!1L7y>tNctw4NGRrb;V%r^q@K~>mG1u$O=#0NFGUJ8KuN+3RHTH+-Gm@ft5gQ~Wd zAO3>;F9hO)s*?BxM4|CgKqLk6hodbt72{{-TLs;rj_ z!2DMrKB%gCIRVUn1mc6LsFw|3{w)w6R5iUU0P`<__@FB3WdfLg3d9FhMK1%u{6io< zs0w=N0Os!k@j+G3O9L=}6NnG0a$YKc`Kv&DP*w9%0L)(m;)AM~mkeP3ED#@5wY>cB z2ju@rAU>!{dHDd$?*j2bRmsZ>V15&b52`|59su*JKzvZu@p1#0Uj*WVnzAn!fcaS< zKBx+LIRVU10`WmpHZL2%{3s9~RF%9e0P}-Dd{7ngG6Br@0`Wmj;Fkelz7vQKs!Cou zfcaJ+KBx+LX#nOMf%u@R6nApZ-2 z_@FA|H1DJmc#0O1RzAOOqFM;@=s^Db;n12ey2Te=93;^>Ff%u>)$(Igb z{w@$7R7Jcr0P{D2_@JucrNZz3|2+)fdUjrn^XPo!(fs5?K#1q@0~_=m7(9+23;l@(z4f61ep)kjug~385a%w$CL5 z7#KhXi0%NDvmm>;PwqFc3}ARU_x}F>ClAAIn=rxfq(`&uGLV(QC8}v@6aF9cNIvM% zY;#lrG%(3O^^oC#=AWGW^A5BgDt+AildD9)Bl+eFvp@g;dvvng1u2R~vOW#!N8YV6 z0u1{d3>+AC?P6eH*as@!UnKti|KITci&=mF|A#s@Ep0-mN9WgluZ$fSf;)dh!l#zu zMftz~|3R)cI?g&lMgZKWe60rdD5%KKe% zrVb1qo$osDzbFJHzXPRbyG5;K1Q;xD)rxy0ANqgDqub>uL#L=Z$e2!69f*`XRH_Cf z#UmrY@Z#~m|Npy18Nt#u4?UV~K}?1cPEeE?9*B-TY3bTE}Aq))rL1FCC`N;5q$8i==@yPH3l)w46i>UB#FHvFg z=(b%TEx_>N^pF4l4G+AS0(Ck{syb`qduKEDgqwIT~t6734>2>ii!h&OCcizgW;vl3;z!_|Kj&N&T<5l z`pVvWbcd)ocyzm{IQaCss2F(kmZ&gz^wy{d_;fx58DRjbEIob5U_%WMJ^p1@;n0r10|-)N9X$&Gk^U5?~#1jqw^Rzj9={h{{R2$9Uz%{gbb*`@?!pX zi20E8t_ZQh6>P<&oeyRNR1ugpd|Gx)@r68RrK!&CK2PO3h9-TQVAACAfRDO7N{_*IH zQF&qb-=q0W#EW9E$2yOe#_l@+O75T*(u;dPK$bm!u?-ZEoyR>o55JiG{r`VZl9PQT zA;7@jx*4?Ip!5EVmT#aE=$=pK^B10fL7^T4N@F=H9zNYEDghqNMlP{}*jv zK}uLuJUX9ybh1WBfJzV-6;Qz%0%Z$$bg~9O*%BU|tUge-f=4H-2b8Vh(aGupWgB>O zvN}izFm$`9Sah=5NeD2!NCZ3S5h(M&xcU>E%k=*I|Nl}3l+`-#zgYMUEan9gvxJ0B z+62ci$56)*&(1%ghHrxnZ+kSp0WH_@Xtoss72=+q&q`bk4>;}x3BDFgOPk=4d>CFj zmuPt;|MlqR0hiT2o$ov}|9SS>*cl$!rDNj2@c;0O{onroXFS^co3ri&D4-I+4m|A9 zdHjXzH&8%-^XR<);uIt`Xn|DpeSr!e+HYV2E?Rj&G0}JgWIrrv9rox1hxuBRvVPI#J~Lizt0;fZMi{g1!;!a z>KK1`U#5uzgHPxG7uP}3tp_|hkCqy~1kLb!bURD9bbG59{&(qiR_OM&*vDW9N~tU= z9^Jx*2VQ&w`~3ckcV9rM<{iikVGt8!#^F+ME-(H9$`qwqAosL?{{Mep4#Yh#v;Tv_ zC6=MnxEWkv>uU7+z%P|S9|fAQ!u$bp@Q>)bkT z`E(|2uDabROI{3lwwz4G+9v`1b$*%dOD-yZO`q|NFK> zT{r#T|Nr|hnm91Lm;;K2+x#7%c~Xzg_l9p@+ybY8=PxdO`Tu|aEs&ZDP{M^e_Z7ss zFTQ;G|KGFo$b?-E@(c`6=M;SX|9}5)69cH^g=hy%LU%vYbiG?>G z|Nq|?0gVMvhXG{pb&y~KRB$&`0%`Tzf=1UTb?YEKAu3^TlB_zjc? zLp?hGf@(U@%7_=HUqOX5bBTaQ;}MVmEEOIG#}laRKMX2TI^Tnes1=_;sp`FF=aCn+ zU;qDaux4=VJjUND#mKmL~Fz~ya@aT17^5A#5z;M!|`4+R`xBrKIG+(`_{rvww$k{!fp!9sn@Egd@5?{c9 z!{74d-~azFZ-Eoob7+10!W$IIpq?U4RM_kQ#rr*v&O;uZ@BbfuvGVi(|F2hp ziXM58+MEAC6$L0ZKF@z02ug%$A3+wBn1I+-AT`~#j|Bx7JUS2U3xvc@$VX6meEve`!~g#~ zz*T$m5d%;vISkUn2FgybPH>(P0*L;&Q#_aIMo-hc5OIKNE zry%pYMb(fE+K6G0Kh&UHNRoarAHr{mh4S;?f|?PwH~1k*VJajkc)tJt|D_eEM4bHBAOvdi;g=2S~!({PzF<&igNXz-jhH>*xRfUj{;*dE(9g|N9J# zKo#I2k8WE{egRM?Y0lLkfZX!qxp@5;q4dh zuR&>ybq1#ZgOBC|kApv$JuD9w^Lun2b^I@K$K(HD56jm@Up%^HR6M$KR5(CQO97AO zBNEU~6R5lj_2|`&;1pm8_UM%j02#0O8q_88IQX0SH9M$39deh!AOA}~f=vK* z;6Z9%oCie*Xp|MSh8WZXVPFU?PE1c#uu>>4&QOR3O=sul6~`(>=j5kn<~hWI)*XOW zFL3!o7K$iXaVaS1<|u$B;1#SCa`Mv^GV>G?i@^dQsRD(9{Gt*CD+TCc3x$$=un0&l zMZpTBPQfKO7$jVlT9lbqsQ|JRnIg<4@7|3h6Xt~DGEuIC8@=r!T_uRw1`3hyh2AIGcU6wGchN#I5RI@ z0lI<&qz|mv6|{&)0knnzB&%OqT%@0rnWqm5CMyM1uoAF&sOpM~Gjx;l3n~@T@{1He z)A=CHDC$EpQWYR8C=@b_6-x8KOHlL_T=Eqv^Gg*ezwG!e?kNn~iupJ;DKphGSoAgvr^g#sFixu+o zQbF#|%P&{30z1$xzeu4tHMz7Xv!qg?C^fM-KTiji2r~2Y;7%?s$uB5KO#$lx1t2Iq zz)1k)SCE}0Adf=qQ7BI=R>;dQQAo=#%}Y^8DlJh+%u~n*d#|LjAXOnh4eZp^ip=7Y zVm+{#j(G}+B_)Z;*{MYextZx1CE%D%PXz~RN@`kSX-)|&0zg)lRNorAIa!F=cDkNq= zDVG77U=$!ZRY5hGi^0|3O`#|?IW@Bk6s(Y>4O)%^aycmG@=|l4samyIfdL{9THaI& zP5?@(#Y#|Vh!je$0NDwZ)zgRSg}4Ti?jdaC+yPo81kM6b)v!#U3eAX6(_Au(Qj<&a ziz>nK3(97xDH^K9np_NNnR%JT8L24@X_?6xnW;s^3TdfDxi5 zu|j}{ zonr#1%?jPy0~%>8Pyp3RkbOKLb>4ge&7c|uBnKMoKLC{nO{{?AUHCvgV_*P{G{!J6 zFnoZ@gZhymc}G5hHYQI#iDqUuKG0+jXu=A##{o3f1Cj?