cjson
fuzzing
inputs
test1 test10 test11 test2 test3 test3.bu test3.uf test3.uu test4 test5 test6 test7 test8 test9library_config
cJSONConfig.cmake.in cJSONConfigVersion.cmake.in libcjson.pc.in libcjson_utils.pc.in uninstall.cmaketests
inputs
test1 test1.expected test10 test10.expected test11 test11.expected test2 test2.expected test3 test3.expected test4 test4.expected test5 test5.expected test6 test7 test7.expected test8 test8.expected test9 test9.expectedjson-patch-tests
.editorconfig .gitignore .npmignore README.md cjson-utils-tests.json package.json spec_tests.json tests.jsonunity
auto
colour_prompt.rb colour_reporter.rb generate_config.yml generate_module.rb generate_test_runner.rb parse_output.rb stylize_as_junit.rb test_file_filter.rb type_sanitizer.rb unity_test_summary.py unity_test_summary.rb unity_to_junit.pydocs
ThrowTheSwitchCodingStandard.md UnityAssertionsCheatSheetSuitableforPrintingandPossiblyFraming.pdf UnityAssertionsReference.md UnityConfigurationGuide.md UnityGettingStartedGuide.md UnityHelperScriptsGuide.md license.txtexamples
unity_config.hcurl
.github
scripts
cleancmd.pl cmp-config.pl cmp-pkg-config.sh codespell-ignore.words codespell.sh distfiles.sh pyspelling.words pyspelling.yaml randcurl.pl requirements-docs.txt requirements-proselint.txt requirements.txt shellcheck-ci.sh shellcheck.sh spellcheck.curl trimmarkdownheader.pl typos.sh typos.toml verify-examples.pl verify-synopsis.pl yamlcheck.sh yamlcheck.yamlworkflows
appveyor-status.yml checkdocs.yml checksrc.yml checkurls.yml codeql.yml configure-vs-cmake.yml curl-for-win.yml distcheck.yml fuzz.yml http3-linux.yml label.yml linux-old.yml linux.yml macos.yml non-native.yml windows.ymlCMake
CurlSymbolHiding.cmake CurlTests.c FindBrotli.cmake FindCares.cmake FindGSS.cmake FindGnuTLS.cmake FindLDAP.cmake FindLibbacktrace.cmake FindLibgsasl.cmake FindLibidn2.cmake FindLibpsl.cmake FindLibssh.cmake FindLibssh2.cmake FindLibuv.cmake FindMbedTLS.cmake FindNGHTTP2.cmake FindNGHTTP3.cmake FindNGTCP2.cmake FindNettle.cmake FindQuiche.cmake FindRustls.cmake FindWolfSSL.cmake FindZstd.cmake Macros.cmake OtherTests.cmake PickyWarnings.cmake Utilities.cmake cmake_uninstall.in.cmake curl-config.in.cmake unix-cache.cmake win32-cache.cmakedocs
cmdline-opts
.gitignore CMakeLists.txt MANPAGE.md Makefile.am Makefile.inc _AUTHORS.md _BUGS.md _DESCRIPTION.md _ENVIRONMENT.md _EXITCODES.md _FILES.md _GLOBBING.md _NAME.md _OPTIONS.md _OUTPUT.md _PROGRESS.md _PROTOCOLS.md _PROXYPREFIX.md _SEEALSO.md _SYNOPSIS.md _URL.md _VARIABLES.md _VERSION.md _WWW.md abstract-unix-socket.md alt-svc.md anyauth.md append.md aws-sigv4.md basic.md ca-native.md cacert.md capath.md cert-status.md cert-type.md cert.md ciphers.md compressed-ssh.md compressed.md config.md connect-timeout.md connect-to.md continue-at.md cookie-jar.md cookie.md create-dirs.md create-file-mode.md crlf.md crlfile.md curves.md data-ascii.md data-binary.md data-raw.md data-urlencode.md data.md delegation.md digest.md disable-eprt.md disable-epsv.md disable.md disallow-username-in-url.md dns-interface.md dns-ipv4-addr.md dns-ipv6-addr.md dns-servers.md doh-cert-status.md doh-insecure.md doh-url.md dump-ca-embed.md dump-header.md ech.md egd-file.md engine.md etag-compare.md etag-save.md expect100-timeout.md fail-early.md fail-with-body.md fail.md false-start.md follow.md form-escape.md form-string.md form.md ftp-account.md ftp-alternative-to-user.md ftp-create-dirs.md ftp-method.md ftp-pasv.md ftp-port.md ftp-pret.md ftp-skip-pasv-ip.md ftp-ssl-ccc-mode.md ftp-ssl-ccc.md ftp-ssl-control.md get.md globoff.md happy-eyeballs-timeout-ms.md haproxy-clientip.md haproxy-protocol.md head.md header.md help.md hostpubmd5.md hostpubsha256.md hsts.md http0.9.md http1.0.md http1.1.md http2-prior-knowledge.md http2.md http3-only.md http3.md ignore-content-length.md insecure.md interface.md ip-tos.md ipfs-gateway.md ipv4.md ipv6.md json.md junk-session-cookies.md keepalive-cnt.md keepalive-time.md key-type.md key.md knownhosts.md krb.md libcurl.md limit-rate.md list-only.md local-port.md location-trusted.md location.md login-options.md mail-auth.md mail-from.md mail-rcpt-allowfails.md mail-rcpt.md mainpage.idx manual.md max-filesize.md max-redirs.md max-time.md metalink.md mptcp.md negotiate.md netrc-file.md netrc-optional.md netrc.md next.md no-alpn.md no-buffer.md no-clobber.md no-keepalive.md no-npn.md no-progress-meter.md no-sessionid.md noproxy.md ntlm-wb.md ntlm.md oauth2-bearer.md out-null.md output-dir.md output.md parallel-immediate.md parallel-max-host.md parallel-max.md parallel.md pass.md path-as-is.md pinnedpubkey.md post301.md post302.md post303.md preproxy.md progress-bar.md proto-default.md proto-redir.md proto.md proxy-anyauth.md proxy-basic.md proxy-ca-native.md proxy-cacert.md proxy-capath.md