diff --git a/pandora_agents/win32/ChangeLog b/pandora_agents/win32/ChangeLog index 7193c624c8..d31714343d 100644 --- a/pandora_agents/win32/ChangeLog +++ b/pandora_agents/win32/ChangeLog @@ -1,3 +1,14 @@ +2006-07-10 Esteban Sanchez + + * modules/pandora_module_list.cc: Delete modules from the list in the + destructor. + + * ssh/libssh2/*: Updated to a new version of libssh2 (v 0.14). It + solves a very important leak. + + * PandoraAgent.dev: Linker options modified. Libssh2 files are not + compiled as C++. + 2006-07-05 Sancho Lerena * INSTALL, COPYNG: Added to repository diff --git a/pandora_agents/win32/PandoraAgent.dev b/pandora_agents/win32/PandoraAgent.dev index de9b257385..bf5cb4b00f 100644 --- a/pandora_agents/win32/PandoraAgent.dev +++ b/pandora_agents/win32/PandoraAgent.dev @@ -12,7 +12,7 @@ ResourceIncludes= MakeIncludes= Compiler= CppCompiler= -Linker=-lole32_@@_-loleaut32_@@_-luuid_@@_-lpsapi_@@_-lwsock32_@@_-leay32_@@_-lz_@@_-liphlpapi_@@_-lnetapi32_@@_-lws2_32_@@_ +Linker=-lole32_@@_-loleaut32_@@_-luuid_@@_-lpsapi_@@_-lwsock32_@@_-lz_@@_-liphlpapi_@@_-lnetapi32_@@_-lws2_32_@@_-lcrypto_@@_-lgdi32_@@__@@_ IsCpp=1 Icon= ExeOutput= @@ -379,43 +379,43 @@ BuildCmd= [Unit34] FileName=ssh\libssh2\userauth.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c userauth.c -o userauth.o $(CFLAGS) [Unit35] FileName=ssh\libssh2\comp.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c comp.c -o comp.o $(CFLAGS) [Unit36] FileName=ssh\libssh2\crypt.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c crypt.c -o crypt.o $(CFLAGS) [Unit37] FileName=ssh\libssh2\kex.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c kex.c -o kex.o $(CFLAGS) [Unit38] FileName=ssh\libssh2\libssh2.h @@ -449,53 +449,53 @@ BuildCmd= [Unit41] FileName=ssh\libssh2\mac.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c mac.c -o mac.o $(CFLAGS) [Unit42] FileName=ssh\libssh2\packet.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c packet.c -o packet.o $(CFLAGS) [Unit43] FileName=ssh\libssh2\publickey.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c publickey.c -o publickey.o $(CFLAGS) [Unit44] FileName=ssh\libssh2\scp.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c scp.c -o scp.o $(CFLAGS) [Unit45] FileName=ssh\libssh2\session.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c session.c -o session.o $(CFLAGS) [Unit47] FileName=ssh\libssh2\libssh2_priv.h @@ -519,43 +519,43 @@ BuildCmd= [Unit49] FileName=ssh\libssh2\misc.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c misc.c -o misc.o $(CFLAGS) [Unit50] FileName=ssh\libssh2\sftp.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c sftp.c -o sftp.o $(CFLAGS) [Unit51] FileName=ssh\libssh2\channel.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c channel.c -o channel.o $(CFLAGS) [Unit46] FileName=ssh\libssh2\hostkey.c -CompileCpp=1 +CompileCpp=0 Folder=SSH/libssh2 Compile=1 Link=1 Priority=1000 OverrideBuildCmd=0 -BuildCmd= +BuildCmd=$(CC) -c hostkey.c -o hostkey.o $(CFLAGS) [Unit54] FileName=windows\pandora_windows_info.h diff --git a/pandora_agents/win32/bin/PandoraAgent.exe b/pandora_agents/win32/bin/PandoraAgent.exe index 854fe2883e..a2e480a23f 100755 Binary files a/pandora_agents/win32/bin/PandoraAgent.exe and b/pandora_agents/win32/bin/PandoraAgent.exe differ diff --git a/pandora_agents/win32/main.cc b/pandora_agents/win32/main.cc index 89423b3311..b8ee375f78 100644 --- a/pandora_agents/win32/main.cc +++ b/pandora_agents/win32/main.cc @@ -73,7 +73,7 @@ main (int argc, char *argv[]) { } } service->run (); - + delete service; return 0; } diff --git a/pandora_agents/win32/modules/pandora_module_list.cc b/pandora_agents/win32/modules/pandora_module_list.cc index 2e67921b73..66b10bcf20 100644 --- a/pandora_agents/win32/modules/pandora_module_list.cc +++ b/pandora_agents/win32/modules/pandora_module_list.cc @@ -72,14 +72,21 @@ Pandora_Module_List::Pandora_Module_List (string filename) { } Pandora_Module_List::~Pandora_Module_List () { - if (modules != NULL) { - delete modules; - modules = NULL; - } - if (current != NULL) { - delete current; - current = NULL; + Pandora_Module *module; + std::list::iterator iter; + + if (modules->size () > 0) { + iter = modules->begin (); + do { + module = *iter; + delete module; + iter++; + } while (iter != modules->end ()); } + delete modules; + delete current; + modules = NULL; + current = NULL; } void diff --git a/pandora_agents/win32/pandora_windows_service.h b/pandora_agents/win32/pandora_windows_service.h index 7ac534fd73..7c7805f250 100644 --- a/pandora_agents/win32/pandora_windows_service.h +++ b/pandora_agents/win32/pandora_windows_service.h @@ -39,7 +39,7 @@ private: string agent_name; TiXmlElement * getXmlHeader (); - +public: void pandora_run (); void pandora_init (); public: diff --git a/pandora_agents/win32/ssh/libssh2/channel.c b/pandora_agents/win32/ssh/libssh2/channel.c index 705ab0fd12..0daacd502d 100644 --- a/pandora_agents/win32/ssh/libssh2/channel.c +++ b/pandora_agents/win32/ssh/libssh2/channel.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -120,7 +120,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_channel_open_ex(LIBSSH2_SESSION *session, c #ifdef LIBSSH2_DEBUG_CONNECTION _libssh2_debug(session, LIBSSH2_DBG_CONN, "Opening Channel - win %d pack %d", window_size, packet_size); #endif - channel = (LIBSSH2_CHANNEL *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); + channel = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); if (!channel) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate space for channel data", 0); return NULL; @@ -128,7 +128,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_channel_open_ex(LIBSSH2_SESSION *session, c memset(channel, 0, sizeof(LIBSSH2_CHANNEL)); channel->channel_type_len = channel_type_len; - channel->channel_type = (unsigned char *) LIBSSH2_ALLOC(session, channel_type_len); + channel->channel_type = LIBSSH2_ALLOC(session, channel_type_len); if (!channel->channel_type) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Failed allocating memory for channel type name", 0); LIBSSH2_FREE(session, channel); @@ -144,7 +144,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_channel_open_ex(LIBSSH2_SESSION *session, c libssh2_channel_add(session, channel); - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate temporary space for packet", 0); return NULL; @@ -244,7 +244,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_channel_direct_tcpip_ex(LIBSSH2_SESSION *se _libssh2_debug(session, LIBSSH2_DBG_CONN, "Requesting direct-tcpip session to from %s:%d to %s:%d", shost, sport, host, port); #endif - s = message = (unsigned char *) LIBSSH2_ALLOC(session, message_len); + s = message = LIBSSH2_ALLOC(session, message_len); if (!message) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for direct-tcpip connection", 0); return NULL; @@ -257,7 +257,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_channel_direct_tcpip_ex(LIBSSH2_SESSION *se memcpy(s, shost, shost_len); s += shost_len; libssh2_htonu32(s, sport); s += 4; - channel = (LIBSSH2_CHANNEL *) libssh2_channel_open_ex(session, "direct-tcpip", sizeof("direct-tcpip") - 1, LIBSSH2_CHANNEL_WINDOW_DEFAULT, LIBSSH2_CHANNEL_PACKET_DEFAULT, (char *) message, message_len); + channel = libssh2_channel_open_ex(session, "direct-tcpip", sizeof("direct-tcpip") - 1, LIBSSH2_CHANNEL_WINDOW_DEFAULT, LIBSSH2_CHANNEL_PACKET_DEFAULT, message, message_len); LIBSSH2_FREE(session, message); return channel; @@ -279,7 +279,7 @@ LIBSSH2_API LIBSSH2_LISTENER *libssh2_channel_forward_listen_ex(LIBSSH2_SESSION _libssh2_debug(session, LIBSSH2_DBG_CONN, "Requesting tcpip-forward session for %s:%d", host, port); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memeory for setenv packet", 0); return NULL; @@ -308,7 +308,7 @@ LIBSSH2_API LIBSSH2_LISTENER *libssh2_channel_forward_listen_ex(LIBSSH2_SESSION if (data[0] == SSH_MSG_REQUEST_SUCCESS) { LIBSSH2_LISTENER *listener; - listener = (LIBSSH2_LISTENER *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_LISTENER)); + listener = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_LISTENER)); if (!listener) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for listener queue", 0); LIBSSH2_FREE(session, data); @@ -316,7 +316,7 @@ LIBSSH2_API LIBSSH2_LISTENER *libssh2_channel_forward_listen_ex(LIBSSH2_SESSION } memset(listener, 0, sizeof(LIBSSH2_LISTENER)); listener->session = session; - listener->host = (char *) LIBSSH2_ALLOC(session, host_len + 1); + listener->host = LIBSSH2_ALLOC(session, host_len + 1); if (!listener->host) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for listener queue", 0); LIBSSH2_FREE(session, listener); @@ -379,7 +379,7 @@ LIBSSH2_API int libssh2_channel_forward_cancel(LIBSSH2_LISTENER *listener) _libssh2_debug(session, LIBSSH2_DBG_CONN, "Cancelling tcpip-forward session for %s:%d", listener->host, listener->port); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memeory for setenv packet", 0); return -1; @@ -475,7 +475,7 @@ LIBSSH2_API int libssh2_channel_setenv_ex(LIBSSH2_CHANNEL *channel, char *varnam _libssh2_debug(session, LIBSSH2_DBG_CONN, "Setting remote environment variable: %s=%s on channel %lu/%lu", varname, value, channel->local.id, channel->remote.id); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memeory for setenv packet", 0); return -1; @@ -535,7 +535,7 @@ LIBSSH2_API int libssh2_channel_request_pty_ex(LIBSSH2_CHANNEL *channel, char *t _libssh2_debug(session, LIBSSH2_DBG_CONN, "Allocating tty on channel %lu/%lu", channel->local.id, channel->remote.id); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for pty-request", 0); return -1; @@ -608,7 +608,7 @@ LIBSSH2_API int libssh2_channel_x11_req_ex(LIBSSH2_CHANNEL *channel, int single_ auth_cookie ? auth_cookie : "", screen_number); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for pty-request", 0); return -1; @@ -633,9 +633,9 @@ LIBSSH2_API int libssh2_channel_x11_req_ex(LIBSSH2_CHANNEL *channel, int single_ int i; char buffer[LIBSSH2_X11_RANDOM_COOKIE_LEN / 2]; - RAND_bytes((unsigned char *) buffer, LIBSSH2_X11_RANDOM_COOKIE_LEN / 2); + RAND_bytes(buffer, LIBSSH2_X11_RANDOM_COOKIE_LEN / 2); for (i = 0; i < (LIBSSH2_X11_RANDOM_COOKIE_LEN / 2); i++) { - snprintf((char *) s + (i * 2), 2, "%02X", buffer[i]); + snprintf(s + (i * 2), 2, "%02X", buffer[i]); } } s += cookie_len; @@ -684,7 +684,7 @@ LIBSSH2_API int libssh2_channel_process_startup(LIBSSH2_CHANNEL *channel, const _libssh2_debug(session, LIBSSH2_DBG_CONN, "starting request(%s) on channel %lu/%lu, message=%s", request, channel->local.id, channel->remote.id, message); #endif - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for channel-process request", 0); return -1; @@ -755,7 +755,7 @@ LIBSSH2_API int libssh2_channel_flush_ex(LIBSSH2_CHANNEL *channel, int streamid) /* It's our channel at least */ unsigned long packet_stream_id = (packet_type == SSH_MSG_CHANNEL_DATA) ? 0 : libssh2_ntohu32(packet->data + 5); if ((streamid == LIBSSH2_CHANNEL_FLUSH_ALL) || - ((packet_type == (unsigned char) SSH_MSG_CHANNEL_EXTENDED_DATA) && ((streamid == (int) LIBSSH2_CHANNEL_FLUSH_EXTENDED_DATA) || (streamid == (int) packet_stream_id))) || + ((packet_type == SSH_MSG_CHANNEL_EXTENDED_DATA) && ((streamid == LIBSSH2_CHANNEL_FLUSH_EXTENDED_DATA) || (streamid == packet_stream_id))) || ((packet_type == SSH_MSG_CHANNEL_DATA) && (streamid == 0))) { int bytes_to_flush = packet->data_len - packet->data_head; #ifdef LIBSSH2_DEBUG_CONNECTION @@ -885,7 +885,7 @@ LIBSSH2_API int libssh2_channel_read_ex(LIBSSH2_CHANNEL *channel, int stream_id, while (libssh2_packet_read(session, blocking_read) > 0) blocking_read = 0; packet = session->packets.head; - while (packet && (bytes_read < (int) buflen)) { + while (packet && (bytes_read < buflen)) { /* In case packet gets destroyed during this iteration */ LIBSSH2_PACKET *next = packet->next; @@ -893,13 +893,13 @@ LIBSSH2_API int libssh2_channel_read_ex(LIBSSH2_CHANNEL *channel, int stream_id, * or the standard stream (and data was available), * or the standard stream with extended_data_merge enabled and data was available */ - if ((stream_id && (packet->data[0] == (char) SSH_MSG_CHANNEL_EXTENDED_DATA) && (channel->local.id == (unsigned int) libssh2_ntohu32(packet->data + 1)) && (stream_id == (int) libssh2_ntohu32(packet->data + 5))) || + if ((stream_id && (packet->data[0] == SSH_MSG_CHANNEL_EXTENDED_DATA) && (channel->local.id == libssh2_ntohu32(packet->data + 1)) && (stream_id == libssh2_ntohu32(packet->data + 5))) || (!stream_id && (packet->data[0] == SSH_MSG_CHANNEL_DATA) && (channel->local.id == libssh2_ntohu32(packet->data + 1))) || (!stream_id && (packet->data[0] == SSH_MSG_CHANNEL_EXTENDED_DATA) && (channel->local.id == libssh2_ntohu32(packet->data + 1)) && (channel->remote.extended_data_ignore_mode == LIBSSH2_CHANNEL_EXTENDED_DATA_MERGE))) { int want = buflen - bytes_read; int unlink_packet = 0; - if (want >= (int) (packet->data_len - packet->data_head)) { + if (want >= (packet->data_len - packet->data_head)) { want = packet->data_len - packet->data_head; unlink_packet = 1; } @@ -971,7 +971,7 @@ LIBSSH2_API int libssh2_channel_write_ex(LIBSSH2_CHANNEL *channel, int stream_id } packet_len = buflen + (stream_id ? 13 : 9); /* packet_type(1) + channelno(4) [ + streamid(4) ] + buflen(4) */ - packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocte space for data transmission packet", 0); return -1; @@ -1126,6 +1126,11 @@ LIBSSH2_API int libssh2_channel_wait_closed(LIBSSH2_CHANNEL *channel) { LIBSSH2_SESSION* session = channel->session; + if (!libssh2_channel_eof(channel)) { + libssh2_error(session, LIBSSH2_ERROR_INVAL, "libssh2_channel_wait_closed() invoked when channel is not in EOF state", 0); + return -1; + } + #ifdef LIBSSH2_DEBUG_CONNECTION _libssh2_debug(session, LIBSSH2_DBG_CONN, "Awaiting close of channel %lu/%lu", channel->local.id, channel->remote.id); #endif diff --git a/pandora_agents/win32/ssh/libssh2/comp.c b/pandora_agents/win32/ssh/libssh2/comp.c index e00f6c9010..f0fb8850b2 100644 --- a/pandora_agents/win32/ssh/libssh2/comp.c +++ b/pandora_agents/win32/ssh/libssh2/comp.