#kb!8B`EwW;7(gv|5Fa%0 z1)^c*gY@kInXd?OA7~;DBoESe1;kK-h=V4KKwOwUko*@01_lGDJgBdYED!P%XfHtn zRNfclSq26MCq99GCU-uGK4w=wgw1yw{ldt= zP@oCX585vPwbu=7uOrAtnB@lUdgXfjKdYGD70{9f#APEvA2a1CO-~Rsx zkNbiXj0Y&e_<<7)$WR6b@DwVjbqM8R@L}T6;0MnYfW%;Y&>AxkA2eYLqG9_nKohng zK5TtD)SCXl7{Og@gkrY(VONut50W%87x2VKr1EEM0=f!$Iq>L5h(u#McZA zuyx>|AO=ZWfM%wV@+XuF-WvvzZxDvq2NUOj@)`Oql)u{{PPh@m~l* z^#6zQVd3%t%GZI)gVfRkqwkM`+4&5*Pv#qxW|M}vTMSC8L1{B6?FOa8pmZ9PE`!o- zPq`Wlpe2Bp72X*LyGAO+b zN*{yL*P!$>DE$pev&lm3htg_L+6+p&LFq6kod%`LpmZCQo(83tLFsK!`WTeH2Bn`t z>2FY)O%7^5lvab%W>DGsLrQ4wNG$_3cN^gVG$Ds5zDE$mde}mF&(EZM0 zP+AR2n?Y$eC>;i+)1Y)2lx~C4)1dS+C=E+*Fj@n;f0)7D+1W}#!`&}bQ^8ozM9)~k z$iTqF(9pN1TwI_FR;p{Dqfn5Us%xQVu4k^vFlyA0 z4=Y&efb0>5l+}>>;0DA;$DsO^iQyz@4& z5d^4?WMa6;#{k`-Xb9a;1*@Mkek5A4?P0TATV3-Nvf)}uF=3oG=gfGv`OUW+>bwkoq zQy9*I1XD|(E99Spc$rnHFj)~!1_sEEnfRRi`~n6|E(Qk3c9l9V28N`>lH?5N_La9> zV0%H0dWOZ^3=E)76m$a(LlO@I19-uFEH48CsAtJg%nNdOY7s*xF9Uc(3d4F{28QI^ zlwyXXybKJGUO{3G!)=ggMq(brN02)3D*pJC)SSf1)D&>o9Ay9n4T#ABt`+sm5{tl{ z63~!GVtT56I%v(lu8|%nlS4`a10&rcL;dpnqHO)7(#)I`-Nf7!GZWBe`*<@G-GXH3 z=KJ)#QV6Rg1Jo%g)=w@j)lV)e$RB4;8R!`? zFgCF8fjk0gk8>~{2F(=cL&|Pg+R9;OU|B?$jrdN&BF*S!@L4xJD8inUI%i964XZp>{cLWs6n|U?DIfe4aQVZa41)>&j#t$ zVFWFzVpeWoWd8`VSeFsB2#Hy_iIE+&Ig?wDv6qQ~fmykkksTCH+(wLZ!Tb(J_C+A$ ztQkRj6`7SMFtU4teCfyt3SnmD8I0^fAifinzkrb)l>NC~z^-9dUcty70n+crxEO5S z8b$^V4$i5J3=G^G*g(E}#K6EH!M%;k0A$K`kO-491D7{Q!48ObIk-UEbh-C{+{L6U zz`)7@iX&Ezr67NSTnUPIo@!9mVqoQP2HCcmiGcwws?ETX$;iOKc@)$;V!6q}z`%JN z6s;`#K`q%6pv81-f0-Bg%2(Y?w8M84ku(~&aLyv(=kcokT)uR{8<6vO<$H>6I zVh&1gyzX`4Hc z8Oe403{0S1-5l&JpiP|Yl3+)I&Ld%$0z1-)k%56-8pLD+?S|gL%)ns7F3*+1%)r2| zkOwkVnStvq0|NuQB811n<;29mz^(-0ad6FKVPIfahVXc}4uFhPi2&;p-~vtUv8#g2 zWl|R8k^!kyO9soCaDn<5?CKDn1p_x53j+g48`xX&3~Zn+@EXhv3>-|dT%hh5lN>04 zf#R;5m4Sgt9>Qbd>HsBK1qhFYD;5-viVz+f14{%e0|T>S7z+af-(pq<21XWD76t}p zrF4)$CKE{D05byvvnpsGDPJ2{1q(<(trMi;9w@7`fc6G6tAlp9^4$fg;4d{cVqn(Z z$Hc(EUutH;z^r=`%(P%&)&r#rHqhqm|EvrQ8XU4*4_O%)IOISgAeYC0{3GuKa=$VM zR}pBiL;;%W*yLFm7+$h6FbHrcav6fuxp{!qF>oCKnc?2Y#=yX&%)!9*5yVx5NJ?;l zM^cm)fQmR}1qN0QP+`W(QOCl-z{>FrR17`?nWcOHEa1lq5{?0tZpT;|8168G9I3;# z1!SUbB-FZO5Kj+UdU1hr6^A~kU&y2^z;yy7X8_X6q%0u-+H}Za2=Rad7Y9hr2*Oig zVC4WsAPcC%<}glWWnf^lU}IpYVgcD`3bD})#YS_OjbJ-0Aa)3F9R!u{mhoV>NpP(K z@vNY}h1hQmvylZfh{R!Yot1%s7u5Mz;Bbc6V-K@uGpL>7uninm99+(zfN_MFEFh4X z!ocAKF<63u1vIX~;p_~`s2m`(crUXvFihac;Q|Lv7{sXzTp-OH;Se4N*CvpG5fC#3 zxPn2!5eczOgi9MF7X=AM34v0OZP5^w3IgdMUJQh%0`7@(#6rx};3@~@=r{<^fGZZ1 zV&WkxEx61;W+p()bl?I_%5x+_zbBje$WB)KFto1m!GsMp%`;1v=cu7%l{A%Q32hJj@s>oX5bZ0g7J6 zAO;aePZkCSMt#`G-7~lr(Mk>m21YwjtH2UmDZmErc0mW(7{kT7Kzc2~Mg@z>fik`& zSXY>ECIh1tSUiA%l>=n02;*mvQ30@_y>oC=L>Rw;oE;1s+Ckp6I5oTFhB?9l%OJNuz{O_fpH@! z|jMqV>8DqRKX!A1T4Y2kwiHD&0x!DFXD_8<_VjAPE z9uOx?xFnx}@iv$pBb<|($G~_8>Z(iz#=Br<~#vvPonJXVe~ zpq3!07Xx>-y*z_V5Dx21X5tk->7H zvI4@6lRpY_nI!G3dx_$@~MJ1F`*7{R6n%fA8n#uKcOF--n3i01|KsWHf5 z-Y_0$XB49kL}jpCQfV3kqc0;gH_GdQ(x@M!BRG+Q8l|}`3=9fq7#SG2`atbgMn;95 ztPBiX{ZP&c76t~c2~ds>69WT}CpdZ;6+nlk@B~3PihDrrQ2-TmjGW91pxd7mLF2)U zicrxFFi~)NQvz$`WL^OkI#%3_S1 z%%D}|U{NcOr^3M*hLf2Av?iZ{fk6>;>IY*4)Sfv|dl(=c+IOHTh>@3tfyAyRIUU+O z+H`0c1sMd`m^q|5R5^q}0~?Hji~?*zjDn1+e8Sw!eA1x)t_lM)A2+uhHvpMn(osCfHaXvjn3D6DvdvHr~g~#pqFFrK9V?