proxy-cert-type.md proxy-cert.md proxy-ciphers.md proxy-crlfile.md proxy-digest.md proxy-header.md proxy-http2.md proxy-insecure.md proxy-key-type.md proxy-key.md proxy-negotiate.md proxy-ntlm.md proxy-pass.md proxy-pinnedpubkey.md proxy-service-name.md proxy-ssl-allow-beast.md proxy-ssl-auto-client-cert.md proxy-tls13-ciphers.md proxy-tlsauthtype.md proxy-tlspassword.md proxy-tlsuser.md proxy-tlsv1.md proxy-user.md proxy.md proxy1.0.md proxytunnel.md pubkey.md quote.md random-file.md range.md rate.md raw.md referer.md remote-header-name.md remote-name-all.md remote-name.md remote-time.md remove-on-error.md request-target.md request.md resolve.md retry-all-errors.md retry-connrefused.md retry-delay.md retry-max-time.md retry.md sasl-authzid.md sasl-ir.md service-name.md show-error.md show-headers.md sigalgs.md silent.md skip-existing.md socks4.md socks4a.md socks5-basic.md socks5-gssapi-nec.md socks5-gssapi-service.md socks5-gssapi.md socks5-hostname.md socks5.md speed-limit.md speed-time.md ssl-allow-beast.md ssl-auto-client-cert.md ssl-no-revoke.md ssl-reqd.md ssl-revoke-best-effort.md ssl-sessions.md ssl.md sslv2.md sslv3.md stderr.md styled-output.md suppress-connect-headers.md tcp-fastopen.md tcp-nodelay.md telnet-option.md tftp-blksize.md tftp-no-options.md time-cond.md tls-earlydata.md tls-max.md tls13-ciphers.md tlsauthtype.md tlspassword.md tlsuser.md tlsv1.0.md tlsv1.1.md tlsv1.2.md tlsv1.3.md tlsv1.md tr-encoding.md trace-ascii.md trace-config.md trace-ids.md trace-time.md trace.md unix-socket.md upload-file.md upload-flags.md url-query.md url.md use-ascii.md user-agent.md user.md variable.md verbose.md version.md vlan-priority.md write-out.md xattr.mdexamples
.checksrc .gitignore 10-at-a-time.c CMakeLists.txt Makefile.am Makefile.example Makefile.inc README.md adddocsref.pl address-scope.c altsvc.c anyauthput.c block_ip.c cacertinmem.c certinfo.c chkspeed.c connect-to.c cookie_interface.c crawler.c debug.c default-scheme.c ephiperfifo.c evhiperfifo.c externalsocket.c fileupload.c ftp-delete.c ftp-wildcard.c ftpget.c ftpgetinfo.c ftpgetresp.c ftpsget.c ftpupload.c ftpuploadfrommem.c ftpuploadresume.c getinfo.c getinmemory.c getredirect.c getreferrer.c ghiper.c headerapi.c hiperfifo.c hsts-preload.c htmltidy.c htmltitle.cpp http-options.c http-post.c http2-download.c http2-pushinmemory.c http2-serverpush.c http2-upload.c http3-present.c http3.c httpcustomheader.c httpput-postfields.c httpput.c https.c imap-append.c imap-authzid.c imap-copy.c imap-create.c imap-delete.c imap-examine.c imap-fetch.c imap-list.c imap-lsub.c imap-multi.c imap-noop.c imap-search.c imap-ssl.c imap-store.c imap-tls.c interface.c ipv6.c keepalive.c localport.c log_failed_transfers.c maxconnects.c multi-app.c multi-debugcallback.c multi-double.c multi-event.c multi-formadd.c multi-legacy.c multi-post.c multi-single.c multi-uv.c netrc.c parseurl.c persistent.c pop3-authzid.c pop3-dele.c pop3-list.c pop3-multi.c pop3-noop.c pop3-retr.c pop3-ssl.c pop3-stat.c pop3-tls.c pop3-top.c pop3-uidl.c post-callback.c postinmemory.c postit2-formadd.c postit2.c progressfunc.c protofeats.c range.c resolve.c rtsp-options.c sendrecv.c sepheaders.c sessioninfo.c sftpget.c sftpuploadresume.c shared-connection-cache.c simple.c simplepost.c simplessl.c smooth-gtk-thread.c smtp-authzid.c smtp-expn.c smtp-mail.c smtp-mime.c smtp-multi.c smtp-ssl.c smtp-tls.c smtp-vrfy.c sslbackend.c synctime.c threaded.c unixsocket.c url2file.c urlapi.c usercertinmem.c version-check.pl websocket-cb.c websocket-updown.c websocket.c xmlstream.cinternals
BUFQ.md BUFREF.md CHECKSRC.md CLIENT-READERS.md CLIENT-WRITERS.md CODE_STYLE.md CONNECTION-FILTERS.md CREDENTIALS.md CURLX.md DYNBUF.md HASH.md LLIST.md MID.md MQTT.md MULTI-EV.md NEW-PROTOCOL.md PEERS.md PORTING.md RATELIMITS.md README.md SCORECARD.md SPLAY.md STRPARSE.md THRDPOOL-AND-QUEUE.md TIME-KEEPING.md TLS-SESSIONS.md UINT_SETS.md WEBSOCKET.mdlibcurl
opts
CMakeLists.txt CURLINFO_ACTIVESOCKET.md CURLINFO_APPCONNECT_TIME.md CURLINFO_APPCONNECT_TIME_T.md CURLINFO_CAINFO.md CURLINFO_CAPATH.md CURLINFO_CERTINFO.md CURLINFO_CONDITION_UNMET.md CURLINFO_CONNECT_TIME.md CURLINFO_CONNECT_TIME_T.md CURLINFO_CONN_ID.md CURLINFO_CONTENT_LENGTH_DOWNLOAD.md CURLINFO_CONTENT_LENGTH_DOWNLOAD_T.md CURLINFO_CONTENT_LENGTH_UPLOAD.md CURLINFO_CONTENT_LENGTH_UPLOAD_T.md CURLINFO_CONTENT_TYPE.md CURLINFO_COOKIELIST.md CURLINFO_EARLYDATA_SENT_T.md CURLINFO_EFFECTIVE_METHOD.md CURLINFO_EFFECTIVE_URL.md CURLINFO_FILETIME.md CURLINFO_FILETIME_T.md CURLINFO_FTP_ENTRY_PATH.md CURLINFO_HEADER_SIZE.md CURLINFO_HTTPAUTH_AVAIL.md CURLINFO_HTTPAUTH_USED.md CURLINFO_HTTP_CONNECTCODE.md CURLINFO_HTTP_VERSION.md CURLINFO_LASTSOCKET.md CURLINFO_LOCAL_IP.md CURLINFO_LOCAL_PORT.md CURLINFO_NAMELOOKUP_TIME.md CURLINFO_NAMELOOKUP_TIME_T.md