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -98,7 +98,7 @@ static int libssh2_comp_method_zlib_init(LIBSSH2_SESSION *session, int compress, z_stream *strm; int status; - strm = (z_stream *) LIBSSH2_ALLOC(session, sizeof(z_stream)); + strm = LIBSSH2_ALLOC(session, sizeof(z_stream)); if (!strm) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for zlib compression/decompression", 0); return -1; @@ -133,7 +133,7 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, unsigned char **dest, unsigned long *dest_len, unsigned long payload_limit, int *free_dest, const unsigned char *src, unsigned long src_len, void **abstract) { - z_stream *strm = (z_stream *) *abstract; + z_stream *strm = *abstract; /* A short-term alloc of a full data chunk is better than a series of reallocs */ char *out; int out_maxlen = compress ? (src_len + 4) : (2 * src_len); @@ -144,14 +144,13 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, out_maxlen = 25; } - if (out_maxlen > (int) payload_limit) { + if (out_maxlen > payload_limit) { out_maxlen = payload_limit; } - strm->next_in = (Bytef *)src; + strm->next_in = (char *)src; strm->avail_in = src_len; - strm->next_out = (Bytef *) LIBSSH2_ALLOC(session, out_maxlen); - out = (char *) strm->next_out; + out = strm->next_out = LIBSSH2_ALLOC(session, out_maxlen); strm->avail_out = out_maxlen; if (!strm->next_out) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate compression/decompression buffer", 0); @@ -175,18 +174,18 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, out_maxlen += compress ? (strm->avail_in + 4) : (2 * strm->avail_in); - if ((out_maxlen > (int) payload_limit) && !compress && limiter++) { + if ((out_maxlen > payload_limit) && !compress && limiter++) { libssh2_error(session, LIBSSH2_ERROR_ZLIB, "Excessive growth in decompression phase", 0); LIBSSH2_FREE(session, out); return -1; } - out = (char *) LIBSSH2_REALLOC(session, out, out_maxlen); + out = LIBSSH2_REALLOC(session, out, out_maxlen); if (!out) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to expand compress/decompression buffer", 0); return -1; } - strm->next_out = (Bytef *) out + out_ofs; + strm->next_out = out + out_ofs; strm->avail_out += compress ? (strm->avail_in + 4) : (2 * strm->avail_in); } else while (!strm->avail_out) { /* Done with input, might be a byte or two in internal buffer during compress @@ -194,25 +193,25 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, */ int grow_size = compress ? 8 : 1024; - if (out_maxlen >= (int) payload_limit) { + if (out_maxlen >= payload_limit) { libssh2_error(session, LIBSSH2_ERROR_ZLIB, "Excessive growth in decompression phase", 0); LIBSSH2_FREE(session, out); return -1; } - if (grow_size > (int) (payload_limit - out_maxlen)) { + if (grow_size > (payload_limit - out_maxlen)) { grow_size = payload_limit - out_maxlen; } out_maxlen += grow_size; strm->avail_out = grow_size; - out = (char *) LIBSSH2_REALLOC(session, out, out_maxlen); + out = LIBSSH2_REALLOC(session, out, out_maxlen); if (!out) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to expand final compress/decompress buffer", 0); return -1; } - strm->next_out = (Bytef *) out + out_maxlen - grow_size; + strm->next_out = out + out_maxlen - grow_size; if (compress) { status = deflate(strm, Z_PARTIAL_FLUSH); @@ -227,7 +226,7 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, } } - *dest = (unsigned char *) out; + *dest = out; *dest_len = out_maxlen - strm->avail_out; *free_dest = 1; @@ -240,7 +239,7 @@ static int libssh2_comp_method_zlib_comp(LIBSSH2_SESSION *session, int compress, */ static int libssh2_comp_method_zlib_dtor(LIBSSH2_SESSION *session, int compress, void **abstract) { - z_stream *strm = (z_stream *) *abstract; + z_stream *strm = *abstract; if (strm) { if (compress) { diff --git a/pandora_agents/win32/ssh/libssh2/crypt.c b/pandora_agents/win32/ssh/libssh2/crypt.c index 11d6665572..5cf7134b4a 100644 --- a/pandora_agents/win32/ssh/libssh2/crypt.c +++ b/pandora_agents/win32/ssh/libssh2/crypt.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -68,7 +68,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_3des_cbc = { 24, /* secret length */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **)) EVP_des_ede3_cbc, + (void*)EVP_des_ede3_cbc, NULL, }; @@ -80,7 +80,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_aes128_cbc = { 16, /* secret length -- 16*8 == 128bit */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_aes_128_cbc, + (void*)EVP_aes_128_cbc, NULL, }; @@ -91,7 +91,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_aes192_cbc = { 24, /* secret length -- 24*8 == 192bit */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_aes_192_cbc, + (void*)EVP_aes_192_cbc, NULL, }; @@ -102,7 +102,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_aes256_cbc = { 32, /* secret length -- 32*8 == 256bit */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_aes_256_cbc, + (void*)EVP_aes_256_cbc, NULL, }; @@ -114,7 +114,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_rijndael_cbc_lysator_liu_se = { 32, /* secret length -- 32*8 == 256bit */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_aes_256_cbc, + (void*)EVP_aes_256_cbc, NULL, }; #endif /* OPENSSL_VERSION_NUMBER >= 0x00907000L && !defined(OPENSSL_NO_AES)*/ @@ -127,7 +127,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_blowfish_cbc = { 16, /* secret length */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_bf_cbc, + (void*)EVP_bf_cbc, NULL, }; #endif /* ! OPENSSL_NO_BLOWFISH */ @@ -140,7 +140,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_cast128_cbc = { 16, /* secret length */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_cast5_cbc, + (void*)EVP_cast5_cbc, NULL, }; #endif /* ! OPENSSL_NO_CAST */ @@ -153,7 +153,7 @@ static LIBSSH2_CRYPT_METHOD libssh2_crypt_method_arcfour = { 16, /* secret length */ LIBSSH2_CRYPT_METHOD_FLAG_EVP, NULL, - (int (*)(LIBSSH2_SESSION *, unsigned char *, void **))EVP_rc4, + (void*)EVP_rc4, NULL, }; #endif /* ! OPENSSL_NO_RC4 */ diff --git a/pandora_agents/win32/ssh/libssh2/hostkey.c b/pandora_agents/win32/ssh/libssh2/hostkey.c index 64b7fc38a1..8a786f2894 100644 --- a/pandora_agents/win32/ssh/libssh2/hostkey.c +++ b/pandora_agents/win32/ssh/libssh2/hostkey.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -39,7 +39,6 @@ #include #include #include -#include /* Needed for struct iovec on some platforms */ #ifdef HAVE_SYS_UIO_H @@ -69,7 +68,7 @@ static int libssh2_hostkey_method_ssh_rsa_init(LIBSSH2_SESSION *session, unsigne s = hostkey_data; len = libssh2_ntohu32(s); s += 4; - if (len != 7 || strncmp((char *) s, "ssh-rsa", 7) != 0) { + if (len != 7 || strncmp(s, "ssh-rsa", 7) != 0) { return -1; } s += 7; @@ -120,7 +119,7 @@ static int libssh2_hostkey_method_ssh_rsa_initPEM(LIBSSH2_SESSION *session, unsi *abstract = NULL; } - fp = fopen((char *)privkeyfile, "r"); + fp = fopen(privkeyfile, "r"); if (!fp) { return -1; } @@ -132,7 +131,7 @@ static int libssh2_hostkey_method_ssh_rsa_initPEM(LIBSSH2_SESSION *session, unsi */ OpenSSL_add_all_ciphers(); } - rsactx = PEM_read_RSAPrivateKey(fp, NULL, (int (*) (char *, int, int, void *))libssh2_hostkey_method_ssh_rsadsa_passphrase_cb, (void*)passphrase); + rsactx = PEM_read_RSAPrivateKey(fp, NULL, (void*)libssh2_hostkey_method_ssh_rsadsa_passphrase_cb, (void*)passphrase); if (!rsactx) { fclose(fp); return -1; @@ -158,7 +157,7 @@ static int libssh2_hostkey_method_ssh_rsa_sig_verify(LIBSSH2_SESSION *session, c /* Skip past keyname_len(4) + keyname(7){"ssh-rsa"} + signature_len(4) */ sig += 15; sig_len -= 15; SHA1(m, m_len, hash); - ret = RSA_verify(NID_sha1, hash, SHA_DIGEST_LENGTH, (unsigned char *)sig, sig_len, rsactx); + ret = RSA_verify(NID_sha1, hash, SHA_DIGEST_LENGTH, (char *)sig, sig_len, rsactx); return (ret == 1) ? 0 : -1; } @@ -178,7 +177,7 @@ static int libssh2_hostkey_method_ssh_rsa_sign(LIBSSH2_SESSION *session, unsigne int sig_len; sig_len = RSA_size(rsactx); - sig = (char *) LIBSSH2_ALLOC(session, sig_len); + sig = LIBSSH2_ALLOC(session, sig_len); if (!sig) { return -1; @@ -188,13 +187,13 @@ static int libssh2_hostkey_method_ssh_rsa_sign(LIBSSH2_SESSION *session, unsigne SHA1_Update(&ctx, buf, buf_len); SHA1_Final(hash, &ctx); - ret = RSA_sign(NID_sha1, hash, SHA_DIGEST_LENGTH, (unsigned char *) sig, (unsigned int *) &sig_len, rsactx); + ret = RSA_sign(NID_sha1, hash, SHA_DIGEST_LENGTH, sig, &sig_len, rsactx); if (!ret) { LIBSSH2_FREE(session, sig); return -1; } - *signature = (unsigned char *) sig; + *signature = sig; *signature_len = sig_len; return 0; @@ -215,26 +214,26 @@ static int libssh2_hostkey_method_ssh_rsa_signv(LIBSSH2_SESSION *session, unsign int sig_len; sig_len = RSA_size(rsactx); - sig = (char *) LIBSSH2_ALLOC(session, sig_len); + sig = LIBSSH2_ALLOC(session, sig_len); if (!sig) { return -1; } SHA1_Init(&ctx); - for(i = 0; i < (int) veccount; i++) { + for(i = 0; i < veccount; i++) { SHA1_Update(&ctx, datavec[i].iov_base, datavec[i].iov_len); } SHA1_Final(hash, &ctx); - ret = RSA_sign(NID_sha1, hash, SHA_DIGEST_LENGTH, (unsigned char *) sig, (unsigned int *) &sig_len, rsactx); + ret = RSA_sign(NID_sha1, hash, SHA_DIGEST_LENGTH, sig, &sig_len, rsactx); if (!ret) { LIBSSH2_FREE(session, sig); return -1; } - *signature = (unsigned char *) sig; + *signature = sig; *signature_len = sig_len; return 0; @@ -292,7 +291,7 @@ static int libssh2_hostkey_method_ssh_dss_init(LIBSSH2_SESSION *session, unsigne s = hostkey_data; len = libssh2_ntohu32(s); s += 4; - if (len != 7 || strncmp((char *) s, "ssh-dss", 7) != 0) { + if (len != 7 || strncmp(s, "ssh-dss", 7) != 0) { return -1; } s += 7; @@ -334,7 +333,7 @@ static int libssh2_hostkey_method_ssh_dss_initPEM(LIBSSH2_SESSION *session, unsi *abstract = NULL; } - fp = fopen((char *) privkeyfile, "r"); + fp = fopen(privkeyfile, "r"); if (!fp) { return -1; } @@ -346,7 +345,7 @@ static int libssh2_hostkey_method_ssh_dss_initPEM(LIBSSH2_SESSION *session, unsi */ OpenSSL_add_all_ciphers(); } - dsactx = PEM_read_DSAPrivateKey(fp, NULL, (int (*) (char *, int, int, void *))libssh2_hostkey_method_ssh_rsadsa_passphrase_cb, (void*)passphrase); + dsactx = PEM_read_DSAPrivateKey(fp, NULL, (void*)libssh2_hostkey_method_ssh_rsadsa_passphrase_cb, (void*)passphrase); if (!dsactx) { fclose(fp); return -1; @@ -399,7 +398,7 @@ static int libssh2_hostkey_method_ssh_dss_sign(LIBSSH2_SESSION *session, unsigne unsigned char hash[SHA_DIGEST_LENGTH]; SHA_CTX ctx; - *signature = (unsigned char *) LIBSSH2_ALLOC(session, 2 * SHA_DIGEST_LENGTH); + *signature = LIBSSH2_ALLOC(session, 2 * SHA_DIGEST_LENGTH); *signature_len = 2 * SHA_DIGEST_LENGTH; if (!(*signature)) { @@ -437,7 +436,7 @@ static int libssh2_hostkey_method_ssh_dss_signv(LIBSSH2_SESSION *session, unsign SHA_CTX ctx; int r_len, s_len, rs_pad, i; - *signature = (unsigned char *) LIBSSH2_ALLOC(session, 2 * SHA_DIGEST_LENGTH); + *signature = LIBSSH2_ALLOC(session, 2 * SHA_DIGEST_LENGTH); *signature_len = 2 * SHA_DIGEST_LENGTH; memset(*signature, 0, 2 * SHA_DIGEST_LENGTH); @@ -446,7 +445,7 @@ static int libssh2_hostkey_method_ssh_dss_signv(LIBSSH2_SESSION *session, unsign } SHA1_Init(&ctx); - for(i = 0; i < (int) veccount; i++) { + for(i = 0; i < veccount; i++) { SHA1_Update(&ctx, datavec[i].iov_base, datavec[i].iov_len); } SHA1_Final(hash, &ctx); @@ -529,12 +528,12 @@ LIBSSH2_API const char *libssh2_hostkey_hash(LIBSSH2_SESSION *session, int hash_ switch (hash_type) { #ifndef OPENSSL_NO_MD5 case LIBSSH2_HOSTKEY_HASH_MD5: - return (char *) session->server_hostkey_md5; + return session->server_hostkey_md5; break; #endif /* ! OPENSSL_NO_MD5 */ #ifndef OPENSSL_NO_SHA case LIBSSH2_HOSTKEY_HASH_SHA1: - return (char *) session->server_hostkey_sha1; + return session->server_hostkey_sha1; break; #endif /* ! OPENSSL_NO_SHA */ default: diff --git a/pandora_agents/win32/ssh/libssh2/kex.c b/pandora_agents/win32/ssh/libssh2/kex.c index 1db5a430db..3a15a84a20 100644 --- a/pandora_agents/win32/ssh/libssh2/kex.c +++ b/pandora_agents/win32/ssh/libssh2/kex.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -48,14 +48,14 @@ SHA_CTX hash; \ unsigned long len = 0; \ if (!(value)) { \ - value = (unsigned char *) LIBSSH2_ALLOC(session, reqlen + SHA_DIGEST_LENGTH); \ + value = LIBSSH2_ALLOC(session, reqlen + SHA_DIGEST_LENGTH); \ } \ - while (len < (unsigned long) reqlen) { \ + while (len < reqlen) { \ SHA1_Init(&hash); \ SHA1_Update(&hash, k_value, k_value_len); \ SHA1_Update(&hash, h_sig_comp, SHA_DIGEST_LENGTH); \ if (len > 0) { \ - SHA1_Update(&hash, (unsigned char *) value, len); \ + SHA1_Update(&hash, value, len); \ } else { \ SHA1_Update(&hash, (version), 1); \ SHA1_Update(&hash, session->session_id, session->session_id_len); \ @@ -94,7 +94,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S /* Leading 00 not needed */ e_packet_len--; } - e_packet = (unsigned char *) LIBSSH2_ALLOC(session, e_packet_len); + e_packet = LIBSSH2_ALLOC(session, e_packet_len); if (!e_packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Out of memory error", 0); ret = -1; @@ -118,6 +118,26 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S goto clean_exit; } + if (session->burn_optimistic_kexinit) { + /* The first KEX packet to come along will be the guess initially sent by the server + * That guess turned out to be wrong so we need to silently ignore it */ + int burn_type; +#ifdef LIBSSH2_DEBUG_KEX + _libssh2_debug(session, LIBSSH2_DBG_KEX, "Waiting for badly guessed KEX packet (to be ignored)"); +#endif + burn_type = libssh2_packet_burn(session); + if (burn_type <= 0) { + /* Failed to receive a packet */ + ret = -1; + goto clean_exit; + } + session->burn_optimistic_kexinit = 0; + +#ifdef LIBSSH2_DEBUG_KEX + _libssh2_debug(session, LIBSSH2_DBG_KEX, "Burnt packet of type: %02x", (unsigned int)burn_type); +#endif + } + /* Wait for KEX reply */ if (libssh2_packet_require(session, packet_type_reply, &s_packet, &s_packet_len)) { libssh2_error(session, LIBSSH2_ERROR_TIMEOUT, "Timed out waiting for KEX reply", 0); @@ -129,7 +149,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S s = s_packet + 1; session->server_hostkey_len = libssh2_ntohu32(s); s += 4; - session->server_hostkey = (unsigned char *) LIBSSH2_ALLOC(session, session->server_hostkey_len); + session->server_hostkey = LIBSSH2_ALLOC(session, session->server_hostkey_len); if (!session->server_hostkey) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for a copy of the host key", 0); ret = -1; @@ -200,7 +220,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S /* don't need leading 00 */ k_value_len--; } - k_value = (unsigned char *) LIBSSH2_ALLOC(session, k_value_len); + k_value = LIBSSH2_ALLOC(session, k_value_len); if (!k_value) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate buffer for K", 0); ret = -1; @@ -216,18 +236,18 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S SHA1_Init(&exchange_hash); if (session->local.banner) { - libssh2_htonu32(h_sig_comp, strlen((char *) session->local.banner) - 2); + libssh2_htonu32(h_sig_comp, strlen(session->local.banner) - 2); SHA1_Update(&exchange_hash, h_sig_comp, 4); - SHA1_Update(&exchange_hash, session->local.banner, strlen((char *) session->local.banner) - 2); + SHA1_Update(&exchange_hash, session->local.banner, strlen(session->local.banner) - 2); } else { libssh2_htonu32(h_sig_comp, sizeof(LIBSSH2_SSH_DEFAULT_BANNER) - 1); SHA1_Update(&exchange_hash, h_sig_comp, 4); SHA1_Update(&exchange_hash, LIBSSH2_SSH_DEFAULT_BANNER, sizeof(LIBSSH2_SSH_DEFAULT_BANNER) - 1); } - libssh2_htonu32(h_sig_comp, strlen((char *)session->remote.banner)); + libssh2_htonu32(h_sig_comp, strlen(session->remote.banner)); SHA1_Update(&exchange_hash, h_sig_comp, 4); - SHA1_Update(&exchange_hash, session->remote.banner, strlen((char *) session->remote.banner)); + SHA1_Update(&exchange_hash, session->remote.banner, strlen(session->remote.banner)); libssh2_htonu32(h_sig_comp, session->local.kexinit_len); SHA1_Update(&exchange_hash, h_sig_comp, 4); @@ -299,7 +319,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S LIBSSH2_FREE(session, tmp); if (!session->session_id) { - session->session_id = (unsigned char *) LIBSSH2_ALLOC(session, SHA_DIGEST_LENGTH); + session->session_id = LIBSSH2_ALLOC(session, SHA_DIGEST_LENGTH); if (!session->session_id) { ret = -1; goto clean_exit; @@ -314,6 +334,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S /* Calculate IV/Secret/Key for each direction */ if (session->local.