#K^$N=msi- z7(gqN8Bx6eT6dC}mz-0YlB%B$9#+=PEzK#(%*jmB2ahG`CuNotGr*KU4x?cJPsqc> zuxl%>EG9x314D6QZb43}9_Uy)2Jk5vx}cR8#d;Z_nKOuWdKsXz9v~xkdKsXJB#o%$ae5g*)&>ch{Oa(Io=s1kbe7y|N0`Z*8Bp4HNunI(&fq|0=)}&?DV4Nw> z@h|+tRS%AZ973MK#aB2~I2t%6%;897QWlukUHs&uM-hiFGv|AcN6h6M+dUsNgmHLs zEYjC!uCV0rX0{1scCoZ#w&u`g4o>FKoyQ^F*S#hvqUdTEGuKKEe-2OPij^NMbke<; zxjA~7E10wxIdm*^(mnojD14mIz#PUQyX&6^hfNBz&_iZ^j(QG>ZyX95USV1~MvodS ztirX5(i@lynN%3(cvvt+3WV+0*T5kAd=Gg7b-0!b4`xL@-MMX3)i-s~whJqa6J)2_= zvlhp8CQ$}PM$nMb02KzH$_-i=z((Df`57S@oPm=GHu5eG6#-S(kn=S`^VQhaS%6f) zQafk^BZ!Z@&H}`T_13VhvjEA%x@!2=S%B2RI%BYD1<-suNF3G`!?w->BoFJ5fySCZ ze3(9XcMK#5I`0*_{sSft>yTkvX93az>w=N9&H|(#)?2~1&H|(k)&T*HM}YXmtg`^A zgY_iHS!V{Oeovd#je58jT3t|P#;&LY1&FSUpPv`&*DIX=I*AT>1wb3P{C(?7mA zu`CsQR1mzRhn&I00Fnf)-U6N31Ul=gB(WrwAwDNRIh&!pIKHwVvm!MIWmX2H0c=`Q zVsR=%YDGzEUP@|8JosRuAl}zCIM~tMl_3#SzkuDBn^=^cS_JZ8 zT25j*LvaRZ@o8xuXo4vKV5nsYkoC-b{t1Pt$eEL`}$dU1R#i_~p zc`3z^DJf70fdVkTgdsB}J~_V>w8oDCq_7NhVw9&p_$aq{P>(D*J|{CTl_9<$zZhIE z=AlfDfu_tr=bb?gOk;?LghMfCG7dcZ2J%#VZenpZ#KSJ0K@25j@ukI}L(OtiiWw4% z(#sGNU!cW=c_|Fgqq*Wi-Yzy`NR9^w066SGvr_TkXpJw;D=kh}x%z<8eO_V?d@c_Z3rVGE5dV~C<`sj^;)~Bqttf${EHe|x>}Ek?Wlnx#3PXH+ zL1Ky_gfe2tFD-$FK0|VRCMc}HlWfkAiGK1|0YHKs5-It`;EdrP5aQ|Y7YvC*$B>X9 zPp8lj*I@7*W;|%sB18t3e~@Nkp(l!g0}@QYlQt+=ljAcX1%gwko11G8Lp&%dKxq>5 z0KQ`Aly7`IC^n%XoRpZHU0MJMKd?a{ad6%PWfV};E*>;?QeGTilwS@?YsnBR!1*~j zJ_j6V@bUqi4Zx`k6e*y11JBw*&T<2#ebB%L*mQ7)2A2%RM)4&K1<wn#KDKQ9TCG!>L^ zAqP5wPT+$of!P2`=b)qunu!ND#zC1PCqFqchXK5DwWKT_TtI-Pz!~(4D|1T{lNj`h zONtbDXB@N z>G6q0iFxU%AXC8Hg3=^V+`{>pd1?7@rAbLesbw%8xQvDx0(Kot0(1}{xVom403D

PkYboV$f_5}-4Gyg&_N=gwjoqG18hCy52%I?s0NT7Ah$!g z46t>Hpo2g_YawC!Ve2a!pbIiV(<&f)U>IZuj18he`?^4D8DaWi>lbyP4O-AS<{))Y z=YV>$ATFE+orwfm8wt}7TOauXsvj19=)PTYnT|ekNY*3hh#vefzz{VtYfKKcIP27V7kub;{BrZb{ zXjp}T0envgNc;kH{m=!d{s(9pU|i7Z5|H{@H2tu9Nj88^_yL_?22%)9%z!xG5z1u% zollJHe%LUJh5qKZv^PX9R>!5Eii+j8es7UIdZkkQiv+ z7la0pnBj%4A9M~f$o(+=3efe73ZN5wu!J|d{_SY?gHDA3*=zvSkFFk_4_b>4N_#N- zVe5He_pyLx*FomNq5-BKmMlPH)X46Ko%4AEbm9<}_=4$&(V%`WvVPcl>IYE$u<{G! z1`vkngVC4K{GR|FJWl|fV1y5fX-#CorLVQ2Swg z7!A|UiLhnJ-YpDps7EY zBodts?fB0Eo#TNdj;>z_hkjPj)D8m!186l5l6KIjBr=x)bnpwhnIHws!61@>0knJo z!h(?KYIShfe*iR@0=f?XE&S2rA9Sw-$V_N)1F-~@ZlH(M+JiC&Tokk~6T$)M0kJ>_ zy}{BBh!4Zz2@sYGOd*7e;eU`cniIh)7i57c$b~ix3=E)l0%(~d%>A(X7qm_loBazw z7mP44FgyZJFGJ13kya40s4Qj%Mg|KeXhK4gVrF21-?xM$%)rdR4Bu~oD$W9LSD=cs z!uMmKinB4m+5xEI>SI)K%zHdQ^2`j}46ynW#D`&K1|9}j zy$BNn(aa2(_aQ*U`50jJ7>EzU%nbbS`=(%GAexy$fB{zTfcP-X%pk}Bt50BJAexy$ zhyhklfcP-X%plAFEB|3)Aexy$gaKBrgZMDa%pl4DE3aW46XlC$jMF>8O#SFg{2_^!enc+89LHIC|nE`Z6A&iHh znZdUxA^0#BGXu0y0~3JK%$FIaI=jAG92bcLnB|LGtAG9i)iGha!HV+HSFrfQ?u!S3F$s;3{a#9Sm z`T|QisR9KwGeEciEH1f9=vO4>Y?2=hI?q@Fn4}L69;Y80GSV3nJ>s7!2nx`1#>@WR|~R# zVfW*Squu`lyB|*xO&oM@8pwQYus9FKzG-u)IQsmoEmRzRe$p8%4l)sfp~E{2k!a$u zelqBuHvy)P|IyoTp!MI#{({XLgBIH%i^J~U1MMvkWD;k{fR;ZH+Zh;^q1g*dSDV4& zJPe>iYe8zkd$Ac97!HHQK_UK7!!2nw% z2NUOE1>Ktm(h0$!{uYR(fF=&R$IldM4y+#zOAnrC>S6o8bI`;=hhc%t2c23DN>{LZ zL}2Fhg4JWT|0jdRK{_EAbl^6KwH!?xc8?!uWgv2V!S3+`t=&f!2OY!>G6%GA0$IEd zB**~S@BnfrY{?1-08iTG-i8!xJ?A2@;n@6NlaJr->#GGsh0J5}iSU0k$v^ zv@a24jyqUA561Zh!C-Na3J8YX2bhT_4!aMq1}x5laSlWaSR7&oh=kn}I0H=_G%gB~ zUket;?0;6Ni;2jO?i447)#23{4z%f1nnc zIPCsF6Etz?usDMUSe%CeeO*T|I|Bo@awCl$lD}a0-@x)$71SKi>C_U~!0@AQE<;;Z2aeSjxj! zXzD@xCP4bWL;VZ8*9YcbZVuFVf!%W`k0uVQH;uvKJQ(MhSb)VrHbF3Gj}wUHizW^_ zvjZd^!2!CD4zvH83|5ah4v+~J2kC@h*f0!e`80Al0J|5l5v-nv0e!vBB(ONd3=jz` zPnMyHgO^k?Ffi=oz@C0UTYHi11&zCc%)5_f&Lxl_0|UcfG;z@0M358@Cu;bE4&n!i z%X5Opx-rw08k&007Cex8D^5^){)lmpVgS?}^m`OT(aeF}qX@cX3RHf=mQusY&pb5s zp!0Y@_Ew{bgXS+l;w@<6pmTaa;uF!tVfQO8MiU2(BZJg$MH7d$6HcLt!_vbmkbkk{ zi@)ITL5w58(mxMql`-fRY3P;`*f}|3T%hojV1O+@huuXY4OS0w83e=POASpNv`-PF z!W2y$R?h~aiNo5fsc7P`c4HwIC_P~27toFsAqE}>^z~z1T%h~~aseuy2R5IF0ezj_ zGLZRL!fg*&J;Dsw{g9V&n9pDXnrlwXOHlyL727fB>Fep~!+Vonay6@#D^;>9JUX=!?