CURLINFO_NUM_CONNECTS.md CURLINFO_OS_ERRNO.md CURLINFO_POSTTRANSFER_TIME_T.md CURLINFO_PRETRANSFER_TIME.md CURLINFO_PRETRANSFER_TIME_T.md CURLINFO_PRIMARY_IP.md CURLINFO_PRIMARY_PORT.md CURLINFO_PRIVATE.md CURLINFO_PROTOCOL.md CURLINFO_PROXYAUTH_AVAIL.md CURLINFO_PROXYAUTH_USED.md CURLINFO_PROXY_ERROR.md CURLINFO_PROXY_SSL_VERIFYRESULT.md CURLINFO_QUEUE_TIME_T.md CURLINFO_REDIRECT_COUNT.md CURLINFO_REDIRECT_TIME.md CURLINFO_REDIRECT_TIME_T.md CURLINFO_REDIRECT_URL.md CURLINFO_REFERER.md CURLINFO_REQUEST_SIZE.md CURLINFO_RESPONSE_CODE.md CURLINFO_RETRY_AFTER.md CURLINFO_RTSP_CLIENT_CSEQ.md CURLINFO_RTSP_CSEQ_RECV.md CURLINFO_RTSP_SERVER_CSEQ.md CURLINFO_RTSP_SESSION_ID.md CURLINFO_SCHEME.md CURLINFO_SIZE_DELIVERED.md CURLINFO_SIZE_DOWNLOAD.md CURLINFO_SIZE_DOWNLOAD_T.md CURLINFO_SIZE_UPLOAD.md CURLINFO_SIZE_UPLOAD_T.md CURLINFO_SPEED_DOWNLOAD.md CURLINFO_SPEED_DOWNLOAD_T.md CURLINFO_SPEED_UPLOAD.md CURLINFO_SPEED_UPLOAD_T.md CURLINFO_SSL_ENGINES.md CURLINFO_SSL_VERIFYRESULT.md CURLINFO_STARTTRANSFER_TIME.md CURLINFO_STARTTRANSFER_TIME_T.md CURLINFO_TLS_SESSION.md CURLINFO_TLS_SSL_PTR.md CURLINFO_TOTAL_TIME.md CURLINFO_TOTAL_TIME_T.md CURLINFO_USED_PROXY.md CURLINFO_XFER_ID.md CURLMINFO_XFERS_ADDED.md CURLMINFO_XFERS_CURRENT.md CURLMINFO_XFERS_DONE.md CURLMINFO_XFERS_PENDING.md CURLMINFO_XFERS_RUNNING.md CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE.md CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE.md CURLMOPT_MAXCONNECTS.md CURLMOPT_MAX_CONCURRENT_STREAMS.md CURLMOPT_MAX_HOST_CONNECTIONS.md CURLMOPT_MAX_PIPELINE_LENGTH.md CURLMOPT_MAX_TOTAL_CONNECTIONS.md CURLMOPT_NETWORK_CHANGED.md CURLMOPT_NOTIFYDATA.md CURLMOPT_NOTIFYFUNCTION.md CURLMOPT_PIPELINING.md CURLMOPT_PIPELINING_SERVER_BL.md CURLMOPT_PIPELINING_SITE_BL.md CURLMOPT_PUSHDATA.md CURLMOPT_PUSHFUNCTION.md CURLMOPT_QUICK_EXIT.md CURLMOPT_RESOLVE_THREADS_MAX.md CURLMOPT_SOCKETDATA.md CURLMOPT_SOCKETFUNCTION.md CURLMOPT_TIMERDATA.md CURLMOPT_TIMERFUNCTION.md CURLOPT_ABSTRACT_UNIX_SOCKET.md CURLOPT_ACCEPTTIMEOUT_MS.md CURLOPT_ACCEPT_ENCODING.md CURLOPT_ADDRESS_SCOPE.md CURLOPT_ALTSVC.md CURLOPT_ALTSVC_CTRL.md CURLOPT_APPEND.md CURLOPT_AUTOREFERER.md CURLOPT_AWS_SIGV4.md CURLOPT_BUFFERSIZE.md CURLOPT_CAINFO.md CURLOPT_CAINFO_BLOB.md CURLOPT_CAPATH.md CURLOPT_CA_CACHE_TIMEOUT.md CURLOPT_CERTINFO.md CURLOPT_CHUNK_BGN_FUNCTION.md CURLOPT_CHUNK_DATA.md CURLOPT_CHUNK_END_FUNCTION.md CURLOPT_CLOSESOCKETDATA.md CURLOPT_CLOSESOCKETFUNCTION.md CURLOPT_CONNECTTIMEOUT.md CURLOPT_CONNECTTIMEOUT_MS.md CURLOPT_CONNECT_ONLY.md CURLOPT_CONNECT_TO.md CURLOPT_CONV_FROM_NETWORK_FUNCTION.md CURLOPT_CONV_FROM_UTF8_FUNCTION.md CURLOPT_CONV_TO_NETWORK_FUNCTION.md CURLOPT_COOKIE.md CURLOPT_COOKIEFILE.md CURLOPT_COOKIEJAR.md CURLOPT_COOKIELIST.md CURLOPT_COOKIESESSION.md CURLOPT_COPYPOSTFIELDS.md CURLOPT_CRLF.md CURLOPT_CRLFILE.md CURLOPT_CURLU.md CURLOPT_CUSTOMREQUEST.md CURLOPT_DEBUGDATA.md CURLOPT_DEBUGFUNCTION.md CURLOPT_DEFAULT_PROTOCOL.md CURLOPT_DIRLISTONLY.md CURLOPT_DISALLOW_USERNAME_IN_URL.md CURLOPT_DNS_CACHE_TIMEOUT.md CURLOPT_DNS_INTERFACE.md CURLOPT_DNS_LOCAL_IP4.md CURLOPT_DNS_LOCAL_IP6.md CURLOPT_DNS_SERVERS.md CURLOPT_DNS_SHUFFLE_ADDRESSES.md CURLOPT_DNS_USE_GLOBAL_CACHE.md CURLOPT_DOH_SSL_VERIFYHOST.md CURLOPT_DOH_SSL_VERIFYPEER.md CURLOPT_DOH_SSL_VERIFYSTATUS.md CURLOPT_DOH_URL.md CURLOPT_ECH.md CURLOPT_EGDSOCKET.md CURLOPT_ERRORBUFFER.md CURLOPT_EXPECT_100_TIMEOUT_MS.md CURLOPT_FAILONERROR.md CURLOPT_FILETIME.md CURLOPT_FNMATCH_DATA.md CURLOPT_FNMATCH_FUNCTION.md CURLOPT_FOLLOWLOCATION.md CURLOPT_FORBID_REUSE.md CURLOPT_FRESH_CONNECT.md CURLOPT_FTPPORT.md CURLOPT_FTPSSLAUTH.md CURLOPT_FTP_ACCOUNT.md CURLOPT_FTP_ALTERNATIVE_TO_USER.md CURLOPT_FTP_CREATE_MISSING_DIRS.md CURLOPT_FTP_FILEMETHOD.md CURLOPT_FTP_SKIP_PASV_IP.md CURLOPT_FTP_SSL_CCC.md CURLOPT_FTP_USE_EPRT.md CURLOPT_FTP_USE_EPSV.md CURLOPT_FTP_USE_PRET.md CURLOPT_GSSAPI_DELEGATION.md CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS.md CURLOPT_HAPROXYPROTOCOL.md CURLOPT_HAPROXY_CLIENT_IP.md CURLOPT_HEADER.md CURLOPT_HEADERDATA.md CURLOPT_HEADERFUNCTION.md CURLOPT_HEADEROPT.md CURLOPT_HSTS.md CURLOPT_HSTSREADDATA.md CURLOPT_HSTSREADFUNCTION.md CURLOPT_HSTSWRITEDATA.md CURLOPT_HSTSWRITEFUNCTION.md CURLOPT_HSTS_CTRL.md CURLOPT_HTTP09_ALLOWED.md CURLOPT_HTTP200ALIASES.md CURLOPT_HTTPAUTH.md CURLOPT_HTTPGET.md CURLOPT_HTTPHEADER.md CURLOPT_HTTPPOST.md CURLOPT_HTTPPROXYTUNNEL.md CURLOPT_HTTP_CONTENT_DECODING.md CURLOPT_HTTP_TRANSFER_DECODING.md CURLOPT_HTTP_VERSION.md CURLOPT_IGNORE_CONTENT_LENGTH.md CURLOPT_INFILESIZE.md CURLOPT_INFILESIZE_LARGE.md CURLOPT_INTERFACE.md CURLOPT_INTERLEAVEDATA.md CURLOPT_INTERLEAVEFUNCTION.md CURLOPT_IOCTLDATA.md CURLOPT_IOCTLFUNCTION.md CURLOPT_IPRESOLVE.md CURLOPT_ISSUERCERT.md CURLOPT_ISSUERCERT_BLOB.md CURLOPT_KEEP_SENDING_ON_ERROR.md CURLOPT_KEYPASSWD.md