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { if (session->local.crypt_abstract) { + EVP_CIPHER_CTX_cleanup(session->local.crypt_abstract); LIBSSH2_FREE(session, session->local.crypt_abstract); session->local.crypt_abstract = NULL; } @@ -331,17 +352,18 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA1_HASH(iv, session->local.crypt->iv_len, "A"); LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA1_HASH(secret, session->local.crypt->secret_len, "C"); if (session->local.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { - EVP_CIPHER *(*get_cipher)(void) = (EVP_CIPHER * (*) ())session->local.crypt->crypt; + EVP_CIPHER *(*get_cipher)(void) = (void*)session->local.crypt->crypt; EVP_CIPHER *cipher = get_cipher(); EVP_CIPHER_CTX *ctx; - ctx = (EVP_CIPHER_CTX *) LIBSSH2_ALLOC(session, sizeof(EVP_CIPHER_CTX)); + ctx = LIBSSH2_ALLOC(session, sizeof(EVP_CIPHER_CTX)); if (!ctx) { LIBSSH2_FREE(session, iv); LIBSSH2_FREE(session, secret); ret = -1; goto clean_exit; } + EVP_CIPHER_CTX_init(ctx); EVP_CipherInit(ctx, cipher, secret, iv, 1); session->local.crypt_abstract = ctx; free_iv = 1; @@ -366,6 +388,7 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S if (session->remote.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { if (session->remote.crypt_abstract) { + EVP_CIPHER_CTX_cleanup(session->remote.crypt_abstract); LIBSSH2_FREE(session, session->remote.crypt_abstract); session->remote.crypt_abstract = NULL; } @@ -383,17 +406,18 @@ static int libssh2_kex_method_diffie_hellman_groupGP_sha1_key_exchange(LIBSSH2_S LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA1_HASH(iv, session->remote.crypt->iv_len, "B"); LIBSSH2_KEX_METHOD_DIFFIE_HELLMAN_SHA1_HASH(secret, session->remote.crypt->secret_len, "D"); if (session->remote.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { - EVP_CIPHER *(*get_cipher)(void) = (EVP_CIPHER * (*) ()) session->remote.crypt->crypt; + EVP_CIPHER *(*get_cipher)(void) = (void*)session->remote.crypt->crypt; EVP_CIPHER *cipher = get_cipher(); EVP_CIPHER_CTX *ctx; - ctx = (EVP_CIPHER_CTX *) LIBSSH2_ALLOC(session, sizeof(EVP_CIPHER_CTX)); + ctx = LIBSSH2_ALLOC(session, sizeof(EVP_CIPHER_CTX)); if (!ctx) { LIBSSH2_FREE(session, iv); LIBSSH2_FREE(session, secret); ret = -1; goto clean_exit; } + EVP_CIPHER_CTX_init(ctx); EVP_CipherInit(ctx, cipher, secret, iv, 0); session->remote.crypt_abstract = ctx; free_iv = 1; @@ -767,7 +791,7 @@ static int libssh2_kexinit(LIBSSH2_SESSION *session) mac_cs_len + mac_sc_len + \ lang_cs_len + lang_sc_len; - s = data = (unsigned char *) LIBSSH2_ALLOC(session, data_len); + s = data = LIBSSH2_ALLOC(session, data_len); if (!data) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory", 0); return -1; @@ -852,7 +876,7 @@ static unsigned char *libssh2_kex_agree_instr(unsigned char *haystack, unsigned } /* Needle at start of haystack */ - if ((strncmp((char *) haystack, (char *) needle, needle_len) == 0) && + if ((strncmp(haystack, needle, needle_len) == 0) && (needle_len == haystack_len || haystack[needle_len] == ',')) { return haystack; } @@ -860,10 +884,10 @@ static unsigned char *libssh2_kex_agree_instr(unsigned char *haystack, unsigned s = haystack; /* Search until we run out of comas or we run out of haystack, whichever comes first */ - while ((s = (unsigned char *) strchr((char *) s, ',')) && ((haystack_len - (s - haystack)) > needle_len)) { + while ((s = strchr(s, ',')) && ((haystack_len - (s - haystack)) > needle_len)) { s++; /* Needle at X position */ - if ((strncmp((char *) s, (char *) needle, needle_len) == 0) && + if ((strncmp(s, needle, needle_len) == 0) && (((s - haystack) + needle_len) == haystack_len || s[needle_len] == ',')) { return s; } @@ -878,7 +902,7 @@ static unsigned char *libssh2_kex_agree_instr(unsigned char *haystack, unsigned static LIBSSH2_COMMON_METHOD *libssh2_get_method_by_name(char *name, int name_len, LIBSSH2_COMMON_METHOD **methodlist) { while (*methodlist) { - if ((strlen((char *) (*methodlist)->name) == (unsigned int) name_len) && + if ((strlen((*methodlist)->name) == name_len) && (strncmp((*methodlist)->name, name, name_len) == 0)) { return *methodlist; } @@ -897,13 +921,13 @@ static int libssh2_kex_agree_hostkey(LIBSSH2_SESSION *session, unsigned long kex unsigned char *s; if (session->hostkey_prefs) { - s = (unsigned char *) session->hostkey_prefs; + s = session->hostkey_prefs; while (s && *s) { - unsigned char *p = (unsigned char *) strchr((char *)s, ','); - int method_len = (p ? (p - s) : strlen((char *) s)); + unsigned char *p = strchr(s, ','); + int method_len = (p ? (p - s) : strlen(s)); if (libssh2_kex_agree_instr(hostkey, hostkey_len, s, method_len)) { - LIBSSH2_HOSTKEY_METHOD *method = (LIBSSH2_HOSTKEY_METHOD*)libssh2_get_method_by_name((char *)s, method_len, (LIBSSH2_COMMON_METHOD**)hostkeyp); + LIBSSH2_HOSTKEY_METHOD *method = (LIBSSH2_HOSTKEY_METHOD*)libssh2_get_method_by_name(s, method_len, (LIBSSH2_COMMON_METHOD**)hostkeyp); if (!method) { /* Invalid method -- Should never be reached */ @@ -929,7 +953,7 @@ static int libssh2_kex_agree_hostkey(LIBSSH2_SESSION *session, unsigned long kex } while (hostkeyp && (*hostkeyp)->name) { - s = libssh2_kex_agree_instr(hostkey, hostkey_len, (unsigned char *)(*hostkeyp)->name, strlen((*hostkeyp)->name)); + s = libssh2_kex_agree_instr(hostkey, hostkey_len, (*hostkeyp)->name, strlen((*hostkeyp)->name)); if (s) { /* So far so good, but does it suit our purposes? (Encrypting vs Signing) */ if (((kex_flags & LIBSSH2_KEX_METHOD_FLAG_REQ_ENC_HOSTKEY) == 0) || @@ -960,13 +984,13 @@ static int libssh2_kex_agree_kex_hostkey(LIBSSH2_SESSION *session, unsigned char unsigned char *s; if (session->kex_prefs) { - s = (unsigned char *) session->kex_prefs; + s = session->kex_prefs; while (s && *s) { - unsigned char *p = (unsigned char *) strchr((char *)s, ','); - int method_len = (p ? (p - s) : strlen((char *)s)); - if (libssh2_kex_agree_instr(kex, kex_len, s, method_len)) { - LIBSSH2_KEX_METHOD *method = (LIBSSH2_KEX_METHOD*)libssh2_get_method_by_name((char *)s, method_len, (LIBSSH2_COMMON_METHOD**)kexp); + unsigned char *q, *p = strchr(s, ','); + int method_len = (p ? (p - s) : strlen(s)); + if ((q = libssh2_kex_agree_instr(kex, kex_len, s, method_len))) { + LIBSSH2_KEX_METHOD *method = (LIBSSH2_KEX_METHOD*)libssh2_get_method_by_name(s, method_len, (LIBSSH2_COMMON_METHOD**)kexp); if (!method) { /* Invalid method -- Should never be reached */ @@ -978,6 +1002,12 @@ static int libssh2_kex_agree_kex_hostkey(LIBSSH2_SESSION *session, unsigned char */ if (libssh2_kex_agree_hostkey(session, method->flags, hostkey, hostkey_len) == 0) { session->kex = method; + if (session->burn_optimistic_kexinit && (kex == q)) { + /* Server sent an optimistic packet, + * and client agrees with preference + * cancel burning the first KEX_INIT packet that comes in */ + session->burn_optimistic_kexinit = 0; + } return 0; } } @@ -988,13 +1018,19 @@ static int libssh2_kex_agree_kex_hostkey(LIBSSH2_SESSION *session, unsigned char } while (*kexp && (*kexp)->name) { - s = libssh2_kex_agree_instr(kex, kex_len, (unsigned char *)(*kexp)->name, strlen((*kexp)->name)); + s = libssh2_kex_agree_instr(kex, kex_len, (*kexp)->name, strlen((*kexp)->name)); if (s) { /* We've agreed on a key exchange method, * Can we agree on a hostkey that works with this kex? */ if (libssh2_kex_agree_hostkey(session, (*kexp)->flags, hostkey, hostkey_len) == 0) { session->kex = *kexp; + if (session->burn_optimistic_kexinit && (kex == s)) { + /* Server sent an optimistic packet, + * and client agrees with preference + * cancel burning the first KEX_INIT packet that comes in */ + session->burn_optimistic_kexinit = 0; + } return 0; } } @@ -1013,14 +1049,14 @@ static int libssh2_kex_agree_crypt(LIBSSH2_SESSION *session, libssh2_endpoint_da unsigned char *s; if (endpoint->crypt_prefs) { - s = (unsigned char *) endpoint->crypt_prefs; + s = endpoint->crypt_prefs; while (s && *s) { - unsigned char *p = (unsigned char *) strchr((char *)s, ','); - int method_len = (p ? (p - s) : strlen((char *)s)); + unsigned char *p = strchr(s, ','); + int method_len = (p ? (p - s) : strlen(s)); if (libssh2_kex_agree_instr(crypt, crypt_len, s, method_len)) { - LIBSSH2_CRYPT_METHOD *method = (LIBSSH2_CRYPT_METHOD*)libssh2_get_method_by_name((char *)s, method_len, (LIBSSH2_COMMON_METHOD**)cryptp); + LIBSSH2_CRYPT_METHOD *method = (LIBSSH2_CRYPT_METHOD*)libssh2_get_method_by_name(s, method_len, (LIBSSH2_COMMON_METHOD**)cryptp); if (!method) { /* Invalid method -- Should never be reached */ @@ -1037,7 +1073,7 @@ static int libssh2_kex_agree_crypt(LIBSSH2_SESSION *session, libssh2_endpoint_da } while (*cryptp && (*cryptp)->name) { - s = libssh2_kex_agree_instr(crypt, crypt_len, (unsigned char *) (*cryptp)->name, strlen((*cryptp)->name)); + s = libssh2_kex_agree_instr(crypt, crypt_len, (*cryptp)->name, strlen((*cryptp)->name)); if (s) { endpoint->crypt = *cryptp; return 0; @@ -1058,14 +1094,14 @@ static int libssh2_kex_agree_mac(LIBSSH2_SESSION *session, libssh2_endpoint_data unsigned char *s; if (endpoint->mac_prefs) { - s = (unsigned char *)endpoint->mac_prefs; + s = endpoint->mac_prefs; while (s && *s) { - unsigned char *p = (unsigned char *)strchr((char*)s, ','); - int method_len = (p ? (p - s) : strlen((char *)s)); + unsigned char *p = strchr(s, ','); + int method_len = (p ? (p - s) : strlen(s)); if (libssh2_kex_agree_instr(mac, mac_len, s, method_len)) { - LIBSSH2_MAC_METHOD *method = (LIBSSH2_MAC_METHOD*)libssh2_get_method_by_name((char *)s, method_len, (LIBSSH2_COMMON_METHOD**)macp); + LIBSSH2_MAC_METHOD *method = (LIBSSH2_MAC_METHOD*)libssh2_get_method_by_name(s, method_len, (LIBSSH2_COMMON_METHOD**)macp); if (!method) { /* Invalid method -- Should never be reached */ @@ -1082,7 +1118,7 @@ static int libssh2_kex_agree_mac(LIBSSH2_SESSION *session, libssh2_endpoint_data } while (*macp && (*macp)->name) { - s = libssh2_kex_agree_instr(mac, mac_len, (unsigned char *) (*macp)->name, strlen((*macp)->name)); + s = libssh2_kex_agree_instr(mac, mac_len, (*macp)->name, strlen((*macp)->name)); if (s) { endpoint->mac = *macp; return 0; @@ -1103,14 +1139,14 @@ static int libssh2_kex_agree_comp(LIBSSH2_SESSION *session, libssh2_endpoint_dat unsigned char *s; if (endpoint->comp_prefs) { - s = (unsigned char *)endpoint->comp_prefs; + s = endpoint->comp_prefs; while (s && *s) { - unsigned char *p = (unsigned char *) strchr((char *)s, ','); - int method_len = (p ? (p - s) : strlen((char *)s)); + unsigned char *p = strchr(s, ','); + int method_len = (p ? (p - s) : strlen(s)); if (libssh2_kex_agree_instr(comp, comp_len, s, method_len)) { - LIBSSH2_COMP_METHOD *method = (LIBSSH2_COMP_METHOD*)libssh2_get_method_by_name((char *)s, method_len, (LIBSSH2_COMMON_METHOD**)compp); + LIBSSH2_COMP_METHOD *method = (LIBSSH2_COMP_METHOD*)libssh2_get_method_by_name(s, method_len, (LIBSSH2_COMMON_METHOD**)compp); if (!method) { /* Invalid method -- Should never be reached */ @@ -1127,7 +1163,7 @@ static int libssh2_kex_agree_comp(LIBSSH2_SESSION *session, libssh2_endpoint_dat } while (*compp && (*compp)->name) { - s = libssh2_kex_agree_instr(comp, comp_len, (unsigned char *)(*compp)->name, strlen((*compp)->name)); + s = libssh2_kex_agree_instr(comp, comp_len, (*compp)->name, strlen((*compp)->name)); if (s) { endpoint->comp = *compp; return 0; @@ -1170,6 +1206,12 @@ static int libssh2_kex_agree_methods(LIBSSH2_SESSION *session, unsigned char *da lang_cs_len = libssh2_ntohu32(s); lang_cs = s + 4; s += 4 + lang_cs_len; lang_sc_len = libssh2_ntohu32(s); lang_sc = s + 4; s += 4 + lang_sc_len; + /* If the server sent an optimistic packet, assume that it guessed wrong. + * If the guess is determined to be right (by libssh2_kex_agree_kex_hostkey) + * This flag will be reset to zero so that it's not ignored */ + session->burn_optimistic_kexinit = *(s++); + /* Next uint32 in packet is all zeros (reserved) */ + if (libssh2_kex_agree_kex_hostkey(session, kex, kex_len, hostkey, hostkey_len)) { return -1; } @@ -1244,7 +1286,23 @@ int libssh2_kex_exchange(LIBSSH2_SESSION *session, int reexchange) /* session->f } if (!session->kex || !session->hostkey) { + /* Preserve in case of failure */ + unsigned char *oldlocal = session->local.kexinit; + unsigned long oldlocal_len = session->local.kexinit_len; + + session->local.kexinit = NULL; + if (libssh2_kexinit(session)) { + session->local.kexinit = oldlocal; + session->local.kexinit_len = oldlocal_len; + return -1; + } + if (libssh2_packet_require(session, SSH_MSG_KEXINIT, &data, &data_len)) { + if (session->local.kexinit) { + LIBSSH2_FREE(session, session->local.kexinit); + } + session->local.kexinit = oldlocal; + session->local.kexinit_len = oldlocal_len; return -1; } @@ -1254,10 +1312,6 @@ int libssh2_kex_exchange(LIBSSH2_SESSION *session, int reexchange) /* session->f session->remote.kexinit = data; session->remote.kexinit_len = data_len; - if (libssh2_kexinit(session)) { - return -1; - } - if (libssh2_kex_agree_methods(session, data, data_len)) { return -1; } @@ -1339,7 +1393,7 @@ LIBSSH2_API int libssh2_session_method_pref(LIBSSH2_SESSION *session, int method return -1; } - s = newprefs = (char *)LIBSSH2_ALLOC(session, prefs_len + 1); + s = newprefs = LIBSSH2_ALLOC(session, prefs_len + 1); if (!newprefs) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Error allocated space for method preferences", 0); return -1; diff --git a/pandora_agents/win32/ssh/libssh2/libssh2.h b/pandora_agents/win32/ssh/libssh2/libssh2.h index 8a9bc75db0..20b207d2c5 100644 --- a/pandora_agents/win32/ssh/libssh2/libssh2.h +++ b/pandora_agents/win32/ssh/libssh2/libssh2.h @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -71,7 +71,7 @@ typedef unsigned long long libssh2_uint64_t; typedef long long libssh2_int64_t; #endif -#define LIBSSH2_VERSION "0.13" +#define LIBSSH2_VERSION "0.14" #define LIBSSH2_APINO 200507211326 /* Part of every banner, user specified or not */ @@ -124,6 +124,7 @@ typedef struct _LIBSSH2_USERAUTH_KBDINT_RESPONSE unsigned int length; } LIBSSH2_USERAUTH_KBDINT_RESPONSE; +#define ENOTCONN -40 /* 'keyboard-interactive' authentication callback */ #define LIBSSH2_USERAUTH_KBDINT_RESPONSE_FUNC(name_) void name_(const char* name, int name_len, const char* instruction, int instruction_len, int num_prompts, const LIBSSH2_USERAUTH_KBDINT_PROMPT* prompts, LIBSSH2_USERAUTH_KBDINT_RESPONSE* responses, void **abstract) diff --git a/pandora_agents/win32/ssh/libssh2/libssh2_config.h b/pandora_agents/win32/ssh/libssh2/libssh2_config.h index c79b4baa90..7661e99a29 100644 --- a/pandora_agents/win32/ssh/libssh2/libssh2_config.h +++ b/pandora_agents/win32/ssh/libssh2/libssh2_config.h @@ -1,38 +1,38 @@ #ifndef WIN32 #define WIN32 -#endif -#include -#include -#include - -/* same as WSABUF */ -struct iovec { - u_long iov_len; - char *iov_base; -}; - -#define inline __inline - -static inline int writev(int sock, struct iovec *iov, int nvecs) -{ - DWORD ret; - if (WSASend(sock, (LPWSABUF)iov, nvecs, &ret, 0, NULL, NULL) == 0) { - return ret; - } - return -1; -} - -/* not really usleep, but safe for the way we use it in this lib */ -static inline int usleep(int udelay) -{ - Sleep(udelay / 1000); - return 0; -} - -#define snprintf _snprintf - -/* Compile in zlib support */ -#define LIBSSH2_HAVE_ZLIB 1 - -/* Enable newer diffie-hellman-group-exchange-sha1 syntax */ -#define LIBSSH2_DH_GEX_NEW 1 +#endif +#include +#include +#include + +/* same as WSABUF */ +struct iovec { + u_long iov_len; + char *iov_base; +}; + +#define inline __inline + +static inline int writev(int sock, struct iovec *iov, int nvecs) +{ + DWORD ret; + if (WSASend(sock, (LPWSABUF)iov, nvecs, &ret, 0, NULL, NULL) == 0) { + return ret; + } + return -1; +} + +/* not really usleep, but safe for the way we use it in this lib */ +static inline int usleep(int udelay) +{ + Sleep(udelay / 1000); + return 0; +} + +#define snprintf _snprintf + +/* Compile in zlib support */ +#define LIBSSH2_HAVE_ZLIB 1 + +/* Enable newer diffie-hellman-group-exchange-sha1 syntax */ +#define LIBSSH2_DH_GEX_NEW 1 diff --git a/pandora_agents/win32/ssh/libssh2/libssh2_priv.h b/pandora_agents/win32/ssh/libssh2/libssh2_priv.h index f68510c7e0..270172970e 100644 --- a/pandora_agents/win32/ssh/libssh2/libssh2_priv.h +++ b/pandora_agents/win32/ssh/libssh2/libssh2_priv.h @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -199,6 +199,7 @@ struct _LIBSSH2_SESSION { /* Agreed Key Exchange Method */ LIBSSH2_KEX_METHOD *kex; + int burn_optimistic_kexinit:1; unsigned char *session_id; unsigned long session_id_len; @@ -462,6 +463,7 @@ int libssh2_packet_require_ex(LIBSSH2_SESSION *session, unsigned char packet_typ int libssh2_packet_requirev_ex(LIBSSH2_SESSION *session, unsigned char *packet_types, unsigned char **data, unsigned long *data_len, unsigned long match_ofs, const unsigned char *match_buf, unsigned long match_len); #define libssh2_packet_requirev(session, packet_types, data, data_len) \ libssh2_packet_requirev_ex((session), (packet_types), (data), (data_len), 0, NULL, 0) +int libssh2_packet_burn(LIBSSH2_SESSION *session); int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned long data_len); int libssh2_kex_exchange(LIBSSH2_SESSION *session, int reexchange); unsigned long libssh2_channel_nextid(LIBSSH2_SESSION *session); diff --git a/pandora_agents/win32/ssh/libssh2/libssh2_publickey.h b/pandora_agents/win32/ssh/libssh2/libssh2_publickey.h index 44b46e95f1..85fae223f1 100644 --- a/pandora_agents/win32/ssh/libssh2/libssh2_publickey.h +++ b/pandora_agents/win32/ssh/libssh2/libssh2_publickey.h @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, diff --git a/pandora_agents/win32/ssh/libssh2/libssh2_sftp.h b/pandora_agents/win32/ssh/libssh2/libssh2_sftp.h index e950fbfd6e..1b740344a5 100644 --- a/pandora_agents/win32/ssh/libssh2/libssh2_sftp.h +++ b/pandora_agents/win32/ssh/libssh2/libssh2_sftp.h @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, diff --git a/pandora_agents/win32/ssh/libssh2/mac.c b/pandora_agents/win32/ssh/libssh2/mac.c index 9cba7c08eb..90471e844c 100644 --- a/pandora_agents/win32/ssh/libssh2/mac.c +++ b/pandora_agents/win32/ssh/libssh2/mac.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -130,7 +130,7 @@ static int libssh2_mac_method_hmac_sha1_96_hash(LIBSSH2_SESSION *session, unsign { char temp[SHA_DIGEST_LENGTH]; - libssh2_mac_method_hmac_sha1_hash(session, (unsigned char *) temp, seqno, packet, packet_len, addtl, addtl_len, abstract); + libssh2_mac_method_hmac_sha1_hash(session, temp, seqno, packet, packet_len, addtl, addtl_len, abstract); memcpy(buf, temp, 96 / 8); return 0; @@ -189,7 +189,7 @@ static int libssh2_mac_method_hmac_md5_96_hash(LIBSSH2_SESSION *session, unsigne { char temp[MD5_DIGEST_LENGTH]; - libssh2_mac_method_hmac_md5_hash(session, (unsigned char *)temp, seqno, packet, packet_len, addtl, addtl_len, abstract); + libssh2_mac_method_hmac_md5_hash(session, temp, seqno, packet, packet_len, addtl, addtl_len, abstract); memcpy(buf, temp, 96 / 8); return 0; diff --git a/pandora_agents/win32/ssh/libssh2/misc.c b/pandora_agents/win32/ssh/libssh2/misc.c index 5d6257ce57..8c9ac0cf82 100644 --- a/pandora_agents/win32/ssh/libssh2/misc.c +++ b/pandora_agents/win32/ssh/libssh2/misc.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -133,13 +133,12 @@ LIBSSH2_API int libssh2_base64_decode(LIBSSH2_SESSION *session, char **data, int short v; int i = 0, len = 0; - d = (unsigned char *) LIBSSH2_ALLOC(session, (3 * src_len / 4) + 1); - *data = (char *) d; + *data = d = LIBSSH2_ALLOC(session, (3 * src_len / 4) + 1); if (!d) { return -1; } - for(s = (unsigned char *)src; ((char*)s) < (src + src_len); s++) { + for(s = src; ((char*)s) < (src + src_len); s++) { if ((v = libssh2_base64_reverse_table[*s]) < 0) continue; switch (i % 4) { case 0: @@ -180,8 +179,6 @@ void _libssh2_debug(LIBSSH2_SESSION *session, int context, const char *format, . char buffer[1536]; int len; va_list vargs; - FILE *file; /* TODO: Change to fstream */ - char *contexts[9] = { "Unknown", "Transport", "Key Exhange", @@ -201,10 +198,9 @@ void _libssh2_debug(LIBSSH2_SESSION *session, int context, const char *format, . va_start(vargs, format); len += vsnprintf(buffer + len, 1535 - len, format, vargs); - buffer[len] = '\0'; + buffer[len] = '\n'; va_end(vargs); - - fprintf (stderr, "%s\n", buffer); + write(2, buffer, len + 1); } /* }}} */ #endif diff --git a/pandora_agents/win32/ssh/libssh2/packet.c b/pandora_agents/win32/ssh/libssh2/packet.c index 2da351c745..859dde9d3a 100644 --- a/pandora_agents/win32/ssh/libssh2/packet.c +++ b/pandora_agents/win32/ssh/libssh2/packet.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -95,7 +95,7 @@ inline int libssh2_packet_queue_listener(LIBSSH2_SESSION *session, unsigned char _libssh2_debug(session, LIBSSH2_DBG_CONN, "Remote received connection from %s:%ld to %s:%ld", shost, sport, host, port); #endif while (l) { - if ((l->port == (int)port) && + if ((l->port == port) && (strlen(l->host) == host_len) && (memcmp(l->host, host, host_len) == 0)) { /* This is our listener */ @@ -111,7 +111,7 @@ inline int libssh2_packet_queue_listener(LIBSSH2_SESSION *session, unsigned char break; } - channel = (LIBSSH2_CHANNEL *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); + channel = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); if (!channel) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a channel for new connection", 0); failure_code = 4; /* SSH_OPEN_RESOURCE_SHORTAGE */ @@ -121,7 +121,7 @@ inline int libssh2_packet_queue_listener(LIBSSH2_SESSION *session, unsigned char channel->session = session; channel->channel_type_len = sizeof("forwarded-tcpip") - 1; - channel->channel_type = (unsigned char *) LIBSSH2_ALLOC(session, channel->channel_type_len + 1); + channel->channel_type = LIBSSH2_ALLOC(session, channel->channel_type_len + 1); if (!channel->channel_type) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a channel for new connection", 0); LIBSSH2_FREE(session, channel); @@ -225,7 +225,7 @@ inline int libssh2_packet_x11_open(LIBSSH2_SESSION *session, unsigned char *data _libssh2_debug(session, LIBSSH2_DBG_CONN, "X11 Connection Received from %s:%ld on channel %lu", shost, sport, sender_channel); #endif if (session->x11) { - channel = (LIBSSH2_CHANNEL *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); + channel = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_CHANNEL)); if (!channel) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a channel for new connection", 0); failure_code = 4; /* SSH_OPEN_RESOURCE_SHORTAGE */ @@ -235,7 +235,7 @@ inline int libssh2_packet_x11_open(LIBSSH2_SESSION *session, unsigned char *data channel->session = session; channel->channel_type_len = sizeof("x11") - 1; - channel->channel_type = (unsigned char *) LIBSSH2_ALLOC(session, channel->channel_type_len + 1); + channel->channel_type = LIBSSH2_ALLOC(session, channel->channel_type_len + 1); if (!channel->channel_type) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a channel for new connection", 0); LIBSSH2_FREE(session, channel); @@ -284,7 +284,7 @@ inline int libssh2_packet_x11_open(LIBSSH2_SESSION *session, unsigned char *data session->channels.tail = channel; /* Pass control to the callback, they may turn right around and free the channel, or actually use it */ - LIBSSH2_X11_OPEN(channel, (char *) shost, sport); + LIBSSH2_X11_OPEN(channel, shost, sport); return 0; } else { @@ -321,7 +321,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz #endif if (macstate == LIBSSH2_MAC_INVALID) { if (session->macerror) { - if (LIBSSH2_MACERROR(session, (char *)data, datalen) == 0) { + if (LIBSSH2_MACERROR(session, data, datalen) == 0) { /* Calling app has given the OK, Process it anyway */ macstate = LIBSSH2_MAC_CONFIRMED; } else { @@ -349,7 +349,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz reason = libssh2_ntohu32(data + 1); message_len = libssh2_ntohu32(data + 5); - message = (char *)data + 9; /* packet_type(1) + reason(4) + message_len(4) */ + message = data + 9; /* packet_type(1) + reason(4) + message_len(4) */ language_len = libssh2_ntohu32(data + 9 + message_len); /* This is where we hack on the data a little, * Use the MSB of language_len to to a terminating NULL (In all liklihood it is already) @@ -358,7 +358,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz * With the lengths passed this isn't *REALLY* necessary, but it's "kind" */ message[message_len] = '\0'; - language = (char *)data + 9 + message_len + 3; + language = data + 9 + message_len + 3; if (language_len) { memcpy(language, language + 1, language_len); } @@ -380,7 +380,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz memcpy(data + 4, data + 5, datalen - 5); data[datalen] = '\0'; if (session->ssh_msg_ignore) { - LIBSSH2_IGNORE(session, (char *)data + 4, datalen - 5); + LIBSSH2_IGNORE(session, data + 4, datalen - 5); } LIBSSH2_FREE(session, data); return 0; @@ -392,7 +392,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz int message_len, language_len; message_len = libssh2_ntohu32(data + 2); - message = (char *)data + 6; /* packet_type(1) + display(1) + message_len(4) */ + message = data + 6; /* packet_type(1) + display(1) + message_len(4) */ language_len = libssh2_ntohu32(data + 6 + message_len); /* This is where we hack on the data a little, * Use the MSB of language_len to to a terminating NULL (In all liklihood it is already) @@ -401,7 +401,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz * With the lengths passed this isn't *REALLY* necessary, but it's "kind" */ message[message_len] = '\0'; - language = (char *)data + 6 + message_len + 3; + language = data + 6 + message_len + 3; if (language_len) { memcpy(language, language + 1, language_len); } @@ -573,7 +573,7 @@ static int libssh2_packet_add(LIBSSH2_SESSION *session, unsigned char *data, siz break; } - packet = (LIBSSH2_PACKET *)LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PACKET)); + packet = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PACKET)); memset(packet, 0, sizeof(LIBSSH2_PACKET)); packet->data = data; @@ -635,14 +635,14 @@ static int libssh2_blocking_read(LIBSSH2_SESSION *session, unsigned char *buf, s while (bytes_read < count) { int ret; - ret = recv(session->socket_fd, (char *)buf + bytes_read, count - bytes_read, LIBSSH2_SOCKET_RECV_FLAGS(session)); + ret = recv(session->socket_fd, buf + bytes_read, count - bytes_read, LIBSSH2_SOCKET_RECV_FLAGS(session)); if (ret < 0) { #ifdef WIN32 switch (WSAGetLastError()) { case WSAEWOULDBLOCK: errno = EAGAIN; break; + case WSAENOTSOCK: errno = EBADF; break; case WSAENOTCONN: - case WSAENOTSOCK: - case WSAECONNABORTED: errno = EBADF; break; + case WSAECONNABORTED: errno = ENOTCONN; break; case WSAEINTR: errno = EINTR; break; } #endif @@ -680,7 +680,7 @@ static int libssh2_blocking_read(LIBSSH2_SESSION *session, unsigned char *buf, s if (errno == EINTR) { continue; } - if ((errno == EBADF) || (errno == EIO)) { + if ((errno == EBADF) || (errno == EIO) || (errno == ENOTCONN)) { session->socket_state = LIBSSH2_SOCKET_DISCONNECTED; } return -1; @@ -744,13 +744,13 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) if (should_block) { read_len = libssh2_blocking_read(session, block, blocksize); } else { - read_len = recv(session->socket_fd, (char *)block, 1, LIBSSH2_SOCKET_RECV_FLAGS(session)); + read_len = recv(session->socket_fd, block, 1, LIBSSH2_SOCKET_RECV_FLAGS(session)); if (read_len <= 0) { return 0; } read_len += libssh2_blocking_read(session, block + read_len, blocksize - read_len); } - if (read_len < (int)blocksize) { + if (read_len < blocksize) { return (session->socket_state == LIBSSH2_SOCKET_DISCONNECTED) ? 0 : -1; } @@ -781,13 +781,13 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) return -1; } - s = payload = (unsigned char *)LIBSSH2_ALLOC(session, payload_len); + s = payload = LIBSSH2_ALLOC(session, payload_len); memcpy(s, block + 5, blocksize - 5); s += blocksize - 5; - while ((s - payload) < (int)payload_len) { + while ((s - payload) < payload_len) { read_len = libssh2_blocking_read(session, block, blocksize); - if (read_len < (int)blocksize) { + if (read_len < blocksize) { LIBSSH2_FREE(session, payload); return -1; } @@ -815,7 +815,7 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) /* Calculate MAC hash */ session->remote.mac->hash(session, block + session->remote.mac->mac_len, session->remote.seqno, tmp, 5, payload, payload_len, &session->remote.mac_abstract); - macstate = (strncmp((char *)block, (char *)block + session->remote.mac->mac_len, session->remote.mac->mac_len) == 0) ? LIBSSH2_MAC_CONFIRMED : LIBSSH2_MAC_INVALID; + macstate = (strncmp(block, block + session->remote.mac->mac_len, session->remote.mac->mac_len) == 0) ? LIBSSH2_MAC_CONFIRMED : LIBSSH2_MAC_INVALID; session->remote.seqno++; @@ -851,7 +851,7 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) LIBSSH2_FREE(session, payload); /* We need a freeable struct otherwise the brigade won't know what to do with it */ - payload = (unsigned char *)LIBSSH2_ALLOC(session, data_len); + payload = LIBSSH2_ALLOC(session, data_len); if (!payload) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for copy of uncompressed data", 0); return -1; @@ -862,9 +862,9 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) } } + packet_type = payload[0]; libssh2_packet_add(session, payload, payload_len, macstate); - packet_type = payload[0]; } else { /* No cipher active */ unsigned char *payload; unsigned char buf[24]; @@ -875,7 +875,7 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) if (should_block) { buf_len = libssh2_blocking_read(session, buf, 5); } else { - buf_len = recv(session->socket_fd, (char *)buf, 1, LIBSSH2_SOCKET_RECV_FLAGS(session)); + buf_len = recv(session->socket_fd, buf, 1, LIBSSH2_SOCKET_RECV_FLAGS(session)); if (buf_len <= 0) { return 0; } @@ -892,13 +892,13 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) #endif payload_len = packet_length - padding_length - 1; /* padding_length(1) */ - payload = (unsigned char *)LIBSSH2_ALLOC(session, payload_len); + payload = LIBSSH2_ALLOC(session, payload_len); if (!payload) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for copy of plaintext data", 0); return -1; } - if (libssh2_blocking_read(session, payload, payload_len) < (int) payload_len) { + if (libssh2_blocking_read(session, payload, payload_len) < payload_len) { return (session->socket_state == LIBSSH2_SOCKET_DISCONNECTED) ? 