(1u)Jb{z36Rp1~pU@eJ|t zE+{-NXSh^>o&iI0K4{T(NotB7XxULpetddPeiCQ}6KIh`d}3(@19-7Pd`f9=ca9PCy? z?m~s!(h6SC1X|q#Uf%~=8wKWo@2Lc{KnLJ~modRkv49-30Xh8wt{wR)W_pffPU`vEAt!AD>d39}it#1a<`Ij!n>BLue=`7ng#K zge*4$g)KM$K}$-(OZkv4e1+d_i5e7;C0y`(U>P76T%xK0+YGu46Xk-~l9beaGBE-A`M%|q1+iv&Q ziX!Misjw?WQ5C?JX`!sMgN_9ekH7XxUqSK?$l3q+|>> z6%-1fNCGEb_}W3_8&i=N$fe}RgB%1|w+mWNoS1`dJjhg}{00j(@CCl0jF*>!s-w81 zC^-WyRYNX^MOBwyP=b0RGbo#bBMsyt$of_W&|)@dbU|_{%zBK=fHTuk58;7aXNzhj z_&Qlsq4@ZMqEs|5f>INzDwIGabk#6;{}8Hv=)JXAjKOgUF}!HY#BvicQr1pPfs|YD z8-zg_7gX|sF3v@D1E?5A6#+R1RBe!SWpO;Xbb%%aNU{X2BLx>jprzL-NJ~G#hYvxE zN4N_?Tj#I*RAu?hSJZfY^oDaWV7&Uaz HZczpRM^4Dj diff --git a/samplesshd b/samplesshd deleted file mode 100755 index 81be44ed1faa8269de86abb74336e5edfcaa75dd..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11338 zcmb<-^>JfjWMqH=CI&kOFpt#%ECeAL7&L^zTrlClV8Ou2;J~25pvb_+z`(%Dz`y`g z=Ky8F=pSIi7#LtQ2iOD#24)5Z1{MYe1`8&LfCUr81Q;y?5oUnVP-DPu1K9_aMzI+r zmctGr85m$R1A_oq0Hhz})&i(}0eb*g97c0M-5~&_VfsK^kiHpEeKVl?VDtiz!3+!x zFdF7Rkl#Q!1Y`gM149VZe=u4BY&!!3j0UL%2?abYNdd9SH=v1|F(A?e%xnEpCR5Q($CS?)0rVYGcU7*AwDfLFOwnO-N)a_(I?*D%`Mn9BtFE^$;UOGA>OMj zJ}5Okv$!O+$T=smxHz?#AwE7mH$N}FxFoTtBt9NwZZar3%^2e2b25{Xp%S@?nRyKH zsVRvii45`aNyWtwafbNRyc7m^A5SOecq2U{JyVdInHU&RAV>@(5()M@h{wQCDwW9z zisfDim%#!W9-w#zr46VsLj+VDlulr22qfpx{D$KNDAHdXVqjo+F_)2n!K3*I$Kn5` zSu6q!|5bBX1Q;evm@whLDu|x}((>}b|Ns9%3=sA(eCyeHG0vm&kw^2B4*?;b#}62= zIWTw}KX`!^L>)iC>cH?~-~a#rzf1tx<Hh_=RUqTxxWQJDMSy`J z)T8rhiNI@>2_DS{I6OL8SwW7uwyyPllv#I2Qa+!{k8x9$-{8lCQL9qfXtgP!J{)q<%LgY zipme4Ue$g^0S1rG9F-3q&2J~Ue*dm0R|t<2ObB1Fnd@YF6Q^>JnHyg z5Ycr+i8fI4tOTH1tAk6v91MgfLkk6u{=knx(Y z!NGFyH}h-uw6qETL+&zo{6Fo{{QH0DXHf7&$G!yRESQr)0Tb+T{4l881#9ePeaRre z@LB-se~;$Z9RDwPbTfN2|M*|}5o`j;!yvUU=7Zc1id_ZSLz6aGUpy&lD0hs}!LE<2q zu_}mxu|j}R8mb4R7K9i4`~N=-q`<3(shK5!PoWK>6C?++|G~fi|1CiBj(h@bOdfm^ z&CGs$AV-447#JA-LjjbF!H0=Moe3`sVSG^D0jc2u5ey9Qa*G$rhm}j9@)9Ie0j+mH zWhaP#fEg4U4B&bj#NPpxhvl`IAVCHO22gnkVoHDr1_lOEC=H_^zGh&6m204K8YBl( z4+}?7eg%n(g9ru&h856q7A8Ic$_Lc}ASE#UureOT|M&lYK1jX*s{TKe4-1zMP<|9t z9;B8Y7`;A$+4&BKJ36542L^X%XDbB_cfU|g1!FxEJ!1tU0|OI7LnBiK4foW%lKgxH zA5g^#k<=|R)KMrdF3<%l)iuyjD9B9Jwa_!yGuLDoHEPI*6)e>-F!(^*Jdjoq1H7F9 z%g?ZO3M_xX#)J>6hdd=ojP{l_aL8>ZgO+ z8M;P#phOPI4F*QKMTYw2`9<0KNu`-NDY}WdDP|_1#%8>kiEcqMwDFmqR|;X3WE7<) zrWETZ7nkZM7nNk{1v8Ll3&IJ;AVV13{X!KSgB6VQ3{CYcjr0ukj2IXj4uZoJ)WYRp zJj}qra2Of~u&^xx)iy~G0Y*1;h^Rd1EUm3k};GG zR5>w9fpvv2uyBCtM+Qi2WP=O@waG{fCvsvVk2bNvD99kd#>^qjp~@i)3Uo$6MgcY< zMnOhZK4ETVK50G%1|}5-Wt=bQYOomEOL@@s5<6>ZB1oxyFNlSC2h9v_7 zG--o#5hoL@%4b$#WMW}pWMtrEf|U}?5{w>9tPn9+Nx{s;=uu>)qwB%M$iT>G3HAc0 zfx?L51%~3p+=86c;^K@HJy7$SfdOPJG@&yaGBPnUFfuL$YaS5)gAx zIr(|%3Sa^xq@R(Wo2s8!lv%8wl3E7p92Xa7=o;u5>87NXL5e`I+S0t@%=Em}6tFpP zPI5+K5xA&vhE(_Dw*?@Mgc}TU8iQVOWo}7g5`$iGNfCt3fUz?3N>Ymo81(Y;OH%b5 zoji3*64M#@K zDPhn9cS7|_QY%Ur^uS$Fy`p?@w^1)OBR;JtF*h|nBc+G|&STI^F3B${X3$H4P+7@E zV9OJ8Gm{zg((_BegdW&zh&f5c#SD7M`MJ5Nc_j>bDXB@N>G6q0iFxU%AXC8Hg3_eC z#9RbFGcPS4t~4pBD76g6%gM}3g|We|gK>&WKqW9Jtx$rcL4^c3yFg5VjdQ`qzd%Ja zL8<&CY2c&7(i`iNCk>Ko&=VLk0U{Nkg+uw8$=sI$LV1DVf}&%r~sr_fY1kP zkHgv>=FmO?R5=5z->?HJ0IAX;V}T&I!}P=2@AeFkF+Zqs23SAj05rqF`W+y*f-uMo z5DmlbkiJtsOh2rh9|d)w7*rvY3m!KD3BlBdFfcHH`VcTatRGPT)c`61LF&OZ2&hs7 zagZ>m34)`OCV&JP7#LvwgmS@SS|IH(aZm*gl7s1o^@CP`1kv<^`d;YaR}M`- z;EElo-**5_KgdoHh6;n2U<^vbpfH8$zX5H>-GC~D`5&wp)Hs1MK&>1Qvlh*M2540P z9{dIM>p+Hs6hbjfAC$|`jHVw}X{~@dh!3U^N<*CmOp!z7{-Uur_lTl8+UMk>PJt%Fnuuk zGMfGb=y+lRR6i`Ag6sxim_862gl|I21epI} zL16`Df~n^?^iKd47NGI~tO`NE!W|~^4Tt^!=s*&veuAk5(dhQGF@na>Kr*N}8>&B? zfcu4T=syI__|>S!!pFT}!U{O_+wwzHtVDA#8ka!