CURLOPT_KRBLEVEL.md CURLOPT_LOCALPORT.md CURLOPT_LOCALPORTRANGE.md CURLOPT_LOGIN_OPTIONS.md CURLOPT_LOW_SPEED_LIMIT.md CURLOPT_LOW_SPEED_TIME.md CURLOPT_MAIL_AUTH.md CURLOPT_MAIL_FROM.md CURLOPT_MAIL_RCPT.md CURLOPT_MAIL_RCPT_ALLOWFAILS.md CURLOPT_MAXAGE_CONN.md CURLOPT_MAXCONNECTS.md CURLOPT_MAXFILESIZE.md CURLOPT_MAXFILESIZE_LARGE.md CURLOPT_MAXLIFETIME_CONN.md CURLOPT_MAXREDIRS.md CURLOPT_MAX_RECV_SPEED_LARGE.md CURLOPT_MAX_SEND_SPEED_LARGE.md CURLOPT_MIMEPOST.md CURLOPT_MIME_OPTIONS.md CURLOPT_NETRC.md CURLOPT_NETRC_FILE.md CURLOPT_NEW_DIRECTORY_PERMS.md CURLOPT_NEW_FILE_PERMS.md CURLOPT_NOBODY.md CURLOPT_NOPROGRESS.md CURLOPT_NOPROXY.md CURLOPT_NOSIGNAL.md CURLOPT_OPENSOCKETDATA.md CURLOPT_OPENSOCKETFUNCTION.md CURLOPT_PASSWORD.md CURLOPT_PATH_AS_IS.md CURLOPT_PINNEDPUBLICKEY.md CURLOPT_PIPEWAIT.md CURLOPT_PORT.md CURLOPT_POST.md CURLOPT_POSTFIELDS.md CURLOPT_POSTFIELDSIZE.md CURLOPT_POSTFIELDSIZE_LARGE.md CURLOPT_POSTQUOTE.md CURLOPT_POSTREDIR.md CURLOPT_PREQUOTE.md CURLOPT_PREREQDATA.md CURLOPT_PREREQFUNCTION.md CURLOPT_PRE_PROXY.md CURLOPT_PRIVATE.md CURLOPT_PROGRESSDATA.md CURLOPT_PROGRESSFUNCTION.md CURLOPT_PROTOCOLS.md CURLOPT_PROTOCOLS_STR.md CURLOPT_PROXY.md CURLOPT_PROXYAUTH.md CURLOPT_PROXYHEADER.md CURLOPT_PROXYPASSWORD.md CURLOPT_PROXYPORT.md CURLOPT_PROXYTYPE.md CURLOPT_PROXYUSERNAME.md CURLOPT_PROXYUSERPWD.md CURLOPT_PROXY_CAINFO.md CURLOPT_PROXY_CAINFO_BLOB.md CURLOPT_PROXY_CAPATH.md CURLOPT_PROXY_CRLFILE.md CURLOPT_PROXY_ISSUERCERT.md CURLOPT_PROXY_ISSUERCERT_BLOB.md CURLOPT_PROXY_KEYPASSWD.md CURLOPT_PROXY_PINNEDPUBLICKEY.md CURLOPT_PROXY_SERVICE_NAME.md CURLOPT_PROXY_SSLCERT.md CURLOPT_PROXY_SSLCERTTYPE.md CURLOPT_PROXY_SSLCERT_BLOB.md CURLOPT_PROXY_SSLKEY.md CURLOPT_PROXY_SSLKEYTYPE.md CURLOPT_PROXY_SSLKEY_BLOB.md CURLOPT_PROXY_SSLVERSION.md CURLOPT_PROXY_SSL_CIPHER_LIST.md CURLOPT_PROXY_SSL_OPTIONS.md CURLOPT_PROXY_SSL_VERIFYHOST.md CURLOPT_PROXY_SSL_VERIFYPEER.md CURLOPT_PROXY_TLS13_CIPHERS.md CURLOPT_PROXY_TLSAUTH_PASSWORD.md CURLOPT_PROXY_TLSAUTH_TYPE.md CURLOPT_PROXY_TLSAUTH_USERNAME.md CURLOPT_PROXY_TRANSFER_MODE.md CURLOPT_PUT.md CURLOPT_QUICK_EXIT.md CURLOPT_QUOTE.md CURLOPT_RANDOM_FILE.md CURLOPT_RANGE.md CURLOPT_READDATA.md CURLOPT_READFUNCTION.md CURLOPT_REDIR_PROTOCOLS.md CURLOPT_REDIR_PROTOCOLS_STR.md CURLOPT_REFERER.md CURLOPT_REQUEST_TARGET.md CURLOPT_RESOLVE.md CURLOPT_RESOLVER_START_DATA.md CURLOPT_RESOLVER_START_FUNCTION.md CURLOPT_RESUME_FROM.md CURLOPT_RESUME_FROM_LARGE.md CURLOPT_RTSP_CLIENT_CSEQ.md CURLOPT_RTSP_REQUEST.md CURLOPT_RTSP_SERVER_CSEQ.md CURLOPT_RTSP_SESSION_ID.md CURLOPT_RTSP_STREAM_URI.md CURLOPT_RTSP_TRANSPORT.md CURLOPT_SASL_AUTHZID.md CURLOPT_SASL_IR.md CURLOPT_SEEKDATA.md CURLOPT_SEEKFUNCTION.md CURLOPT_SERVER_RESPONSE_TIMEOUT.md CURLOPT_SERVER_RESPONSE_TIMEOUT_MS.md CURLOPT_SERVICE_NAME.md CURLOPT_SHARE.md CURLOPT_SOCKOPTDATA.md CURLOPT_SOCKOPTFUNCTION.md CURLOPT_SOCKS5_AUTH.md CURLOPT_SOCKS5_GSSAPI_NEC.md CURLOPT_SOCKS5_GSSAPI_SERVICE.md CURLOPT_SSH_AUTH_TYPES.md CURLOPT_SSH_COMPRESSION.md CURLOPT_SSH_HOSTKEYDATA.md CURLOPT_SSH_HOSTKEYFUNCTION.md CURLOPT_SSH_HOST_PUBLIC_KEY_MD5.md CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.md CURLOPT_SSH_KEYDATA.md CURLOPT_SSH_KEYFUNCTION.md CURLOPT_SSH_KNOWNHOSTS.md CURLOPT_SSH_PRIVATE_KEYFILE.md CURLOPT_SSH_PUBLIC_KEYFILE.md CURLOPT_SSLCERT.md CURLOPT_SSLCERTTYPE.md CURLOPT_SSLCERT_BLOB.md CURLOPT_SSLENGINE.md CURLOPT_SSLENGINE_DEFAULT.md CURLOPT_SSLKEY.md CURLOPT_SSLKEYTYPE.md CURLOPT_SSLKEY_BLOB.md CURLOPT_SSLVERSION.md CURLOPT_SSL_CIPHER_LIST.md CURLOPT_SSL_CTX_DATA.md CURLOPT_SSL_CTX_FUNCTION.md CURLOPT_SSL_EC_CURVES.md CURLOPT_SSL_ENABLE_ALPN.md CURLOPT_SSL_ENABLE_NPN.md CURLOPT_SSL_FALSESTART.md CURLOPT_SSL_OPTIONS.md CURLOPT_SSL_SESSIONID_CACHE.md CURLOPT_SSL_SIGNATURE_ALGORITHMS.md CURLOPT_SSL_VERIFYHOST.md CURLOPT_SSL_VERIFYPEER.md CURLOPT_SSL_VERIFYSTATUS.md CURLOPT_STDERR.md CURLOPT_STREAM_DEPENDS.md CURLOPT_STREAM_DEPENDS_E.md CURLOPT_STREAM_WEIGHT.md CURLOPT_SUPPRESS_CONNECT_HEADERS.md CURLOPT_TCP_FASTOPEN.md CURLOPT_TCP_KEEPALIVE.md CURLOPT_TCP_KEEPCNT.md CURLOPT_TCP_KEEPIDLE.md CURLOPT_TCP_KEEPINTVL.md CURLOPT_TCP_NODELAY.md CURLOPT_TELNETOPTIONS.md CURLOPT_TFTP_BLKSIZE.md CURLOPT_TFTP_NO_OPTIONS.md CURLOPT_TIMECONDITION.md CURLOPT_TIMEOUT.md CURLOPT_TIMEOUT_MS.md CURLOPT_TIMEVALUE.md CURLOPT_TIMEVALUE_LARGE.md CURLOPT_TLS13_CIPHERS.md CURLOPT_TLSAUTH_PASSWORD.md CURLOPT_TLSAUTH_TYPE.md CURLOPT_TLSAUTH_USERNAME.md CURLOPT_TRAILERDATA.md CURLOPT_TRAILERFUNCTION.md CURLOPT_TRANSFERTEXT.md CURLOPT_TRANSFER_ENCODING.md CURLOPT_UNIX_SOCKET_PATH.md CURLOPT_UNRESTRICTED_AUTH.md CURLOPT_UPKEEP_INTERVAL_MS.md CURLOPT_UPLOAD.md CURLOPT_UPLOAD_BUFFERSIZE.md CURLOPT_UPLOAD_FLAGS.md CURLOPT_URL.md CURLOPT_USERAGENT.md CURLOPT_USERNAME.md CURLOPT_USERPWD.md CURLOPT_USE_SSL.md CURLOPT_VERBOSE.md CURLOPT_WILDCARDMATCH.md CURLOPT_WRITEDATA.md CURLOPT_WRITEFUNCTION.md CURLOPT_WS_OPTIONS.md CURLOPT_XFERINFODATA.md CURLOPT_XFERINFOFUNCTION.md CURLOPT_XOAUTH2_BEARER.md CURLSHOPT_LOCKFUNC.md CURLSHOPT_SHARE.md CURLSHOPT_UNLOCKFUNC.md CURLSHOPT_UNSHARE.md CURLSHOPT_USERDATA.md Makefile.am Makefile.incinclude