0 : -1; } while (padding_length) { @@ -911,11 +911,11 @@ int libssh2_packet_read(LIBSSH2_SESSION *session, int should_block) break; } + packet_type = payload[0]; + /* MACs don't exist in non-encrypted mode */ libssh2_packet_add(session, payload, payload_len, LIBSSH2_MAC_CONFIRMED); session->remote.seqno++; - - packet_type = payload[0]; } return packet_type; } @@ -972,7 +972,7 @@ int libssh2_packet_ask_ex(LIBSSH2_SESSION *session, unsigned char packet_type, u int libssh2_packet_askv_ex(LIBSSH2_SESSION *session, unsigned char *packet_types, unsigned char **data, unsigned long *data_len, unsigned long match_ofs, const unsigned char *match_buf, unsigned long match_len, int poll_socket) { - int i, packet_types_len = strlen((char *)packet_types); + int i, packet_types_len = strlen(packet_types); for(i = 0; i < packet_types_len; i++) { if (0 == libssh2_packet_ask_ex(session, packet_types[i], data, data_len, match_ofs, match_buf, match_len, i ? 0 : poll_socket)) { @@ -1017,6 +1017,48 @@ int libssh2_packet_require_ex(LIBSSH2_SESSION *session, unsigned char packet_typ } /* }}} */ +/* {{{ libssh2_packet_burn + * Loops libssh2_packet_read() until any packet is available and promptly discards it + * Used during KEX exchange to discard badly guessed KEX_INIT packets + */ +int libssh2_packet_burn(LIBSSH2_SESSION *session) +{ + unsigned char *data; + unsigned long data_len; + char all_packets[255]; + int i; + for(i = 1; i < 256; i++) all_packets[i - 1] = i; + + if (libssh2_packet_askv_ex(session, all_packets, &data, &data_len, 0, NULL, 0, 0) == 0) { + i = data[0]; + /* A packet was available in the packet brigade, burn it */ + LIBSSH2_FREE(session, data); + return i; + } + +#ifdef LIBSSH2_DEBUG_TRANSPORT + _libssh2_debug(session, LIBSSH2_DBG_TRANS, "Blocking until packet becomes available to burn"); +#endif + while (session->socket_state == LIBSSH2_SOCKET_CONNECTED) { + int ret = libssh2_packet_read(session, 1); + if (ret < 0) { + return -1; + } + if (ret == 0) continue; + + /* Be lazy, let packet_ask pull it out of the brigade */ + if (0 == libssh2_packet_ask_ex(session, ret, &data, &data_len, 0, NULL, 0, 0)) { + /* Smoke 'em if you got 'em */ + LIBSSH2_FREE(session, data); + return ret; + } + } + + /* Only reached if the socket died */ + return -1; +} +/* }}} */ + /* {{{ libssh2_packet_requirev * Loops libssh2_packet_read() until one of a list of packet types requested is available * SSH_DISCONNECT or a SOCKET_DISCONNECTED will cause a bailout @@ -1039,7 +1081,7 @@ int libssh2_packet_requirev_ex(LIBSSH2_SESSION *session, unsigned char *packet_t continue; } - if (strchr((char *)packet_types, ret)) { + if (strchr(packet_types, ret)) { /* Be lazy, let packet_ask pull it out of the brigade */ return libssh2_packet_askv_ex(session, packet_types, data, data_len, match_ofs, match_buf, match_len, 0); } @@ -1116,7 +1158,7 @@ int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned EVP_CIPHER_CTX *ctx = (EVP_CIPHER_CTX *)session->local.crypt_abstract; /* include packet_length(4) itself and room for the hash at the end */ - encbuf = (unsigned char *)LIBSSH2_ALLOC(session, 4 + packet_length + session->local.mac->mac_len); + encbuf = LIBSSH2_ALLOC(session, 4 + packet_length + session->local.mac->mac_len); if (!encbuf) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate encryption buffer", 0); if (free_data) { @@ -1137,7 +1179,7 @@ int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned session->local.mac->hash(session, encbuf + 4 + packet_length , session->local.seqno, encbuf, 4 + packet_length, NULL, 0, &session->local.mac_abstract); /* Encrypt data */ - for(s = encbuf; (s - encbuf) < (int) (4 + packet_length) ; s += session->local.crypt->blocksize) { + for(s = encbuf; (s - encbuf) < (4 + packet_length) ; s += session->local.crypt->blocksize) { if (session->local.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { EVP_Cipher(ctx, buf, s, session->local.crypt->blocksize); memcpy(s, buf, session->local.crypt->blocksize); @@ -1149,7 +1191,7 @@ int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned session->local.seqno++; /* Send It */ - ret = ((4 + packet_length + session->local.mac->mac_len) == (unsigned int) send(session->socket_fd, (char *)encbuf, 4 + packet_length + session->local.mac->mac_len, LIBSSH2_SOCKET_SEND_FLAGS(session))) ? 0 : -1; + ret = ((4 + packet_length + session->local.mac->mac_len) == send(session->socket_fd, encbuf, 4 + packet_length + session->local.mac->mac_len, LIBSSH2_SOCKET_SEND_FLAGS(session))) ? 0 : -1; /* Cleanup environment */ LIBSSH2_FREE(session, encbuf); @@ -1162,11 +1204,11 @@ int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned /* Using vectors means we don't have to alloc a new buffer -- a byte saved is a byte earned * No MAC during unencrypted phase */ - data_vector[0].iov_base = (char *)buf; + data_vector[0].iov_base = buf; data_vector[0].iov_len = 5; data_vector[1].iov_base = (char*)data; data_vector[1].iov_len = data_len; - data_vector[2].iov_base = (char *)buf + 5; + data_vector[2].iov_base = buf + 5; data_vector[2].iov_len = padding_length; session->local.seqno++; @@ -1176,7 +1218,7 @@ int libssh2_packet_write(LIBSSH2_SESSION *session, unsigned char *data, unsigned LIBSSH2_FREE(session, data); } - return ((packet_length + 4) == (unsigned int)writev(session->socket_fd, data_vector, 3)) ? 0 : 1; + return ((packet_length + 4) == writev(session->socket_fd, data_vector, 3)) ? 0 : 1; } } /* }}} */ diff --git a/pandora_agents/win32/ssh/libssh2/publickey.c b/pandora_agents/win32/ssh/libssh2/publickey.c index 4d16a73800..a85b4f3e43 100644 --- a/pandora_agents/win32/ssh/libssh2/publickey.c +++ b/pandora_agents/win32/ssh/libssh2/publickey.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -118,7 +118,7 @@ static void libssh2_publickey_status_error(LIBSSH2_PUBLICKEY *pkey, LIBSSH2_SESS m_len = (sizeof(LIBSSH2_PUBLICKEY_STATUS_TEXT_START) - 1) + status_text_len + (sizeof(LIBSSH2_PUBLICKEY_STATUS_TEXT_MID) - 1) + message_len + (sizeof(LIBSSH2_PUBLICKEY_STATUS_TEXT_END) - 1); - m = (char *)LIBSSH2_ALLOC(session, m_len + 1); + m = LIBSSH2_ALLOC(session, m_len + 1); if (!m) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for status message", 0); return; @@ -147,19 +147,19 @@ static int libssh2_publickey_packet_receive(LIBSSH2_PUBLICKEY *pkey, unsigned ch unsigned long packet_len; unsigned char *packet; - if (libssh2_channel_read(channel,(char *) buffer, 4) != 4) { + if (libssh2_channel_read(channel, buffer, 4) != 4) { libssh2_error(session, LIBSSH2_ERROR_PUBLICKEY_PROTOCOL, "Invalid response from publickey subsystem", 0); return -1; } packet_len = libssh2_ntohu32(buffer); - packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate publickey response buffer", 0); return -1; } - if (libssh2_channel_read(channel, (char *)packet, packet_len) != (int)packet_len) { + if (libssh2_channel_read(channel, packet, packet_len) != packet_len) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for publickey subsystem response packet", 0); LIBSSH2_FREE(session, packet); return -1; @@ -187,14 +187,14 @@ static int libssh2_publickey_response_id(unsigned char **pdata, int data_len) return -1; } response_len = libssh2_ntohu32(data); data += 4; data_len -= 4; - if (data_len < (int) response_len) { + if (data_len < response_len) { /* Malformed response */ return -1; } while (codes->name) { - if (codes->name_len == (int)response_len && - strncmp((char *)codes->name, (char *)data, response_len) == 0) { + if (codes->name_len == response_len && + strncmp(codes->name, data, response_len) == 0) { *pdata = data + response_len; return codes->code; } @@ -305,7 +305,7 @@ LIBSSH2_API LIBSSH2_PUBLICKEY *libssh2_publickey_init(LIBSSH2_SESSION *session) libssh2_channel_set_blocking(channel, 1); libssh2_channel_handle_extended_data(channel, LIBSSH2_CHANNEL_EXTENDED_DATA_IGNORE); - pkey = (LIBSSH2_PUBLICKEY *)LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PUBLICKEY)); + pkey = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PUBLICKEY)); if (!pkey) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a new publickey structure", 0); goto err_exit; @@ -322,7 +322,7 @@ LIBSSH2_API LIBSSH2_PUBLICKEY *libssh2_publickey_init(LIBSSH2_SESSION *session) #ifdef LIBSSH2_DEBUG_PUBLICKEY _libssh2_debug(session, LIBSSH2_DBG_PUBLICKEY, "Sending publickey version packet advertising version %d support", (int)LIBSSH2_PUBLICKEY_VERSION); #endif - if ((s - buffer) != libssh2_channel_write(channel, (char *)buffer, (s - buffer))) { + if ((s - buffer) != libssh2_channel_write(channel, buffer, (s - buffer))) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send publickey version packet", 0); goto err_exit; } @@ -427,7 +427,7 @@ LIBSSH2_API int libssh2_publickey_add_ex(LIBSSH2_PUBLICKEY *pkey, const unsigned /* Search for a comment attribute */ if (attrs[i].name_len == (sizeof("comment") - 1) && strncmp(attrs[i].name, "comment", sizeof("comment") - 1) == 0) { - comment = (unsigned char *)attrs[i].value; + comment = attrs[i].value; comment_len = attrs[i].value_len; break; } @@ -441,7 +441,7 @@ LIBSSH2_API int libssh2_publickey_add_ex(LIBSSH2_PUBLICKEY *pkey, const unsigned } } - packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for publickey \"add\" packet", 0); return -1; @@ -482,7 +482,7 @@ LIBSSH2_API int libssh2_publickey_add_ex(LIBSSH2_PUBLICKEY *pkey, const unsigned #ifdef LIBSSH2_DEBUG_PUBLICKEY _libssh2_debug(session, LIBSSH2_DBG_PUBLICKEY, "Sending publickey \"add\" packet: type=%s blob_len=%ld num_attrs=%ld", name, blob_len, num_attrs); #endif - if ((s - packet) != libssh2_channel_write(channel, (char *)packet, (s - packet))) { + if ((s - packet) != libssh2_channel_write(channel, packet, (s - packet))) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send publickey add packet", 0); LIBSSH2_FREE(session, packet); return -1; @@ -512,7 +512,7 @@ LIBSSH2_API int libssh2_publickey_remove_ex(LIBSSH2_PUBLICKEY *pkey, const unsig blob_len(4) + {blob} */ - packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for publickey \"remove\" packet", 0); return -1; @@ -530,7 +530,7 @@ LIBSSH2_API int libssh2_publickey_remove_ex(LIBSSH2_PUBLICKEY *pkey, const unsig #ifdef LIBSSH2_DEBUG_PUBLICKEY _libssh2_debug(session, LIBSSH2_DBG_PUBLICKEY, "Sending publickey \"remove\" packet: type=%s blob_len=%ld", name, blob_len); #endif - if ((s - packet) != libssh2_channel_write(channel, (char *)packet, (s - packet))) { + if ((s - packet) != libssh2_channel_write(channel, packet, (s - packet))) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send publickey remove packet", 0); LIBSSH2_FREE(session, packet); return -1; @@ -564,7 +564,7 @@ LIBSSH2_API int libssh2_publickey_list_fetch(LIBSSH2_PUBLICKEY *pkey, unsigned l #ifdef LIBSSH2_DEBUG_PUBLICKEY _libssh2_debug(session, LIBSSH2_DBG_PUBLICKEY, "Sending publickey \"list\" packet"); #endif - if ((s - buffer) != libssh2_channel_write(channel, (char *)buffer, (s - buffer))) { + if ((s - buffer) != libssh2_channel_write(channel, buffer, (s - buffer))) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send publickey list packet", 0); return -1; } @@ -614,7 +614,7 @@ LIBSSH2_API int libssh2_publickey_list_fetch(LIBSSH2_PUBLICKEY *pkey, unsigned l if (keys >= max_keys) { /* Grow the key list if necessary */ max_keys += 8; - list = (libssh2_publickey_list *)LIBSSH2_REALLOC(session, list, (max_keys + 1) * sizeof(libssh2_publickey_list)); + list = LIBSSH2_REALLOC(session, list, (max_keys + 1) * sizeof(libssh2_publickey_list)); if (!list) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for publickey list", 0); goto err_exit; @@ -626,14 +626,14 @@ LIBSSH2_API int libssh2_publickey_list_fetch(LIBSSH2_PUBLICKEY *pkey, unsigned l comment_len = libssh2_ntohu32(s); s += 4; if (comment_len) { list[keys].num_attrs = 1; - list[keys].attrs = (libssh2_publickey_attribute *)LIBSSH2_ALLOC(session, sizeof(libssh2_publickey_attribute)); + list[keys].attrs = LIBSSH2_ALLOC(session, sizeof(libssh2_publickey_attribute)); if (!list[keys].attrs) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for publickey attributes", 0); goto err_exit; } list[keys].attrs[0].name = "comment"; list[keys].attrs[0].name_len = sizeof("comment") - 1; - list[keys].attrs[0].value = (char *)s; + list[keys].attrs[0].value = s; list[keys].attrs[0].value_len = comment_len; list[keys].attrs[0].mandatory = 0; @@ -654,16 +654,16 @@ LIBSSH2_API int libssh2_publickey_list_fetch(LIBSSH2_PUBLICKEY *pkey, unsigned l list[keys].blob = s; s += list[keys].blob_len; list[keys].num_attrs = libssh2_ntohu32(s); s += 4; if (list[keys].num_attrs) { - list[keys].attrs = (libssh2_publickey_attribute *)LIBSSH2_ALLOC(session, list[keys].num_attrs * sizeof(libssh2_publickey_attribute)); + list[keys].attrs = LIBSSH2_ALLOC(session, list[keys].num_attrs * sizeof(libssh2_publickey_attribute)); if (!list[keys].attrs) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for publickey attributes", 0); goto err_exit; } for(i = 0; i < list[keys].num_attrs; i++) { list[keys].attrs[i].name_len = libssh2_ntohu32(s); s += 4; - list[keys].attrs[i].name = (char *)s; s += list[keys].attrs[i].name_len; + list[keys].attrs[i].name = s; s += list[keys].attrs[i].name_len; list[keys].attrs[i].value_len = libssh2_ntohu32(s); s += 4; - list[keys].attrs[i].value = (char *)s; s += list[keys].attrs[i].value_len; + list[keys].attrs[i].value = s; s += list[keys].attrs[i].value_len; list[keys].attrs[i].mandatory = 0; /* actually an ignored value */ } } else { diff --git a/pandora_agents/win32/ssh/libssh2/scp.c b/pandora_agents/win32/ssh/libssh2/scp.c index a4ab912747..95e4d3f485 100644 --- a/pandora_agents/win32/ssh/libssh2/scp.c +++ b/pandora_agents/win32/ssh/libssh2/scp.