_hyEAPfHHs>11Hhr(-Nv5U7ds= zL<=Z=LRb(IW4v;TxT*cgT;v;+&X47s=W)NV2)jJ?Q3^Owb!s`>57>H(O z5MqGU6CgeeGcyP?z{-D^7>H(O5Mh9o>mWW1Gc$<7=Vf4GAexy$3_kt~;=?dAgE#}M ze1(aDXl4cp23WZX;=?dAgCvZJLNhafX4_DNz#L`<^wJ6}%)ktvEr#%6Br}67jEO=s zGsvOvVH{=#c^DIgX2xh`L!_A*K;tqHHZsY~poGkYvzZw{xfIR?GeG%`h2bN7UJ5J- zt=CBr2aWfUq8^vM6TodiO!v&jA-)WUI4P?tjY&nlLXJBC12vX00xsGNpR6Y8*>miVOEdIL83|be1*{-+;HV3nP^#q4GKS1JG z-18q4ZVVs)!}^sVKY*|(3uGM-`Z^sckT@21>au|13(>BFHLGnv>anzoJXt{g0@;L$ zV?pY%m|u)TJ%bHsAT%*AMFBLBX~&?aucxPv#;@ehjk@eB@$k7tOFcR}HK zIm4w2^b8o1^FebwC8;TTh79rXDf#i~Ir&M6Iq~2T`1r)q3I^~)6nR)T0#i=Qvs81|Ogjt1kX&|b_P*aeSV0=6S0Oc-Ep#T5? diff --git a/ssh1/auth1.c b/ssh1/auth1.c deleted file mode 100644 index d92f50cc..00000000 --- a/ssh1/auth1.c +++ /dev/null @@ -1,202 +0,0 @@ -/* auth1.c deals with authentication with SSH-1 protocol */ -/* -Copyright 2005 Aris Adamantiadis - -This file is part of the SSH Library - -The SSH Library is free software; you can redistribute it and/or modify -it under the terms of the GNU Lesser General Public License as published by -the Free Software Foundation; either version 2.1 of the License, or (at your -option) any later version. - -The SSH Library is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public -License for more details. - -You should have received a copy of the GNU Lesser General Public License -along with the SSH Library; see the file COPYING. If not, write to -the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, -MA 02111-1307, USA. */ - -#include "libssh/priv.h" -#include "libssh/ssh1.h" -#include -#include - -/* -static void burn(char *ptr){ - if(ptr) - memset(ptr,'X',strlen(ptr)); -} -*/ -#ifdef HAVE_SSH1 -static int wait_auth1_status(SSH_SESSION *session){ - /* wait for a packet */ - if(packet_read(session)) - return SSH_AUTH_ERROR; - if(packet_translate(session)) - return SSH_AUTH_ERROR; - switch(session->in_packet.type){ - case SSH_SMSG_SUCCESS: - return SSH_AUTH_SUCCESS; - case SSH_SMSG_FAILURE: - return SSH_AUTH_DENIED; - } - ssh_set_error(session,SSH_FATAL,"Was waiting for a SUCCESS or " - "FAILURE, got %d",session->in_packet.type); - return SSH_AUTH_ERROR; -} -static int send_username(SSH_SESSION *session, char *username){ - STRING *user; - /* returns SSH_AUTH_SUCCESS or SSH_AUTH_DENIED */ - if(session->auth_service_asked) - return session->auth_service_asked; - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_USER); - if(!username) - if(!(username=session->options->username)){ - if(options_default_username(session->options)) - return session->auth_service_asked=SSH_AUTH_ERROR; - else - username=session->options->username; - } - user=string_from_char(username); - buffer_add_ssh_string(session->out_buffer,user); - free(user); - packet_send(session); - session->auth_service_asked=wait_auth1_status(session); - return session->auth_service_asked; -} - -/* use the "none" authentication question */ - -int ssh_userauth1_none(SSH_SESSION *session,char *username){ - return send_username(session,username); -} - -/* -int ssh_userauth_offer_pubkey(SSH_SESSION *session, char *username,int type, STRING *publickey){ - STRING *user; - STRING *service; - STRING *method; - STRING *algo; - int err=SSH_AUTH_ERROR; - if(!username) - if(!