curl
Makefile.am curl.h curlver.h easy.h header.h mprintf.h multi.h options.h stdcheaders.h system.h typecheck-gcc.h urlapi.h websockets.hlib
curlx
base64.c base64.h basename.c basename.h dynbuf.c dynbuf.h fopen.c fopen.h inet_ntop.c inet_ntop.h inet_pton.c inet_pton.h multibyte.c multibyte.h nonblock.c nonblock.h snprintf.c snprintf.h strcopy.c strcopy.h strdup.c strdup.h strerr.c strerr.h strparse.c strparse.h timediff.c timediff.h timeval.c timeval.h version_win32.c version_win32.h wait.c wait.h warnless.c warnless.h winapi.c winapi.hvauth
cleartext.c cram.c digest.c digest.h digest_sspi.c gsasl.c krb5_gssapi.c krb5_sspi.c ntlm.c ntlm_sspi.c oauth2.c spnego_gssapi.c spnego_sspi.c vauth.c vauth.hvquic
curl_ngtcp2.c curl_ngtcp2.h curl_quiche.c curl_quiche.h vquic-tls.c vquic-tls.h vquic.c vquic.h vquic_int.hvtls
apple.c apple.h cipher_suite.c cipher_suite.h gtls.c gtls.h hostcheck.c hostcheck.h keylog.c keylog.h mbedtls.c mbedtls.h openssl.c openssl.h rustls.c rustls.h schannel.c schannel.h schannel_int.h schannel_verify.c vtls.c vtls.h vtls_int.h vtls_scache.c vtls_scache.h vtls_spack.c vtls_spack.h wolfssl.c wolfssl.h x509asn1.c x509asn1.hm4
.gitignore curl-amissl.m4 curl-apple-sectrust.m4 curl-compilers.m4 curl-confopts.m4 curl-functions.m4 curl-gnutls.m4 curl-mbedtls.m4 curl-openssl.m4 curl-override.m4 curl-reentrant.m4 curl-rustls.m4 curl-schannel.m4 curl-sysconfig.m4 curl-wolfssl.m4 xc-am-iface.m4 xc-cc-check.m4 xc-lt-iface.m4 xc-val-flgs.m4 zz40-xc-ovr.m4 zz50-xc-ovr.m4projects
OS400
.checksrc README.OS400 ccsidcurl.c ccsidcurl.h config400.default curl.cmd curl.inc.in curlcl.c curlmain.c initscript.sh make-docs.sh make-include.sh make-lib.sh make-src.sh make-tests.sh makefile.sh os400sys.c os400sys.hWindows
tmpl
.gitattributes README.txt curl-all.sln curl.sln curl.vcxproj curl.vcxproj.filters libcurl.sln libcurl.vcxproj libcurl.vcxproj.filtersvms
Makefile.am backup_gnv_curl_src.com build_curl-config_script.com build_gnv_curl.com build_gnv_curl_pcsi_desc.com build_gnv_curl_pcsi_text.com build_gnv_curl_release_notes.com build_libcurl_pc.com build_vms.com clean_gnv_curl.com compare_curl_source.com config_h.com curl_crtl_init.c curl_gnv_build_steps.txt curl_release_note_start.txt curl_startup.com curlmsg.h curlmsg.msg curlmsg.sdl curlmsg_vms.h generate_config_vms_h_curl.com generate_vax_transfer.com gnv_conftest.c_first gnv_curl_configure.sh gnv_libcurl_symbols.opt gnv_link_curl.com macro32_exactcase.patch make_gnv_curl_install.sh make_pcsi_curl_kit_name.com pcsi_gnv_curl_file_list.txt pcsi_product_gnv_curl.com readme report_openssl_version.c setup_gnv_curl_build.com stage_curl_install.com vms_eco_level.hscripts
.checksrc CMakeLists.txt Makefile.am badwords badwords-all badwords.txt cd2cd cd2nroff cdall checksrc-all.pl checksrc.pl cmakelint.sh completion.pl contributors.sh contrithanks.sh coverage.sh delta dmaketgz extract-unit-protos firefox-db2pem.sh installcheck.sh maketgz managen mdlinkcheck mk-ca-bundle.pl mk-unity.pl nroff2cd perlcheck.sh pythonlint.sh randdisable release-notes.pl release-tools.sh schemetable.c singleuse.pl spacecheck.pl top-complexity top-length verify-release wcurlsrc
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc config2setopts.c config2setopts.h curl.rc curlinfo.c mk-file-embed.pl mkhelp.pl slist_wc.c slist_wc.h terminal.c terminal.h tool_cb_dbg.c tool_cb_dbg.h tool_cb_hdr.c tool_cb_hdr.h tool_cb_prg.c tool_cb_prg.h tool_cb_rea.c tool_cb_rea.h tool_cb_see.c tool_cb_see.h tool_cb_soc.c tool_cb_soc.h tool_cb_wrt.c tool_cb_wrt.h tool_cfgable.c tool_cfgable.h tool_dirhie.c tool_dirhie.h tool_doswin.c tool_doswin.h tool_easysrc.c tool_easysrc.h tool_filetime.c tool_filetime.h tool_findfile.c tool_findfile.h tool_formparse.c tool_formparse.h tool_getparam.c tool_getparam.h tool_getpass.c tool_getpass.h tool_help.c tool_help.h tool_helpers.c tool_helpers.h tool_hugehelp.h tool_ipfs.c tool_ipfs.h tool_libinfo.c tool_libinfo.h tool_listhelp.c tool_main.c tool_main.h tool_msgs.c tool_msgs.h tool_operate.c tool_operate.h tool_operhlp.c tool_operhlp.h tool_paramhlp.c tool_paramhlp.h tool_parsecfg.c tool_parsecfg.h tool_progress.c tool_progress.h tool_sdecls.h tool_setopt.c tool_setopt.h tool_setup.h tool_ssls.c tool_ssls.h tool_stderr.c tool_stderr.h tool_urlglob.c tool_urlglob.h tool_util.c tool_util.h tool_version.h tool_vms.c tool_vms.h tool_writeout.c tool_writeout.h tool_writeout_json.c tool_writeout_json.h tool_xattr.c tool_xattr.h var.c var.htests
certs