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -56,7 +56,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch command_len++; } - command = (unsigned char *) LIBSSH2_ALLOC(session, command_len); + command = LIBSSH2_ALLOC(session, command_len); if (!command) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a command buffer for scp session", 0); return NULL; @@ -82,7 +82,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch libssh2_channel_set_blocking(channel, 1); /* Request SCP for the desired file */ - if (libssh2_channel_process_startup(channel, "exec", sizeof("exec") - 1, (char *)command, command_len)) { + if (libssh2_channel_process_startup(channel, "exec", sizeof("exec") - 1, command, command_len)) { LIBSSH2_FREE(session, command); libssh2_channel_free(channel); return NULL; @@ -94,7 +94,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch #endif /* SCP ACK */ response[0] = '\0'; - if (libssh2_channel_write(channel, (char *)response, 1) != 1) { + if (libssh2_channel_write(channel, response, 1) != 1) { libssh2_channel_free(channel); return NULL; } @@ -104,7 +104,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch while (sb && (response_len < LIBSSH2_SCP_RESPONSE_BUFLEN)) { unsigned char *s, *p; - if (libssh2_channel_read(channel, (char *)response + response_len, 1) <= 0) { + if (libssh2_channel_read(channel, response + response_len, 1) <= 0) { /* Timeout, give up */ libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Timed out waiting for SCP response", 0); libssh2_channel_free(channel); @@ -152,7 +152,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch s = response + 1; - p = (unsigned char *) strchr((char *)s, ' '); + p = strchr(s, ' '); if (!p || ((p - s) <= 0)) { /* No spaces or space in the wrong spot */ libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid response from SCP server, malformed mtime", 0); @@ -163,13 +163,13 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch *(p++) = '\0'; /* Make sure we don't get fooled by leftover values */ errno = 0; - mtime = strtol((char *)s, NULL, 10); + mtime = strtol(s, NULL, 10); if (errno) { libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid response from SCP server, invalid mtime", 0); libssh2_channel_free(channel); return NULL; } - s = (unsigned char *)strchr((char *)p, ' '); + s = strchr(p, ' '); if (!s || ((s - p) <= 0)) { /* No spaces or space in the wrong spot */ libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid response from SCP server, malformed mtime.usec", 0); @@ -179,7 +179,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch /* Ignore mtime.usec */ s++; - p = (unsigned char *)strchr((char *)s, ' '); + p = strchr(s, ' '); if (!p || ((p - s) <= 0)) { /* No spaces or space in the wrong spot */ libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid response from SCP server, too short or malformed", 0); @@ -190,7 +190,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch *(p++) = '\0'; /* Make sure we don't get fooled by leftover values */ errno = 0; - atime = strtol((char *)s, NULL, 10); + atime = strtol(s, NULL, 10); if (errno) { libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid response from SCP server, invalid atime", 0); libssh2_channel_free(channel); @@ -199,7 +199,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch /* SCP ACK */ response[0] = '\0'; - if (libssh2_channel_write(channel, (char *)response, 1) != 1) { + if (libssh2_channel_write(channel, response, 1) != 1) { libssh2_channel_free(channel); return NULL; } @@ -215,7 +215,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch while (response_len < LIBSSH2_SCP_RESPONSE_BUFLEN) { char *s, *p, *e = NULL; - if (libssh2_channel_read(channel, (char *)response + response_len, 1) <= 0) { + if (libssh2_channel_read(channel, response + response_len, 1) <= 0) { /* Timeout, give up */ libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Timed out waiting for SCP response", 0); libssh2_channel_free(channel); @@ -260,7 +260,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch return NULL; } - s = (char *)response + 1; + s = response + 1; p = strchr(s, ' '); if (!p || ((p - s) <= 0)) { @@ -300,7 +300,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_recv(LIBSSH2_SESSION *session, const ch /* SCP ACK */ response[0] = '\0'; - if (libssh2_channel_write(channel, (char *)response, 1) != 1) { + if (libssh2_channel_write(channel, response, 1) != 1) { libssh2_channel_free(channel); return NULL; } @@ -342,7 +342,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_send_ex(LIBSSH2_SESSION *session, const command_len++; } - command = (unsigned char *)LIBSSH2_ALLOC(session, command_len); + command = LIBSSH2_ALLOC(session, command_len); if (!command) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a command buffer for scp session", 0); return NULL; @@ -370,7 +370,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_send_ex(LIBSSH2_SESSION *session, const libssh2_channel_set_blocking(channel, 1); /* Request SCP for the desired file */ - if (libssh2_channel_process_startup(channel, "exec", sizeof("exec") - 1, (char *)command, command_len)) { + if (libssh2_channel_process_startup(channel, "exec", sizeof("exec") - 1, command, command_len)) { /* previous call set libssh2_session_last_error(), pass it through */ LIBSSH2_FREE(session, command); libssh2_channel_free(channel); @@ -379,7 +379,7 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_send_ex(LIBSSH2_SESSION *session, const LIBSSH2_FREE(session, command); /* Wait for ACK */ - if ((libssh2_channel_read(channel, (char *)response, 1) <= 0) || (response[0] != 0)) { + if ((libssh2_channel_read(channel, response, 1) <= 0) || (response[0] != 0)) { libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid ACK response from remote", 0); libssh2_channel_free(channel); return NULL; @@ -387,17 +387,17 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_send_ex(LIBSSH2_SESSION *session, const /* Send mtime and atime to be used for file */ if (mtime || atime) { - response_len = snprintf((char *)response, LIBSSH2_SCP_RESPONSE_BUFLEN, "T%ld 0 %ld 0\n", mtime, atime); + response_len = snprintf(response, LIBSSH2_SCP_RESPONSE_BUFLEN, "T%ld 0 %ld 0\n", mtime, atime); #ifdef LIBSSH2_DEBUG_SCP _libssh2_debug(session, LIBSSH2_DBG_SCP, "Sent %s", response); #endif - if (libssh2_channel_write(channel, (char *)response, response_len) != (int)response_len) { + if (libssh2_channel_write(channel, response, response_len) != response_len) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send time data for SCP file", 0); libssh2_channel_free(channel); return NULL; } /* Wait for ACK */ - if ((libssh2_channel_read(channel, (char *)response, 1) <= 0) || (response[0] != 0)) { + if ((libssh2_channel_read(channel, response, 1) <= 0) || (response[0] != 0)) { libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid ACK response from remote", 0); libssh2_channel_free(channel); return NULL; @@ -405,24 +405,24 @@ LIBSSH2_API LIBSSH2_CHANNEL *libssh2_scp_send_ex(LIBSSH2_SESSION *session, const } /* Send mode, size, and basename */ - base = (unsigned char *)strrchr((char *)path, '/'); + base = strrchr(path, '/'); if (base) { base++; } else { - base = (unsigned char *)path; + base = path; } - response_len = snprintf((char *)response, LIBSSH2_SCP_RESPONSE_BUFLEN, "C0%o %lu %s\n", mode, (unsigned long)size, base); + response_len = snprintf(response, LIBSSH2_SCP_RESPONSE_BUFLEN, "C0%o %lu %s\n", mode, (unsigned long)size, base); #ifdef LIBSSH2_DEBUG_SCP _libssh2_debug(session, LIBSSH2_DBG_SCP, "Sent %s", response); #endif - if (libssh2_channel_write(channel, (char *)response, response_len) != (int)response_len) { + if (libssh2_channel_write(channel, response, response_len) != response_len) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send core file data for SCP file", 0); libssh2_channel_free(channel); return NULL; } /* Wait for ACK */ - if ((libssh2_channel_read(channel, (char *)response, 1) <= 0) || (response[0] != 0)) { + if ((libssh2_channel_read(channel, response, 1) <= 0) || (response[0] != 0)) { libssh2_error(session, LIBSSH2_ERROR_SCP_PROTOCOL, "Invalid ACK response from remote", 0); libssh2_channel_free(channel); return NULL; diff --git a/pandora_agents/win32/ssh/libssh2/session.c b/pandora_agents/win32/ssh/libssh2/session.c index f69a17a586..8ec39e719c 100644 --- a/pandora_agents/win32/ssh/libssh2/session.c +++ b/pandora_agents/win32/ssh/libssh2/session.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -96,16 +96,35 @@ static int libssh2_banner_receive(LIBSSH2_SESSION *session) char banner[256]; int banner_len = 0; - while ((banner_len < (int) sizeof(banner)) && + while ((banner_len < sizeof(banner)) && ((banner_len == 0) || (banner[banner_len-1] != '\n'))) { char c = '\0'; int ret; ret = recv(session->socket_fd, &c, 1, LIBSSH2_SOCKET_RECV_FLAGS(session)); - if ((ret < 0) && (ret != EAGAIN)) { - /* Some kinda error, but don't break for non-blocking issues */ - return 1; + if (ret < 0) { +#ifdef WIN32 + switch (WSAGetLastError()) { + case WSAEWOULDBLOCK: + errno = EAGAIN; + break; + case WSAENOTSOCK: + errno = EBADF; + break; + case WSAENOTCONN: + case WSAECONNABORTED: + errno = ENOTCONN; + break; + case WSAEINTR: + errno = EINTR; + break; + } +#endif /* WIN32 */ + if (errno != EAGAIN) { + /* Some kinda error, but don't break for non-blocking issues */ + return 1; + } } if (ret <= 0) continue; @@ -125,7 +144,7 @@ static int libssh2_banner_receive(LIBSSH2_SESSION *session) if (!banner_len) return 1; - session->remote.banner = (unsigned char *) LIBSSH2_ALLOC(session, banner_len + 1); + session->remote.banner = LIBSSH2_ALLOC(session, banner_len + 1); memcpy(session->remote.banner, banner, banner_len); session->remote.banner[banner_len] = '\0'; #ifdef LIBSSH2_DEBUG_TRANSPORT @@ -145,8 +164,8 @@ static int libssh2_banner_send(LIBSSH2_SESSION *session) if (session->local.banner) { /* setopt_string will have given us our \r\n characters */ - banner_len = strlen((char *) session->local.banner); - banner = (char *) session->local.banner; + banner_len = strlen(session->local.banner); + banner = session->local.banner; } #ifdef LIBSSH2_DEBUG_TRANSPORT { @@ -185,7 +204,7 @@ LIBSSH2_API int libssh2_banner_set(LIBSSH2_SESSION *session, const char *banner) return 0; } - session->local.banner = (unsigned char *) LIBSSH2_ALLOC(session, banner_len + 3); + session->local.banner = LIBSSH2_ALLOC(session, banner_len + 3); if (!session->local.banner) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for local banner", 0); return -1; @@ -225,7 +244,7 @@ LIBSSH2_API LIBSSH2_SESSION *libssh2_session_init_ex( if (my_free) local_free = my_free; if (my_realloc) local_realloc = my_realloc; - session = (LIBSSH2_SESSION *) local_alloc(sizeof(LIBSSH2_SESSION), (void **) abstract); + session = local_alloc(sizeof(LIBSSH2_SESSION), abstract); memset(session, 0, sizeof(LIBSSH2_SESSION)); session->alloc = local_alloc; session->free = local_free; @@ -249,28 +268,28 @@ LIBSSH2_API void* libssh2_session_callback_set(LIBSSH2_SESSION *session, int cbt switch (cbtype) { case LIBSSH2_CALLBACK_IGNORE: - oldcb = (void *) session->ssh_msg_ignore; - session->ssh_msg_ignore = (void (*) (LIBSSH2_SESSION*, const char *, int, void **))callback; + oldcb = session->ssh_msg_ignore; + session->ssh_msg_ignore = callback; return oldcb; break; case LIBSSH2_CALLBACK_DEBUG: - oldcb = (void *) session->ssh_msg_debug; - session->ssh_msg_debug = (void (*) (LIBSSH2_SESSION*, int, const char *, int, const char *, int, void **))callback; + oldcb = session->ssh_msg_debug; + session->ssh_msg_debug = callback; return oldcb; break; case LIBSSH2_CALLBACK_DISCONNECT: - oldcb = (void *) session->ssh_msg_disconnect; - session->ssh_msg_disconnect = (void (*) (LIBSSH2_SESSION*, int, const char *, int, const char *, int, void **))callback; + oldcb = session->ssh_msg_disconnect; + session->ssh_msg_disconnect = callback; return oldcb; break; case LIBSSH2_CALLBACK_MACERROR: - oldcb = (void *) session->macerror; - session->macerror = (int (*) (LIBSSH2_SESSION*, const char *, int, void **))callback; + oldcb = session->macerror; + session->macerror = callback; return oldcb; break; case LIBSSH2_CALLBACK_X11: - oldcb = (void *) session->x11; - session->x11 = (void (*) (LIBSSH2_SESSION*, LIBSSH2_CHANNEL*, char*, int, void **) )callback; + oldcb = session->x11; + session->x11 = callback; return oldcb; break; } @@ -298,9 +317,9 @@ LIBSSH2_API int libssh2_session_startup(LIBSSH2_SESSION *session, int socket) #ifdef LIBSSH2_DEBUG_TRANSPORT _libssh2_debug(session, LIBSSH2_DBG_TRANS, "session_startup for socket %d", socket); #endif - if (socket <= 0) { + if (socket < 0) { /* Did we forget something? */ - libssh2_error(session, LIBSSH2_ERROR_SOCKET_NONE, "No socket provided", 0); + libssh2_error(session, LIBSSH2_ERROR_SOCKET_NONE, "Bad socket provided", 0); return LIBSSH2_ERROR_SOCKET_NONE; } session->socket_fd = socket; @@ -341,7 +360,7 @@ LIBSSH2_API int libssh2_session_startup(LIBSSH2_SESSION *session, int socket) service_length = libssh2_ntohu32(data + 1); if ((service_length != (sizeof("ssh-userauth") - 1)) || - strncmp((char *)"ssh-userauth", (char *)data + 5, service_length)) { + strncmp("ssh-userauth", data + 5, service_length)) { LIBSSH2_FREE(session, data); libssh2_error(session, LIBSSH2_ERROR_PROTO, "Invalid response received from server", 0); return LIBSSH2_ERROR_PROTO; @@ -394,6 +413,7 @@ LIBSSH2_API void libssh2_session_free(LIBSSH2_SESSION *session) if (session->local.crypt) { if (session->local.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { if (session->local.crypt_abstract) { + EVP_CIPHER_CTX_cleanup(session->local.crypt_abstract); LIBSSH2_FREE(session, session->local.crypt_abstract); session->local.crypt_abstract = NULL; } @@ -415,6 +435,7 @@ LIBSSH2_API void libssh2_session_free(LIBSSH2_SESSION *session) if (session->remote.crypt) { if (session->remote.crypt->flags & LIBSSH2_CRYPT_METHOD_FLAG_EVP) { if (session->remote.crypt_abstract) { + EVP_CIPHER_CTX_cleanup(session->remote.crypt_abstract); LIBSSH2_FREE(session, session->remote.crypt_abstract); session->remote.crypt_abstract = NULL; } @@ -513,7 +534,7 @@ LIBSSH2_API int libssh2_session_disconnect_ex(LIBSSH2_SESSION *session, int reas } data_len = descr_len + lang_len + 13; /* packet_type(1) + reason code(4) + descr_len(4) + lang_len(4) */ - s = data = (unsigned char *) LIBSSH2_ALLOC(session, data_len); + s = data = LIBSSH2_ALLOC(session, data_len); if (!data) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for disconnect packet", 0); return -1; @@ -618,7 +639,7 @@ LIBSSH2_API int libssh2_session_last_error(LIBSSH2_SESSION *session, char **errm if (!session->err_code) { if (errmsg) { if (want_buf) { - *errmsg = (char *) LIBSSH2_ALLOC(session, 1); + *errmsg = LIBSSH2_ALLOC(session, 1); if (*errmsg) { **errmsg = 0; } @@ -633,7 +654,7 @@ LIBSSH2_API int libssh2_session_last_error(LIBSSH2_SESSION *session, char **errm } if (errmsg) { - char *serrmsg = session->err_msg ? session->err_msg : (char *) ""; + char *serrmsg = session->err_msg ? session->err_msg : ""; int ownbuf = session->err_msg ? session->err_should_free : 0; if (want_buf) { @@ -643,7 +664,7 @@ LIBSSH2_API int libssh2_session_last_error(LIBSSH2_SESSION *session, char **errm session->err_should_free = 0; } else { /* Make a copy so the calling program can own it */ - *errmsg = (char *) LIBSSH2_ALLOC(session, session->err_msglen + 1); + *errmsg = LIBSSH2_ALLOC(session, session->err_msglen + 1); if (*errmsg) { memcpy(*errmsg, session->err_msg, session->err_msglen); (*errmsg)[session->err_msglen] = 0; @@ -809,7 +830,7 @@ LIBSSH2_API int libssh2_poll(LIBSSH2_POLLFD *fds, unsigned int nfds, long timeou active_fds = 0; - for (i = 0; i < (int) nfds; i++) { + for (i = 0; i < nfds; i++) { if (fds[i].events != fds[i].revents) { switch (fds[i].type) { case LIBSSH2_POLLFD_CHANNEL: diff --git a/pandora_agents/win32/ssh/libssh2/sftp.c b/pandora_agents/win32/ssh/libssh2/sftp.c index 36d2a1b516..dd220a9b61 100644 --- a/pandora_agents/win32/ssh/libssh2/sftp.c +++ b/pandora_agents/win32/ssh/libssh2/sftp.