(username=session->options->username)){ - if(options_default_username(session->options)) - return SSH_AUTH_ERROR; - else - username=session->options->username; - } - if(ask_userauth(session)) - return SSH_AUTH_ERROR; - user=string_from_char(username); - service=string_from_char("ssh-connection"); - method=string_from_char("publickey"); - algo=string_from_char(ssh_type_to_char(type)); - - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH2_MSG_USERAUTH_REQUEST); - buffer_add_ssh_string(session->out_buffer,user); - buffer_add_ssh_string(session->out_buffer,service); - buffer_add_ssh_string(session->out_buffer,method); - buffer_add_u8(session->out_buffer,0); - buffer_add_ssh_string(session->out_buffer,algo); - buffer_add_ssh_string(session->out_buffer,publickey); - packet_send(session); - err=wait_auth_status(session,0); - free(user); - free(method); - free(service); - free(algo); - return err; -} -*/ -int ssh_userauth1_offer_pubkey(SSH_SESSION *session, char *username, int type, - STRING *pubkey){ - return SSH_AUTH_DENIED; -} - -/* -int ssh_userauth_pubkey(SSH_SESSION *session, char *username, STRING *publickey, PRIVATE_KEY *privatekey){ - STRING *user; - STRING *service; - STRING *method; - STRING *algo; - STRING *sign; - int err=SSH_AUTH_ERROR; - if(!username) - if(!(username=session->options->username)){ - if(options_default_username(session->options)) - return err; - else - username=session->options->username; - } - if(ask_userauth(session)) - return err; - user=string_from_char(username); - service=string_from_char("ssh-connection"); - method=string_from_char("publickey"); - algo=string_from_char(ssh_type_to_char(privatekey->type)); - - -*/ /* we said previously the public key was accepted */ -/* packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH2_MSG_USERAUTH_REQUEST); - buffer_add_ssh_string(session->out_buffer,user); - buffer_add_ssh_string(session->out_buffer,service); - buffer_add_ssh_string(session->out_buffer,method); - buffer_add_u8(session->out_buffer,1); - buffer_add_ssh_string(session->out_buffer,algo); - buffer_add_ssh_string(session->out_buffer,publickey); - sign=ssh_do_sign(session,session->out_buffer,privatekey); - if(sign){ - buffer_add_ssh_string(session->out_buffer,sign); - free(sign); - packet_send(session); - err=wait_auth_status(session,0); - } - free(user); - free(service); - free(method); - free(algo); - return err; -} -*/ - -int ssh_userauth1_password(SSH_SESSION *session,char *username,char *password){ - STRING *password_s; - int err; - err=send_username(session,username); - if(err!=SSH_AUTH_DENIED) - return err; - /* we trick a bit here. A known flaw in SSH1 protocol is that it's - * easy to guess password sizes. - * not that sure ... - */ - if(strlen(password)>=128){ - /* not risky to disclose the size of such a big password .. */ - password_s=string_from_char(password); - } else { - /* fill the password string from random things. the strcpy - * ensure there is at least a nul byte after the password. - * most implementation won't see the garbage at end. - * why garbage ? because nul bytes will be compressed by - * gzip and disclose password len. - */ - password_s=string_new(128); - ssh_get_random(password_s->string,128); - strcpy(password_s->string,password); - } - - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_AUTH_PASSWORD); - buffer_add_ssh_string(session->out_buffer,password_s); - string_burn(password_s); - free(password_s); - packet_send(session); - return wait_auth1_status(session); -} - -#endif /* HAVE_SSH1 */ diff --git a/ssh1/channels1.c b/ssh1/channels1.c deleted file mode 100644 index eecfdb0a..00000000 --- a/ssh1/channels1.c +++ /dev/null @@ -1,244 +0,0 @@ -/* channels1.c */ -/* Support for SSH-1 type channels */ -/* -Copyright 2005 Aris Adamantiadis - -This file is part of the SSH