.gitignore CMakeLists.txt Makefile.am Makefile.inc genserv.pl srp-verifier-conf srp-verifier-db test-ca.cnf test-ca.prm test-client-cert.prm test-client-eku-only.prm test-localhost-san-first.prm test-localhost-san-last.prm test-localhost.nn.prm test-localhost.prm test-localhost0h.prmdata
.gitignore DISABLED Makefile.am data-xml1 data1400.c data1401.c data1402.c data1403.c data1404.c data1405.c data1406.c data1407.c data1420.c data1461.txt data1463.txt data1465.c data1481.c data1705-1.md data1705-2.md data1705-3.md data1705-4.md data1705-stdout.1 data1706-1.md data1706-2.md data1706-3.md data1706-4.md data1706-stdout.txt data320.html test1 test10 test100 test1000 test1001 test1002 test1003 test1004 test1005 test1006 test1007 test1008 test1009 test101 test1010 test1011 test1012 test1013 test1014 test1015 test1016 test1017 test1018 test1019 test102 test1020 test1021 test1022 test1023 test1024 test1025 test1026 test1027 test1028 test1029 test103 test1030 test1031 test1032 test1033 test1034 test1035 test1036 test1037 test1038 test1039 test104 test1040 test1041 test1042 test1043 test1044 test1045 test1046 test1047 test1048 test1049 test105 test1050 test1051 test1052 test1053 test1054 test1055 test1056 test1057 test1058 test1059 test106 test1060 test1061 test1062 test1063 test1064 test1065 test1066 test1067 test1068 test1069 test107 test1070 test1071 test1072 test1073 test1074 test1075 test1076 test1077 test1078 test1079 test108 test1080 test1081 test1082 test1083 test1084 test1085 test1086 test1087 test1088 test1089 test109 test1090 test1091 test1092 test1093 test1094 test1095 test1096 test1097 test1098 test1099 test11 test110 test1100 test1101 test1102 test1103 test1104 test1105 test1106 test1107 test1108 test1109 test111 test1110 test1111 test1112 test1113 test1114 test1115 test1116 test1117 test1118 test1119 test112 test1120 test1121 test1122 test1123 test1124 test1125 test1126 test1127 test1128 test1129 test113 test1130 test1131 test1132 test1133 test1134 test1135 test1136 test1137 test1138 test1139 test114 test1140 test1141 test1142 test1143 test1144 test1145 test1146 test1147 test1148 test1149 test115 test1150 test1151 test1152 test1153 test1154 test1155 test1156 test1157 test1158 test1159 test116 test1160 test1161 test1162 test1163 test1164 test1165 test1166 test1167 test1168 test1169 test117 test1170 test1171 test1172 test1173 test1174 test1175 test1176 test1177 test1178 test1179 test118 test1180 test1181 test1182 test1183 test1184 test1185 test1186 test1187 test1188 test1189 test119 test1190 test1191 test1192 test1193 test1194 test1195 test1196 test1197 test1198 test1199 test12 test120 test1200 test1201 test1202 test1203 test1204 test1205 test1206 test1207 test1208 test1209 test121 test1210 test1211 test1212 test1213 test1214 test1215 test1216 test1217 test1218 test1219 test122 test1220 test1221 test1222 test1223 test1224 test1225 test1226 test1227 test1228 test1229 test123 test1230 test1231 test1232 test1233 test1234 test1235 test1236 test1237 test1238 test1239 test124 test1240 test1241 test1242 test1243 test1244 test1245 test1246 test1247 test1248 test1249 test125 test1250 test1251 test1252 test1253 test1254 test1255 test1256 test1257 test1258 test1259 test126 test1260 test1261 test1262 test1263 test1264 test1265 test1266 test1267 test1268 test1269 test127 test1270 test1271 test1272 test1273 test1274 test1275 test1276 test1277 test1278 test1279 test128 test1280 test1281 test1282 test1283 test1284 test1285 test1286 test1287 test1288 test1289 test129 test1290 test1291 test1292 test1293 test1294 test1295 test1296 test1297 test1298 test1299 test13 test130 test1300 test1301 test1302 test1303 test1304 test1305 test1306 test1307 test1308 test1309 test131 test1310 test1311 test1312 test1313 test1314 test1315 test1316 test1317 test1318 test1319 test132 test1320 test1321 test1322 test1323 test1324 test1325 test1326 test1327 test1328 test1329 test133 test1330 test1331 test1332 test1333 test1334 test1335 test1336 test1337 test1338 test1339 test134 test1340 test1341 test1342 test1343 test1344 test1345 test1346 test1347 test1348 test1349 test135 test1350 test1351 test1352 test1353 test1354 test1355 test1356 test1357 test1358 test1359 test136 test1360 test1361 test1362 test1363 test1364 test1365 test1366 test1367 test1368 test1369 test137 test1370 test1371 test1372 test1373 test1374 test1375 test1376 test1377 test1378 test1379 test138 test1380 test1381 test1382 test1383 test1384 test1385 test1386 test1387 test1388 test1389 test139 test1390 test1391 test1392 test1393 test1394 test1395 test1396 test1397 test1398 test1399 test14 test140 test1400 test1401 test1402 test1403 test1404 test1405 test1406 test1407 test1408 test1409 test141 test1410 test1411 test1412 test1413 test1414 test1415 test1416 test1417 test1418 test1419 test142 