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -126,7 +126,7 @@ static int libssh2_sftp_packet_add(LIBSSH2_SFTP *sftp, unsigned char *data, unsi #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Received packet %d", (int)data[0]); #endif - packet = (LIBSSH2_PACKET *)LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PACKET)); + packet = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_PACKET)); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate datablock for SFTP packet", 0); return -1; @@ -166,18 +166,18 @@ static int libssh2_sftp_packet_read(LIBSSH2_SFTP *sftp, int should_block) #endif if (should_block) { libssh2_channel_set_blocking(channel, 1); - if (4 != libssh2_channel_read(channel, (char *)buffer, 4)) { + if (4 != libssh2_channel_read(channel, buffer, 4)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for FXP packet", 0); return -1; } } else { libssh2_channel_set_blocking(channel, 0); - if (1 != libssh2_channel_read(channel, (char *)buffer, 1)) { + if (1 != libssh2_channel_read(channel, buffer, 1)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for FXP packet", 0); return 0; } libssh2_channel_set_blocking(channel, 1); - if (3 != libssh2_channel_read(channel, (char *)buffer + 1, 3)) { + if (3 != libssh2_channel_read(channel, buffer + 1, 3)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for FXP packet", 0); return -1; } @@ -191,7 +191,7 @@ static int libssh2_sftp_packet_read(LIBSSH2_SFTP *sftp, int should_block) return -1; } - packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate SFTP packet", 0); return -1; @@ -199,7 +199,7 @@ static int libssh2_sftp_packet_read(LIBSSH2_SFTP *sftp, int should_block) packet_received = 0; while (packet_len > packet_received) { - long bytes_received = libssh2_channel_read(channel, (char *)packet + packet_received, packet_len - packet_received); + long bytes_received = libssh2_channel_read(channel, packet + packet_received, packet_len - packet_received); if (bytes_received < 0) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Receive error waiting for SFTP packet", 0); @@ -246,7 +246,7 @@ static int libssh2_sftp_packet_ask(LIBSSH2_SFTP *sftp, unsigned char packet_type } while (packet) { - if (strncmp((char *)packet->data, (char *)match_buf, match_len) == 0) { + if (strncmp(packet->data, match_buf, match_len) == 0) { *data = packet->data; *data_len = packet->data_len; @@ -470,7 +470,7 @@ LIBSSH2_API LIBSSH2_SFTP *libssh2_sftp_init(LIBSSH2_SESSION *session) libssh2_channel_handle_extended_data(channel, LIBSSH2_CHANNEL_EXTENDED_DATA_IGNORE); - sftp = (LIBSSH2_SFTP *)LIBSSH2_ALLOC(session, sizeof(LIBSSH2_SFTP)); + sftp = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_SFTP)); if (!sftp) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate a new SFTP structure", 0); libssh2_channel_free(channel); @@ -487,7 +487,7 @@ LIBSSH2_API LIBSSH2_SFTP *libssh2_sftp_init(LIBSSH2_SESSION *session) #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Sending FXP_INIT packet advertising version %d support", (int)LIBSSH2_SFTP_VERSION); #endif - if (9 != libssh2_channel_write(channel, (char *)buffer, 9)) { + if (9 != libssh2_channel_write(channel, buffer, 9)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send SSH_FXP_INIT", 0); libssh2_channel_free(channel); LIBSSH2_FREE(session, sftp); @@ -523,10 +523,10 @@ LIBSSH2_API LIBSSH2_SFTP *libssh2_sftp_init(LIBSSH2_SESSION *session) unsigned long extname_len, extdata_len; extname_len = libssh2_ntohu32(s); s += 4; - extension_name = (char *)s; s += extname_len; + extension_name = s; s += extname_len; extdata_len = libssh2_ntohu32(s); s += 4; - extension_data = (char *)s; s += extdata_len; + extension_data = s; s += extdata_len; /* TODO: Actually process extensions */ } @@ -567,7 +567,7 @@ LIBSSH2_API LIBSSH2_SFTP_HANDLE *libssh2_sftp_open_ex(LIBSSH2_SFTP *sftp, char * unsigned char fopen_responses[2] = { SSH_FXP_HANDLE, SSH_FXP_STATUS }; unsigned long request_id; - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet", 0); return NULL; @@ -589,7 +589,7 @@ LIBSSH2_API LIBSSH2_SFTP_HANDLE *libssh2_sftp_open_ex(LIBSSH2_SFTP *sftp, char * #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Sending %s open request", (open_type == LIBSSH2_SFTP_OPENFILE) ? "file" : "directory"); #endif - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_OPEN or FXP_OPENDIR command", 0); LIBSSH2_FREE(session, packet); return NULL; @@ -608,7 +608,7 @@ LIBSSH2_API LIBSSH2_SFTP_HANDLE *libssh2_sftp_open_ex(LIBSSH2_SFTP *sftp, char * return NULL; } - fp = (LIBSSH2_SFTP_HANDLE *)LIBSSH2_ALLOC(session, sizeof(LIBSSH2_SFTP_HANDLE)); + fp = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_SFTP_HANDLE)); if (!fp) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate new SFTP handle structure", 0); LIBSSH2_FREE(session, data); @@ -622,7 +622,7 @@ LIBSSH2_API LIBSSH2_SFTP_HANDLE *libssh2_sftp_open_ex(LIBSSH2_SFTP *sftp, char * /* SFTP doesn't allow handles longer than 256 characters */ fp->handle_len = 256; } - fp->handle = (char *)LIBSSH2_ALLOC(session, fp->handle_len); + fp->handle = LIBSSH2_ALLOC(session, fp->handle_len); if (!fp->handle) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate space for SFTP file/dir handle", 0); LIBSSH2_FREE(session, data); @@ -665,10 +665,10 @@ LIBSSH2_API size_t libssh2_sftp_read(LIBSSH2_SFTP_HANDLE *handle, char *buffer, #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Reading %lu bytes from SFTP handle", (unsigned long)buffer_maxlen); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_CLOSE packet", 0); - return (size_t) -1; + return -1; } libssh2_htonu32(s, packet_len - 4); s += 4; @@ -680,16 +680,16 @@ LIBSSH2_API size_t libssh2_sftp_read(LIBSSH2_SFTP_HANDLE *handle, char *buffer, libssh2_htonu64(s, handle->u.file.offset); s += 8; libssh2_htonu32(s, buffer_maxlen); s += 4; - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_READ command", 0); LIBSSH2_FREE(session, packet); - return (size_t)-1; + return -1; } LIBSSH2_FREE(session, packet); if (libssh2_sftp_packet_requirev(sftp, 2, read_responses, request_id, &data, &data_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for status message", 0); - return (size_t)-1; + return -1; } switch (data[0]) { @@ -697,11 +697,11 @@ LIBSSH2_API size_t libssh2_sftp_read(LIBSSH2_SFTP_HANDLE *handle, char *buffer, sftp->last_errno = libssh2_ntohu32(data + 5); libssh2_error(session, LIBSSH2_ERROR_SFTP_PROTOCOL, "SFTP Protocol Error", 0); LIBSSH2_FREE(session, data); - return (size_t)-1; + return -1; case SSH_FXP_DATA: bytes_read = libssh2_ntohu32(data + 5); if (bytes_read > (data_len - 9)) { - return (size_t)-1; + return -1; } #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "%lu bytes returned", (unsigned long)bytes_read); @@ -712,7 +712,7 @@ LIBSSH2_API size_t libssh2_sftp_read(LIBSSH2_SFTP_HANDLE *handle, char *buffer, return bytes_read; } - return (size_t)-1; + return -1; } /* }}} */ @@ -732,7 +732,7 @@ LIBSSH2_API int libssh2_sftp_readdir(LIBSSH2_SFTP_HANDLE *handle, char *buffer, if (handle->u.dir.names_left) { /* A prior request returned more than one directory entry, feed it back from the buffer */ - unsigned char *s = (unsigned char *)handle->u.dir.next_name; + unsigned char *s = handle->u.dir.next_name; unsigned long real_filename_len = libssh2_ntohu32(s); filename_len = real_filename_len; s += 4; @@ -749,7 +749,7 @@ LIBSSH2_API int libssh2_sftp_readdir(LIBSSH2_SFTP_HANDLE *handle, char *buffer, } s += libssh2_sftp_bin2attr(attrs ? attrs : &attrs_dummy, s); - handle->u.dir.next_name = (char *)s; + handle->u.dir.next_name = s; if ((--handle->u.dir.names_left) == 0) { LIBSSH2_FREE(session, handle->u.dir.names_packet); } @@ -759,7 +759,7 @@ LIBSSH2_API int libssh2_sftp_readdir(LIBSSH2_SFTP_HANDLE *handle, char *buffer, /* Request another entry(entries?) */ - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_READDIR packet", 0); return -1; @@ -775,7 +775,7 @@ LIBSSH2_API int libssh2_sftp_readdir(LIBSSH2_SFTP_HANDLE *handle, char *buffer, #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Reading entries from directory handle"); #endif - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_READ command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -830,7 +830,7 @@ LIBSSH2_API int libssh2_sftp_readdir(LIBSSH2_SFTP_HANDLE *handle, char *buffer, handle->u.dir.names_left = num_names; handle->u.dir.names_packet = data; - handle->u.dir.next_name = (char *)data + 9; + handle->u.dir.next_name = data + 9; /* Be lazy, just use the name popping mechanism from the start of the function */ return libssh2_sftp_readdir(handle, buffer, buffer_maxlen, attrs); @@ -852,10 +852,10 @@ LIBSSH2_API size_t libssh2_sftp_write(LIBSSH2_SFTP_HANDLE *handle, const char *b #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Writing %lu bytes", (unsigned long)count); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_WRITE packet", 0); - return (size_t)-1; + return -1; } libssh2_htonu32(s, packet_len - 4); s += 4; @@ -868,16 +868,16 @@ LIBSSH2_API size_t libssh2_sftp_write(LIBSSH2_SFTP_HANDLE *handle, const char *b libssh2_htonu32(s, count); s += 4; memcpy(s, buffer, count); s += count; - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_WRITE command", 0); LIBSSH2_FREE(session, packet); - return (size_t)-1; + return -1; } LIBSSH2_FREE(session, packet); if (libssh2_sftp_packet_require(sftp, SSH_FXP_STATUS, request_id, &data, &data_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_TIMEOUT, "Timeout waiting for status message", 0); - return (size_t)-1; + return -1; } retcode = libssh2_ntohu32(data + 5); @@ -890,7 +890,7 @@ LIBSSH2_API size_t libssh2_sftp_write(LIBSSH2_SFTP_HANDLE *handle, const char *b libssh2_error(session, LIBSSH2_ERROR_SFTP_PROTOCOL, "SFTP Protocol Error", 0); sftp->last_errno = retcode; - return (size_t)-1; + return -1; } /* }}} */ @@ -911,7 +911,7 @@ LIBSSH2_API int libssh2_sftp_fstat_ex(LIBSSH2_SFTP_HANDLE *handle, LIBSSH2_SFTP_ #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Issuing %s command", setstat ? "set-stat" : "stat"); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FSTAT/FSETSTAT packet", 0); return -1; @@ -927,8 +927,8 @@ LIBSSH2_API int libssh2_sftp_fstat_ex(LIBSSH2_SFTP_HANDLE *handle, LIBSSH2_SFTP_ s += libssh2_sftp_attr2bin(s, attrs); } - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { - libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, setstat ? (char *)"Unable to send FXP_FSETSTAT" : (char *)"Unable to send FXP_FSTAT command", 0); + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { + libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, setstat ? "Unable to send FXP_FSETSTAT" : "Unable to send FXP_FSTAT command", 0); LIBSSH2_FREE(session, packet); return -1; } @@ -994,7 +994,7 @@ LIBSSH2_API int libssh2_sftp_close_handle(LIBSSH2_SFTP_HANDLE *handle) #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Closing handle"); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_CLOSE packet", 0); return -1; @@ -1007,7 +1007,7 @@ LIBSSH2_API int libssh2_sftp_close_handle(LIBSSH2_SFTP_HANDLE *handle) libssh2_htonu32(s, handle->handle_len); s += 4; memcpy(s, handle->handle, handle->handle_len); s += handle->handle_len; - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_CLOSE command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1065,7 +1065,7 @@ LIBSSH2_API int libssh2_sftp_unlink_ex(LIBSSH2_SFTP *sftp, char *filename, int f #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Unlinking %s", filename); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_REMOVE packet", 0); return -1; @@ -1078,7 +1078,7 @@ LIBSSH2_API int libssh2_sftp_unlink_ex(LIBSSH2_SFTP *sftp, char *filename, int f libssh2_htonu32(s, filename_len); s += 4; memcpy(s, filename, filename_len); s += filename_len; - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_REMOVE command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1112,7 +1112,7 @@ LIBSSH2_API int libssh2_sftp_rename_ex(LIBSSH2_SFTP *sftp, char *source_filenam { LIBSSH2_CHANNEL *channel = sftp->channel; LIBSSH2_SESSION *session = channel->session; - unsigned long data_len, retcode = (unsigned long)-1, request_id; + unsigned long data_len, retcode = -1, request_id; unsigned long packet_len = source_filename_len + dest_filename_len + 17 + (sftp->version >= 5 ? 