Server IP : 103.119.228.120 / Your IP : 3.138.135.4 Web Server : Apache System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64 User : nobody ( 99) PHP Version : 5.6.40 Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/doc/libssh2-devel-1.8.0/example.x86_64/ |
Upload File : |
/* * * Sample showing how to makes SSH2 with X11 Forwarding works. * * Usage : * "ssh2 host user password [DEBUG]" */ #include <string.h> #include <sys/ioctl.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/select.h> #include <arpa/inet.h> #include <unistd.h> #include <sys/types.h> #include <sys/un.h> #include <fcntl.h> #include <errno.h> #include <stdio.h> #include <ctype.h> #include <stdlib.h> #include <termios.h> #include <libssh2.h> #define _PATH_UNIX_X "/tmp/.X11-unix/X%d" /* * Chained list that contains channels and associated X11 socket for each X11 * connections */ struct chan_X11_list { LIBSSH2_CHANNEL *chan; int sock; struct chan_X11_list *next; }; struct chan_X11_list * gp_x11_chan = NULL; struct termios _saved_tio; /* * Utility function to remove a Node of the chained list */ static void remove_node(struct chan_X11_list *elem) { struct chan_X11_list *current_node = NULL; current_node = gp_x11_chan; if (gp_x11_chan == elem) { gp_x11_chan = gp_x11_chan->next; free(current_node); return; } while (current_node->next != NULL) { if (current_node->next == elem) { current_node->next = current_node->next->next; current_node = current_node->next; free(current_node); break; } } } static void session_shutdown(LIBSSH2_SESSION *session) { libssh2_session_disconnect(session, "Session Shutdown, Thank you for playing"); libssh2_session_free(session); } static int _raw_mode(void) { int rc; struct termios tio; rc = tcgetattr(fileno(stdin), &tio); if (rc != -1) { _saved_tio = tio; /* do the equivalent of cfmakeraw() manually, to build on Solaris */ tio.c_iflag &= ~(IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON); tio.c_oflag &= ~OPOST; tio.c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN); tio.c_cflag &= ~(CSIZE|PARENB); tio.c_cflag |= CS8; rc = tcsetattr(fileno(stdin), TCSADRAIN, &tio); } return rc; } static int _normal_mode(void) { int rc; rc = tcsetattr(fileno(stdin), TCSADRAIN, &_saved_tio); return rc; } /* * CallBack to initialize the forwarding. * Save the channel to loop on it, save the X11 forwarded socket to send * and receive info from our X server. */ static void x11_callback(LIBSSH2_SESSION *session, LIBSSH2_CHANNEL *channel, char *shost, int sport, void **abstract) { const char * display = NULL; char * ptr = NULL; char * temp_buff = NULL; int display_port = 0; int sock = 0; int rc = 0; struct sockaddr_un addr; struct chan_X11_list *new; struct chan_X11_list *chan_iter; /* * Connect to the display * Inspired by x11_connect_display in openssh */ display = getenv("DISPLAY"); if ( display != NULL) { if (strncmp( display, "unix:", 5) == 0 || display[0] == ':') { /* Connect to the local unix domain */ ptr = strrchr(display, ':'); temp_buff = (char *) calloc(strlen(ptr+1), sizeof(char)); if (!temp_buff) { perror("calloc"); return; } memcpy(temp_buff, ptr+1, strlen(ptr+1)); display_port = atoi(temp_buff); free(temp_buff); sock = socket(AF_UNIX, SOCK_STREAM, 0); if (sock < 0) return; memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; snprintf(addr.sun_path, sizeof(addr.sun_path), _PATH_UNIX_X, display_port); rc = connect(sock, (struct sockaddr *) &addr, sizeof(addr)); if (rc != -1){ /* Connection Successfull */ if (gp_x11_chan == NULL) { /* Calloc ensure that gp_X11_chan is full of 0 */ gp_x11_chan = (struct chan_X11_list *) calloc(1, sizeof(struct chan_X11_list)); gp_x11_chan->sock = sock; gp_x11_chan->chan = channel; gp_x11_chan->next = NULL; } else { chan_iter = gp_x11_chan; while (chan_iter->next != NULL) chan_iter = chan_iter->next; /* Create the new Node */ new = (struct chan_X11_list *) malloc(sizeof(struct chan_X11_list)); new->sock = sock; new->chan = channel; new->next = NULL; chan_iter->next = new; } } else close(sock); } } return; } /* * Send and receive Data for the X11 channel. * If the connection is closed, returns -1, 0 either. */ static int x11_send_receive(LIBSSH2_CHANNEL *channel, int sock) { char * buf = NULL; int bufsize = 8192; int rc = 0; int nfds = 1; LIBSSH2_POLLFD *fds = NULL; fd_set set; struct timeval timeval_out; timeval_out.tv_sec = 0; timeval_out.tv_usec = 0; FD_ZERO(&set); FD_SET(sock,&set); if ((buf = calloc (bufsize, sizeof(char))) == NULL) return 0; if ((fds = malloc (sizeof (LIBSSH2_POLLFD))) == NULL) { free(buf); return 0; } fds[0].type = LIBSSH2_POLLFD_CHANNEL; fds[0].fd.channel = channel; fds[0].events = LIBSSH2_POLLFD_POLLIN; fds[0].revents = LIBSSH2_POLLFD_POLLIN; rc = libssh2_poll(fds, nfds, 0); if (rc >0) { rc = libssh2_channel_read(channel, buf, bufsize); write(sock, buf, rc); } rc = select(sock+1, &set, NULL, NULL, &timeval_out); if (rc > 0) { memset((void *)buf, 0, bufsize); /* Data in sock*/ rc = read(sock, buf, bufsize); if (rc > 0) { libssh2_channel_write(channel, buf, rc); } else { free(buf); return -1; } } free(fds); free(buf); if (libssh2_channel_eof(channel) == 1) { return -1; } return 0; } /* * Main, more than inspired by ssh2.c by Bagder */ int main (int argc, char *argv[]) { unsigned long hostaddr = 0; int sock = 0; int rc = 0; struct sockaddr_in sin; LIBSSH2_SESSION *session; LIBSSH2_CHANNEL *channel; char *username = NULL; char *password = NULL; size_t bufsiz = 8193; char *buf = NULL; int set_debug_on = 0; int nfds = 1; LIBSSH2_POLLFD *fds = NULL; /* Chan List struct */ struct chan_X11_list *current_node = NULL; /* Struct winsize for term size */ struct winsize w_size; struct winsize w_size_bck; /* For select on stdin */ fd_set set; struct timeval timeval_out; timeval_out.tv_sec = 0; timeval_out.tv_usec = 10; if (argc > 3) { hostaddr = inet_addr(argv[1]); username = argv[2]; password = argv[3]; } else { fprintf(stderr, "Usage: %s destination username password", argv[0]); return -1; } if (argc > 4) { set_debug_on = 1; fprintf (stderr, "DEBUG is ON: %d\n", set_debug_on); } rc = libssh2_init (0); if (rc != 0) { fprintf (stderr, "libssh2 initialization failed (%d)\n", rc); return 1; } sock = socket (AF_INET, SOCK_STREAM, 0); if (sock == -1) { perror("socket"); return -1; } sin.sin_family = AF_INET; sin.sin_port = htons (22); sin.sin_addr.s_addr = hostaddr; rc = connect(sock, (struct sockaddr *) &sin, sizeof(struct sockaddr_in)); if (rc != 0) { fprintf (stderr, "Failed to established connection!\n"); return -1; } /* Open a session */ session = libssh2_session_init(); rc = libssh2_session_handshake(session, sock); if (rc != 0) { fprintf(stderr, "Failed Start the SSH session\n"); return -1; } if (set_debug_on == 1) libssh2_trace(session, LIBSSH2_TRACE_CONN); /* Set X11 Callback */ libssh2_session_callback_set(session, LIBSSH2_CALLBACK_X11, (void *)x11_callback); /* Authenticate via password */ rc = libssh2_userauth_password(session, username, password); if (rc != 0) { fprintf(stderr, "Failed to authenticate\n"); session_shutdown(session); close(sock); return -1; } /* Open a channel */ channel = libssh2_channel_open_session(session); if ( channel == NULL ) { fprintf(stderr, "Failed to open a new channel\n"); session_shutdown(session); close(sock); return -1; } /* Request a PTY */ rc = libssh2_channel_request_pty( channel, "xterm"); if (rc != 0) { fprintf(stderr, "Failed to request a pty\n"); session_shutdown(session); close(sock); return -1; } /* Request X11 */ rc = libssh2_channel_x11_req(channel,0); if(rc!=0) { fprintf(stderr, "Failed to request X11 forwarding\n"); session_shutdown(session); close(sock); return -1; } /* Request a shell */ rc = libssh2_channel_shell(channel); if (rc!=0) { fprintf(stderr, "Failed to open a shell\n"); session_shutdown(session); close(sock); return -1; } rc = _raw_mode(); if (rc != 0) { fprintf(stderr, "Failed to entered in raw mode\n"); session_shutdown(session); close(sock); return -1; } memset(&w_size, 0, sizeof(struct winsize)); memset(&w_size_bck, 0, sizeof(struct winsize)); while (1) { FD_ZERO(&set); FD_SET(fileno(stdin),&set); /* Search if a resize pty has to be send */ ioctl(fileno(stdin), TIOCGWINSZ, &w_size); if ((w_size.ws_row != w_size_bck.ws_row) || (w_size.ws_col != w_size_bck.ws_col)) { w_size_bck = w_size; libssh2_channel_request_pty_size(channel, w_size.ws_col, w_size.ws_row); } if ((buf = calloc (bufsiz, sizeof(char))) == NULL) break; if ((fds = malloc (sizeof (LIBSSH2_POLLFD))) == NULL) { free(buf); break; } fds[0].type = LIBSSH2_POLLFD_CHANNEL; fds[0].fd.channel = channel; fds[0].events = LIBSSH2_POLLFD_POLLIN; fds[0].revents = LIBSSH2_POLLFD_POLLIN; rc = libssh2_poll(fds, nfds, 0); if (rc >0) { libssh2_channel_read(channel, buf, sizeof(buf)); fprintf(stdout, "%s", buf); fflush(stdout); } /* Looping on X clients */ if (gp_x11_chan != NULL) { current_node = gp_x11_chan; } else current_node = NULL; while (current_node != NULL) { struct chan_X11_list *next_node; rc = x11_send_receive(current_node->chan, current_node->sock); next_node = current_node->next; if (rc == -1){ shutdown(current_node->sock,SHUT_RDWR); close(current_node->sock); remove_node(current_node); } current_node = next_node; } rc = select(fileno(stdin)+1,&set,NULL,NULL,&timeval_out); if (rc > 0) { /* Data in stdin*/ rc = read(fileno(stdin), buf,1); if (rc > 0) libssh2_channel_write(channel,buf, sizeof(buf)); } free (fds); free (buf); if (libssh2_channel_eof (channel) == 1) { break; } } if (channel) { libssh2_channel_free (channel); channel = NULL; } _normal_mode(); libssh2_exit(); return 0; }