test1420 test1421 test1422 test1423 test1424 test1425 test1426 test1427 test1428 test1429 test143 test1430 test1431 test1432 test1433 test1434 test1435 test1436 test1437 test1438 test1439 test144 test1440 test1441 test1442 test1443 test1444 test1445 test1446 test1447 test1448 test1449 test145 test1450 test1451 test1452 test1453 test1454 test1455 test1456 test1457 test1458 test1459 test146 test1460 test1461 test1462 test1463 test1464 test1465 test1466 test1467 test1468 test1469 test147 test1470 test1471 test1472 test1473 test1474 test1475 test1476 test1477 test1478 test1479 test148 test1480 test1481 test1482 test1483 test1484 test1485 test1486 test1487 test1488 test1489 test149 test1490 test1491 test1492 test1493 test1494 test1495 test1496 test1497 test1498 test1499 test15 test150 test1500 test1501 test1502 test1503 test1504 test1505 test1506 test1507 test1508 test1509 test151 test1510 test1511 test1512 test1513 test1514 test1515 test1516 test1517 test1518 test1519 test152 test1520 test1521 test1522 test1523 test1524 test1525 test1526 test1527 test1528 test1529 test153 test1530 test1531 test1532 test1533 test1534 test1535 test1536 test1537 test1538 test1539 test154 test1540 test1541 test1542 test1543 test1544 test1545 test1546 test1547 test1548 test1549 test155 test1550 test1551 test1552 test1553 test1554 test1555 test1556 test1557 test1558 test1559 test156 test1560 test1561 test1562 test1563 test1564 test1565 test1566 test1567 test1568 test1569 test157 test1570 test1571 test1572 test1573 test1574 test1575 test1576 test1577 test1578 test1579 test158 test1580 test1581 test1582 test1583 test1584 test1585 test1586 test1587 test1588 test1589 test159 test1590 test1591 test1592 test1593 test1594 test1595 test1596 test1597 test1598 test1599 test16 test160 test1600 test1601 test1602 test1603 test1604 test1605 test1606 test1607 test1608 test1609 test161 test1610 test1611 test1612 test1613 test1614 test1615 test1616 test1617 test1618 test1619 test162 test1620 test1621 test1622 test1623 test1624 test1625 test1626 test1627 test1628 test1629 test163 test1630 test1631 test1632 test1633 test1634 test1635 test1636 test1637 test1638 test1639 test164 test1640 test1641 test1642 test1643 test1644 test1645 test165 test1650 test1651 test1652 test1653 test1654 test1655 test1656 test1657 test1658 test1659 test166 test1660 test1661 test1662 test1663 test1664 test1665 test1666 test1667 test1668 test1669 test167 test1670 test1671 test1672 test1673 test1674 test1675 test1676 test168 test1680 test1681 test1682 test1683 test1684 test1685 test169 test17 test170 test1700 test1701 test1702 test1703 test1704 test1705 test1706 test1707 test1708 test1709 test171 test1710 test1711 test1712 test1713 test1714 test1715 test172 test1720 test1721 test173 test174 test175 test176 test177 test178 test179 test18 test180 test1800 test1801 test1802 test181 test182 test183 test184 test1847 test1848 test1849 test185 test1850 test1851 test186 test187 test188 test189 test19 test190 test1900 test1901 test1902 test1903 test1904 test1905 test1906 test1907 test1908 test1909 test191 test1910 test1911 test1912 test1913 test1914 test1915 test1916 test1917 test1918 test1919 test192 test1920 test1921 test193 test1933 test1934 test1935 test1936 test1937 test1938 test1939 test194 test1940 test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 test195 test1955 test1956 test1957 test1958 test1959 test196 test1960 test1964 test1965 test1966 test197 test1970 test1971 test1972 test1973 test1974 test1975 test1976 test1977 test1978 test1979 test198 test1980 test1981 test1982 test1983 test1984 test199 test2 test20 test200 test2000 test2001 test2002 test2003 test2004 test2005 test2006 test2007 test2008 test2009 test201 test2010 test2011 test2012 test2013 test2014 test202 test2023 test2024 test2025 test2026 test2027 test2028 test2029 test203 test2030 test2031 test2032 test2033 test2034 test2035 test2037 test2038 test2039 test204 test2040 test2041 test2042 test2043 test2044 test2045 test2046 test2047 test2048 test2049 test205 test2050 test2051 test2052 test2053 test2054 test2055 test2056 test2057 test2058 test2059 test206 test2060 test2061 test2062 test2063 test2064 test2065 test2066 test2067 test2068 test2069 test207 test2070 test2071 test2072 test2073 test2074 test2075 test2076 test2077 test2078 test2079 test208 test2080 test2081 test2082 test2083 test2084 test2085 test2086 test2087 test2088 test2089 test209 test2090 test2091 test2092 test21 test210 test2100 test2101 test2102 test2103 test2104 test211 test212 test213 test214 test215 test216 test217 test218 test219 test22 test220 test2200 test2201 test2202 test2203 test2204 test2205 test2206 test2207 test221 test222 test223 test224 test225 test226 test227 test228 test229 test23 test230 test2300 test2301 test2302 test2303 test2304 