4 : 0); /* packet_len(4) + packet_type(1) + request_id(4) + source_filename_len(4) + dest_filename_len(4) + flags(4){SFTP5+) */ @@ -1126,7 +1126,7 @@ LIBSSH2_API int libssh2_sftp_rename_ex(LIBSSH2_SFTP *sftp, char *source_filenam #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Renaming %s to %s", source_filename, dest_filename); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_RENAME packet", 0); return -1; @@ -1145,7 +1145,7 @@ LIBSSH2_API int libssh2_sftp_rename_ex(LIBSSH2_SFTP *sftp, char *source_filenam libssh2_htonu32(s, flags); s += 4; } - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, s - packet)) { + if (packet_len != libssh2_channel_write(channel, packet, s - packet)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_RENAME command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1167,17 +1167,17 @@ LIBSSH2_API int libssh2_sftp_rename_ex(LIBSSH2_SFTP *sftp, char *source_filenam case LIBSSH2_FX_FILE_ALREADY_EXISTS: libssh2_error(session, LIBSSH2_ERROR_SFTP_PROTOCOL, "File already exists and SSH_FXP_RENAME_OVERWRITE not specified", 0); sftp->last_errno = retcode; - retcode = (unsigned long)-1; + retcode = -1; break; case LIBSSH2_FX_OP_UNSUPPORTED: libssh2_error(session, LIBSSH2_ERROR_SFTP_PROTOCOL, "Operation Not Supported", 0); sftp->last_errno = retcode; - retcode = (unsigned long)-1; + retcode = -1; break; default: libssh2_error(session, LIBSSH2_ERROR_SFTP_PROTOCOL, "SFTP Protocol Error", 0); sftp->last_errno = retcode; - retcode = (unsigned long)-1; + retcode = -1; } return retcode; @@ -1200,7 +1200,7 @@ LIBSSH2_API int libssh2_sftp_mkdir_ex(LIBSSH2_SFTP *sftp, char *path, int path_l #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Creating directory %s with mode 0%lo", path, mode); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_MKDIR packet", 0); return -1; @@ -1216,7 +1216,7 @@ LIBSSH2_API int libssh2_sftp_mkdir_ex(LIBSSH2_SFTP *sftp, char *path, int path_l memcpy(s, path, path_len); s += path_len; s += libssh2_sftp_attr2bin(s, &attrs); - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_MKDIR command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1255,7 +1255,7 @@ LIBSSH2_API int libssh2_sftp_rmdir_ex(LIBSSH2_SFTP *sftp, char *path, int path_l #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "Removing directory: %s", path); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_MKDIR packet", 0); return -1; @@ -1268,7 +1268,7 @@ LIBSSH2_API int libssh2_sftp_rmdir_ex(LIBSSH2_SFTP *sftp, char *path, int path_l libssh2_htonu32(s, path_len); s += 4; memcpy(s, path, path_len); s += path_len; - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send FXP_MKDIR command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1309,7 +1309,7 @@ LIBSSH2_API int libssh2_sftp_stat_ex(LIBSSH2_SFTP *sftp, char *path, int path_le #ifdef LIBSSH2_DEBUG_SFTP _libssh2_debug(session, LIBSSH2_DBG_SFTP, "%s %s", (stat_type == LIBSSH2_SFTP_SETSTAT) ? "Set-statting" : (stat_type == LIBSSH2_SFTP_LSTAT ? "LStatting" : "Statting"), path); #endif - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for FXP_MKDIR packet", 0); return -1; @@ -1335,7 +1335,7 @@ LIBSSH2_API int libssh2_sftp_stat_ex(LIBSSH2_SFTP *sftp, char *path, int path_le s += libssh2_sftp_attr2bin(s, attrs); } - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send STAT/LSTAT/SETSTAT command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1388,7 +1388,7 @@ LIBSSH2_API int libssh2_sftp_symlink_ex(LIBSSH2_SFTP *sftp, const char *path, in return -1; } - s = packet = (unsigned char *)LIBSSH2_ALLOC(session, packet_len); + s = packet = LIBSSH2_ALLOC(session, packet_len); if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for SYMLINK/READLINK/REALPATH packet", 0); return -1; @@ -1419,7 +1419,7 @@ LIBSSH2_API int libssh2_sftp_symlink_ex(LIBSSH2_SFTP *sftp, const char *path, in memcpy(s, target, target_len); s += target_len; } - if (packet_len != (unsigned int)libssh2_channel_write(channel, (char *)packet, packet_len)) { + if (packet_len != libssh2_channel_write(channel, packet, packet_len)) { libssh2_error(session, LIBSSH2_ERROR_SOCKET_SEND, "Unable to send SYMLINK/READLINK command", 0); LIBSSH2_FREE(session, packet); return -1; @@ -1452,7 +1452,7 @@ LIBSSH2_API int libssh2_sftp_symlink_ex(LIBSSH2_SFTP *sftp, const char *path, in } link_len = libssh2_ntohu32(data + 9); - if (link_len >= (unsigned int)target_len) { + if (link_len >= target_len) { link_len = target_len - 1; } memcpy(target, data + 13, link_len); diff --git a/pandora_agents/win32/ssh/libssh2/userauth.c b/pandora_agents/win32/ssh/libssh2/userauth.c index 2359c46203..1ff2a06db7 100644 --- a/pandora_agents/win32/ssh/libssh2/userauth.c +++ b/pandora_agents/win32/ssh/libssh2/userauth.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2004-2005, Sara Golemon +/* Copyright (c) 2004-2006, Sara Golemon * All rights reserved. * * Redistribution and use in source and binary forms, @@ -57,7 +57,7 @@ LIBSSH2_API char *libssh2_userauth_list(LIBSSH2_SESSION *session, const char *us unsigned long methods_len; unsigned char *data, *s; - s = data = (unsigned char *) LIBSSH2_ALLOC(session, data_len); + s = data = LIBSSH2_ALLOC(session, data_len); if (!data) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for userauth_list", 0); return NULL; @@ -99,7 +99,7 @@ LIBSSH2_API char *libssh2_userauth_list(LIBSSH2_SESSION *session, const char *us #ifdef LIBSSH2_DEBUG_USERAUTH _libssh2_debug(session, LIBSSH2_DBG_AUTH, "Permitted auth methods: %s", data); #endif - return (char *) data; + return data; } /* }}} */ @@ -124,7 +124,7 @@ LIBSSH2_API int libssh2_userauth_password_ex(LIBSSH2_SESSION *session, const cha unsigned long data_len = username_len + password_len + 40; /* packet_type(1) + username_len(4) + service_len(4) + service(14)"ssh-connection" + method_len(4) + method(8)"password" + chgpwdbool(1) + password_len(4) */ - s = data = (unsigned char *) LIBSSH2_ALLOC(session, data_len); + s = data = LIBSSH2_ALLOC(session, data_len); if (!data) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for userauth-password request", 0); return -1; @@ -184,7 +184,7 @@ LIBSSH2_API int libssh2_userauth_password_ex(LIBSSH2_SESSION *session, const cha return -1; } data_len = username_len + password_len + 44 + newpw_len; /* basic data_len + newpw_len(4) */ - s = data = (unsigned char *) LIBSSH2_ALLOC(session, data_len); + s = data = LIBSSH2_ALLOC(session, data_len); if (!data) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for userauth-password-change request", 0); return -1; @@ -259,13 +259,13 @@ static int libssh2_file_read_publickey(LIBSSH2_SESSION *session, unsigned char * return -1; } - pubkey = (char *) LIBSSH2_ALLOC(session, pubkey_len); + pubkey = LIBSSH2_ALLOC(session, pubkey_len); if (!pubkey) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for public key data", 0); fclose(fd); return -1; } - if (fread(pubkey, 1, pubkey_len, fd) != (unsigned int) pubkey_len) { + if (fread(pubkey, 1, pubkey_len, fd) != pubkey_len) { libssh2_error(session, LIBSSH2_ERROR_FILE, "Unable to read public key from file", 0); LIBSSH2_FREE(session, pubkey); fclose(fd); @@ -280,7 +280,7 @@ static int libssh2_file_read_publickey(LIBSSH2_SESSION *session, unsigned char * return -1; } - if ((sp1 = (char *) memchr(pubkey, ' ', pubkey_len)) == NULL) { + if ((sp1 = memchr(pubkey, ' ', pubkey_len)) == NULL) { libssh2_error(session, LIBSSH2_ERROR_FILE, "Invalid public key data", 0); LIBSSH2_FREE(session, pubkey); return -1; @@ -288,12 +288,12 @@ static int libssh2_file_read_publickey(LIBSSH2_SESSION *session, unsigned char * /* Wasting some bytes here (okay, more than some), * but since it's likely to be freed soon anyway, * we'll just avoid the extra free/alloc and call it a wash */ - *method = (unsigned char *) pubkey; + *method = pubkey; *method_len = sp1 - pubkey; sp1++; - if ((sp2 = (char *) memchr(sp1, ' ', pubkey_len - *method_len)) == NULL) { + if ((sp2 = memchr(sp1, ' ', pubkey_len - *method_len)) == NULL) { /* Assume that the id string is missing, but that it's okay */ sp2 = pubkey + pubkey_len; } @@ -303,7 +303,7 @@ static int libssh2_file_read_publickey(LIBSSH2_SESSION *session, unsigned char * LIBSSH2_FREE(session, pubkey); return -1; } - *pubkeydata = (unsigned char *) tmp; + *pubkeydata = tmp; *pubkeydata_len = tmp_len; return 0; @@ -314,8 +314,8 @@ static int libssh2_file_read_publickey(LIBSSH2_SESSION *session, unsigned char * * Read a PEM encoded private key from an id_??? style file */ static int libssh2_file_read_privatekey(LIBSSH2_SESSION *session, LIBSSH2_HOSTKEY_METHOD **hostkey_method, void **hostkey_abstract, - const char *method, int method_len, - const char *privkeyfile, const char *passphrase) + const char *method, int method_len, + const char *privkeyfile, const char *passphrase) { LIBSSH2_HOSTKEY_METHOD **hostkey_methods_avail = libssh2_hostkey_methods(); @@ -337,7 +337,7 @@ static int libssh2_file_read_privatekey(LIBSSH2_SESSION *session, LIBSSH2_HOSTKE return -1; } - if ((*hostkey_method)->initPEM(session, (unsigned char *) privkeyfile, (unsigned char *) passphrase, hostkey_abstract)) { + if ((*hostkey_method)->initPEM(session, privkeyfile, passphrase, hostkey_abstract)) { libssh2_error(session, LIBSSH2_ERROR_FILE, "Unable to initialize private key from file", 0); return -1; } @@ -373,7 +373,7 @@ LIBSSH2_API int libssh2_userauth_hostbased_fromfile_ex(LIBSSH2_SESSION *session, */ /* Preallocate space for an overall length, method name again, * and the signature, which won't be any larger than the size of the publickeydata itself */ - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len + 4 + (4 + method_len) + (4 + pubkeydata_len)); + s = packet = LIBSSH2_ALLOC(session, packet_len + 4 + (4 + method_len) + (4 + pubkeydata_len)); *(s++) = SSH_MSG_USERAUTH_REQUEST; libssh2_htonu32(s, username_len); s += 4; @@ -397,18 +397,18 @@ LIBSSH2_API int libssh2_userauth_hostbased_fromfile_ex(LIBSSH2_SESSION *session, libssh2_htonu32(s, local_username_len); s += 4; memcpy(s, local_username, local_username_len); s += local_username_len; - if (libssh2_file_read_privatekey(session, &privkeyobj, &abstract, (char *) method, method_len, privatekey, passphrase)) { + if (libssh2_file_read_privatekey(session, &privkeyobj, &abstract, method, method_len, privatekey, passphrase)) { LIBSSH2_FREE(session, method); LIBSSH2_FREE(session, packet); return -1; } libssh2_htonu32(buf, session->session_id_len); - datavec[0].iov_base = (char *) buf; + datavec[0].iov_base = buf; datavec[0].iov_len = 4; - datavec[1].iov_base = (char *) session->session_id; + datavec[1].iov_base = session->session_id; datavec[1].iov_len = session->session_id_len; - datavec[2].iov_base = (char *) packet; + datavec[2].iov_base = packet; datavec[2].iov_len = packet_len; if (privkeyobj->signv(session, &sig, &sig_len, 3, datavec, &abstract)) { @@ -426,7 +426,7 @@ LIBSSH2_API int libssh2_userauth_hostbased_fromfile_ex(LIBSSH2_SESSION *session, if (sig_len > pubkeydata_len ) { /* Should *NEVER* happen, but...well.. better safe than sorry */ - packet = (unsigned char *) LIBSSH2_REALLOC(session, packet, packet_len + 4 + (4 + method_len) + (4 + sig_len)); /* PK sigblob */ + packet = LIBSSH2_REALLOC(session, packet, packet_len + 4 + (4 + method_len) + (4 + sig_len)); /* PK sigblob */ if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Failed allocating additional space for userauth-hostbased packet", 0); LIBSSH2_FREE(session, method); @@ -502,7 +502,7 @@ LIBSSH2_API int libssh2_userauth_publickey_fromfile_ex(LIBSSH2_SESSION *session, algmethod_len(4) + publickey_len(4) */ /* Preallocate space for an overall length, method name again, * and the signature, which won't be any larger than the size of the publickeydata itself */ - s = packet = (unsigned char *) LIBSSH2_ALLOC(session, packet_len + 4 + (4 + method_len) + (4 + pubkeydata_len)); + s = packet = LIBSSH2_ALLOC(session, packet_len + 4 + (4 + method_len) + (4 + pubkeydata_len)); *(s++) = SSH_MSG_USERAUTH_REQUEST; libssh2_htonu32(s, username_len); s += 4; @@ -568,7 +568,7 @@ LIBSSH2_API int libssh2_userauth_publickey_fromfile_ex(LIBSSH2_SESSION *session, LIBSSH2_FREE(session, data); LIBSSH2_FREE(session, pubkeydata); - if (libssh2_file_read_privatekey(session, &privkeyobj, &abstract, (char *) method, method_len, privatekey, passphrase)) { + if (libssh2_file_read_privatekey(session, &privkeyobj, &abstract, method, method_len, privatekey, passphrase)) { LIBSSH2_FREE(session, method); LIBSSH2_FREE(session, packet); return -1; @@ -577,11 +577,11 @@ LIBSSH2_API int libssh2_userauth_publickey_fromfile_ex(LIBSSH2_SESSION *session, *b = 0xFF; libssh2_htonu32(buf, session->session_id_len); - datavec[0].iov_base = (char *) buf; + datavec[0].iov_base = buf; datavec[0].iov_len = 4; - datavec[1].iov_base = (char *) session->session_id; + datavec[1].iov_base = session->session_id; datavec[1].iov_len = session->session_id_len; - datavec[2].iov_base = (char *) packet; + datavec[2].iov_base = packet; datavec[2].iov_len = packet_len; if (privkeyobj->signv(session, &sig, &sig_len, 3, datavec, &abstract)) { @@ -599,7 +599,7 @@ LIBSSH2_API int libssh2_userauth_publickey_fromfile_ex(LIBSSH2_SESSION *session, if (sig_len > pubkeydata_len) { /* Should *NEVER* happen, but...well.. better safe than sorry */ - packet = (unsigned char *) LIBSSH2_REALLOC(session, packet, packet_len + 4 + (4 + method_len) + (4 + sig_len)); /* PK sigblob */ + packet = LIBSSH2_REALLOC(session, packet, packet_len + 4 + (4 + method_len) + (4 + sig_len)); /* PK sigblob */ if (!packet) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Failed allocating additional space for userauth-publickey packet", 0); LIBSSH2_FREE(session, method); @@ -670,7 +670,7 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio + 4 + 0 /* string submethods (ISO-10646 UTF-8) */ ; - if (!(data = s = (unsigned char *) LIBSSH2_ALLOC(session, packet_len))) { + if (!(data = s = LIBSSH2_ALLOC(session, packet_len))) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive authentication", 0); return -1; } @@ -743,7 +743,7 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio /* string name (ISO-10646 UTF-8) */ auth_name_len = libssh2_ntohu32(s); s += 4; - if (!(auth_name = (char *) LIBSSH2_ALLOC(session, auth_name_len))) { + if (!(auth_name = LIBSSH2_ALLOC(session, auth_name_len))) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive 'name' request field", 0); goto cleanup; } @@ -751,7 +751,7 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio /* string instruction (ISO-10646 UTF-8) */ auth_instruction_len = libssh2_ntohu32(s); s += 4; - if (!(auth_instruction = (char *) LIBSSH2_ALLOC(session, auth_instruction_len))) { + if (!(auth_instruction = LIBSSH2_ALLOC(session, auth_instruction_len))) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive 'instruction' request field", 0); goto cleanup; } @@ -764,14 +764,14 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio /* int num-prompts */ num_prompts = libssh2_ntohu32(s); s += 4; - prompts = (LIBSSH2_USERAUTH_KBDINT_PROMPT *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_USERAUTH_KBDINT_PROMPT) * num_prompts); + prompts = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_USERAUTH_KBDINT_PROMPT) * num_prompts); if (!prompts) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive prompts array", 0); goto cleanup; } memset(prompts, 0, sizeof(LIBSSH2_USERAUTH_KBDINT_PROMPT) * num_prompts); - responses = (LIBSSH2_USERAUTH_KBDINT_RESPONSE *) LIBSSH2_ALLOC(session, sizeof(LIBSSH2_USERAUTH_KBDINT_RESPONSE) * num_prompts); + responses = LIBSSH2_ALLOC(session, sizeof(LIBSSH2_USERAUTH_KBDINT_RESPONSE) * num_prompts); if (!responses) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive responses array", 0); goto cleanup; @@ -781,7 +781,7 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio for(i = 0; i != num_prompts; ++i) { /* string prompt[1] (ISO-10646 UTF-8) */ prompts[i].length = libssh2_ntohu32(s); s += 4; - if (!(prompts[i].text = (char *) LIBSSH2_ALLOC(session, prompts[i].length))) { + if (!(prompts[i].text = LIBSSH2_ALLOC(session, prompts[i].length))) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive prompt message", 0); goto cleanup; } @@ -805,7 +805,7 @@ LIBSSH2_API int libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION *sessio packet_len += 4 + responses[i].length; /* string response[1] (ISO-10646 UTF-8) */ } - if (!(data = s = (unsigned char *) LIBSSH2_ALLOC(session, packet_len))) { + if (!(data = s = LIBSSH2_ALLOC(session, packet_len))) { libssh2_error(session, LIBSSH2_ERROR_ALLOC, "Unable to allocate memory for keyboard-interactive response packet", 0); goto cleanup; }