Library - -The SSH Library is free software; you can redistribute it and/or modify -it under the terms of the GNU Lesser General Public License as published by -the Free Software Foundation; either version 2.1 of the License, or (at your -option) any later version. - -The SSH Library is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public -License for more details. - -You should have received a copy of the GNU Lesser General Public License -along with the SSH Library; see the file COPYING. If not, write to -the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, -MA 02111-1307, USA. */ - -#include -#include -#include -#include -#include - -#include "libssh/priv.h" -#include "libssh/ssh1.h" - -#ifdef HAVE_SSH1 - -/* this is a big hack. In fact, SSH-1 doesn't make a clever use of channels. - * The whole packets concerning Shells are sent outside of a channel. - * Thus, an inside limitation of this behaviour is that you can't only - * request one Shell. - * And i don't even know yet how they managed to imbed two "channel" - * into one protocol. - */ - -CHANNEL *channel_open_session1(SSH_SESSION *session){ - CHANNEL *chan; - // we guess we are requesting an *exec* channel. It can only have - // only one exec channel. so we abort with an error if we need more than - // one. - if(session->exec_channel_opened){ - ssh_set_error(session,SSH_REQUEST_DENIED,"SSH-1 supports only one execution channel. One has already been opened"); - return NULL; - } - session->exec_channel_opened=1; - chan=channel_new(session); - chan->open=1; - ssh_say(2,"Opened a ssh1 channel session\n"); - return chan; -} -/* 10 SSH_CMSG_REQUEST_PTY - * - * string TERM environment variable value (e.g. vt100) - * 32-bit int terminal height, rows (e.g., 24) - * 32-bit int terminal width, columns (e.g., 80) - * 32-bit int terminal width, pixels (0 if no graphics) (e.g., 480) - * 32-bit int terminal height, pixels (0 if no graphics) (e.g., 640) - * n bytes tty modes encoded in binary - * Some day, someone should have a look at that nasty tty encoded. It's - * much simplier under ssh2. I just hope the defaults values are ok ... - */ - -int channel_request_pty_size1(CHANNEL *channel, char *terminal, int col, - int row){ - STRING *str; - SSH_SESSION *session=channel->session; - str=string_from_char(terminal); - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_REQUEST_PTY); - buffer_add_ssh_string(session->out_buffer,str); - free(str); - buffer_add_u32(session->out_buffer,ntohl(row)); - buffer_add_u32(session->out_buffer,ntohl(col)); - buffer_add_u32(session->out_buffer,0); /* x */ - buffer_add_u32(session->out_buffer,0); /* y */ - buffer_add_u8(session->out_buffer,0); /* tty things */ - ssh_say(2,"Opening a ssh1 pty\n"); - if(packet_send(session)) - return -1; - if(packet_read(session)) - return -1; - if(packet_translate(session)) - return -1; - switch (session->in_packet.type){ - case SSH_SMSG_SUCCESS: - ssh_say(2,"pty : Success\n"); - return 0; - break; - case SSH_SMSG_FAILURE: - ssh_set_error(session,SSH_REQUEST_DENIED, - "Server denied PTY allocation"); - ssh_say(2,"pty : denied\n"); - break; - default: - ssh_say(2,"pty : error\n"); - ssh_set_error(session,SSH_FATAL, - "Received unexpected packet type %d", - session->in_packet.type); - return -1; - } - return -1; -} - -int channel_change_pty_size1(CHANNEL *channel, int cols, int rows){ - SSH_SESSION *session=channel->session; - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_WINDOW_SIZE); - buffer_add_u32(session->out_buffer,ntohl(rows)); - buffer_add_u32(session->out_buffer,ntohl(cols)); - buffer_add_u32(session->out_buffer,0); - buffer_add_u32(session->out_buffer,0); - if(packet_send(session)) - return -1; - ssh_say(2,"Change pty size send\n"); - packet_wait(session,SSH_SMSG_SUCCESS,1); - switch (session->in_packet.type){ - case SSH_SMSG_SUCCESS: - ssh_say(2,"pty size changed\n"); - return 0; - break; - case SSH_SMSG_FAILURE: - ssh_say(2,"pty size change denied\n"); - ssh_set_error(session,SSH_REQUEST_DENIED,"pty size change denied"); - return -1; - } - ssh_set_error(session,SSH_FATAL,"Received unexpected packet type %d", - session->in_packet.type); - return -1; -} - -int channel_request_shell1(CHANNEL *channel){ - SSH_SESSION *session=channel->session; - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_EXEC_SHELL); - if(packet_send(session)) - return -1; - ssh_say(2,"Launched a shell\n"); - return 0; -} - -int channel_request_exec1(CHANNEL *channel, char *cmd){ - SSH_SESSION *session=channel->session; - STRING *command=string_from_char(cmd); - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_EXEC_CMD); - buffer_add_ssh_string(session->out_buffer,command); - free(command); - if(packet_send(session)) - return -1; - ssh_say(2,"executing %s...\n",cmd); - return 0; -} - -static void channel_rcv_data1(SSH_SESSION *session, int is_stderr){ - CHANNEL *channel; - STRING *str; - channel=session->channels; // Easy. hack this when multiple channel - // are comming - str=buffer_get_ssh_string(session->in_buffer); - if(!str){ - ssh_say(0,"Invalid data packet !\n"); - return; - } - ssh_say(3,"adding %d bytes data in %d\n",string_len(str),is_stderr); - if(!is_stderr){ - /* stdout */ - if(channel->write_fct){ - channel->write_fct(channel,str->string,string_len(str), - channel->userarg); - } else { - channel_default_bufferize(channel,str->string,string_len(str), - is_stderr); - } - } else { - /* stderr */ - if(channel->write_err_fct){ - channel->write_err_fct(channel,str->string,string_len(str), - channel->userarg); - } else { - channel_default_bufferize(channel,str->string,string_len(str), - is_stderr); - } - } - free(str); -} - -static void channel_rcv_close1(SSH_SESSION *session){ - CHANNEL *channel=session->channels; - u32 status; - buffer_get_u32(session->in_buffer,&status); - /* it's much more than a channel closing. spec says it's the last - * message sent by server (strange) - */ - /* actually status is lost somewhere */ - channel->open=0; - channel->remote_eof=1; - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_EXIT_CONFIRMATION); - packet_send(session); -} - -void channel_handle1(SSH_SESSION *session, int type){ - ssh_say(3,"Channel_handle1(%d)\n",type); - switch (type){ - case SSH_SMSG_STDOUT_DATA: - channel_rcv_data1(session,0); - break; - case SSH_SMSG_EXITSTATUS: - channel_rcv_close1(session); - break; - default: - ssh_say(0,"Unexepected message %d\n",type); - - } -} - -int channel_write1(CHANNEL *channel, void *data, int len){ - SSH_SESSION *session=channel->session; - int origlen=len; - int effectivelen; - while(len>0){ - packet_clear_out(session); - buffer_add_u8(session->out_buffer,SSH_CMSG_STDIN_DATA); - if(len > 32000) - effectivelen=32000; - else - effectivelen=len; - buffer_add_u32(session->out_buffer,htonl(effectivelen)); - buffer_add_data(session->out_buffer,data,effectivelen); - data+=effectivelen; - len-=effectivelen; - if(packet_send(session)) - return -1; - } - return origlen; -} - -#endif /* HAVE_SSH1 */