test2306 test2307 test2308 test2309 test231 test232 test233 test234 test235 test236 test237 test238 test239 test24 test240 test2400 test2401 test2402 test2403 test2404 test2405 test2406 test2407 test2408 test2409 test241 test2410 test2411 test242 test243 test244 test245 test246 test247 test248 test249 test25 test250 test2500 test2501 test2502 test2503 test2504 test2505 test2506 test251 test252 test253 test254 test255 test256 test257 test258 test259 test26 test260 test2600 test2601 test2602 test2603 test2604 test2605 test261 test262 test263 test264 test265 test266 test267 test268 test269 test27 test270 test2700 test2701 test2702 test2703 test2704 test2705 test2706 test2707 test2708 test2709 test271 test2710 test2711 test2712 test2713 test2714 test2715 test2716 test2717 test2718 test2719 test272 test2720 test2721 test2722 test2723 test273 test274 test275 test276 test277 test278 test279 test28 test280 test281 test282 test283 test284 test285 test286 test287 test288 test289 test29 test290 test291 test292 test293 test294 test295 test296 test297 test298 test299 test3 test30 test300 test3000 test3001 test3002 test3003 test3004 test3005 test3006 test3007 test3008 test3009 test301 test3010 test3011 test3012 test3013 test3014 test3015 test3016 test3017 test3018 test3019 test302 test3020 test3021 test3022 test3023 test3024 test3025 test3026 test3027 test3028 test3029 test303 test3030 test3031 test3032 test3033 test3034 test3035 test3036 test304 test305 test306 test307 test308 test309 test31 test310 test3100 test3101 test3102 test3103 test3104 test3105 test3106 test311 test312 test313 test314 test315 test316 test317 test318 test319 test32 test320 test3200 test3201 test3202 test3203 test3204 test3205 test3206 test3207 test3208 test3209 test321 test3210 test3211 test3212 test3213 test3214 test3215 test3216 test3217 test3218 test3219 test322 test3220 test323 test324 test325 test326 test327 test328 test329 test33 test330 test3300 test3301 test3302 test331 test332 test333 test334 test335 test336 test337 test338 test339 test34 test340 test341 test342 test343 test344 test345 test346 test347 test348 test349 test35 test350 test351 test352 test353 test354 test355 test356 test357 test358 test359 test36 test360 test361 test362 test363 test364 test365 test366 test367 test368 test369 test37 test370 test371 test372 test373 test374 test375 test376 test378 test379 test38 test380 test381 test383 test384 test385 test386 test387 test388 test389 test39 test390 test391 test392 test393 test394 test395 test396 test397 test398 test399 test4 test40 test400 test4000 test4001 test401 test402 test403 test404 test405 test406 test407 test408 test409 test41 test410 test411 test412 test413 test414 test415 test416 test417 test418 test419 test42 test420 test421 test422 test423 test424 test425 test426 test427 test428 test429 test43 test430 test431 test432 test433 test434 test435 test436 test437 test438 test439 test44 test440 test441 test442 test443 test444 test445 test446 test447 test448 test449 test45 test450 test451 test452 test453 test454 test455 test456 test457 test458 test459 test46 test460 test461 test462 test463 test467 test468 test469 test47 test470 test471 test472 test473 test474 test475 test476 test477 test478 test479 test48 test480 test481 test482 test483 test484 test485 test486 test487 test488 test489 test49 test490 test491 test492 test493 test494 test495 test496 test497 test498 test499 test5 test50 test500 test501 test502 test503 test504 test505 test506 test507 test508 test509 test51 test510 test511 test512 test513 test514 test515 test516 test517 test518 test519 test52 test520 test521 test522 test523 test524 test525 test526 test527 test528 test529 test53 test530 test531 test532 test533 test534 test535 test536 test537 test538 test539 test54 test540 test541 test542 test543 test544 test545 test546 test547 test548 test549 test55 test550 test551 test552 test553 test554 test555 test556 test557 test558 test559 test56 test560 test561 test562 test563 test564 test565 test566 test567 test568 test569 test57 test570 test571 test572 test573 test574 test575 test576 test577 test578 test579 test58 test580 test581 test582 test583 test584 test585 test586 test587 test588 test589 test59 test590 test591 test592 test593 test594 test595 test596 test597 test598 test599 test6 test60 test600 test601 test602 test603 test604 test605 test606 test607 test608 test609 test61 test610 test611 test612 test613 test614 test615 test616 test617 test618 test619 test62 test620 test621 test622 test623 test624 test625 test626 test627 test628 test629 test63 test630 test631 test632 test633 test634 test635 test636 test637 test638 test639 test64 test640 test641 test642 test643 test644 test645 test646 test647 test648 test649 test65 test650 test651 test652 test653 test654 test655 test656 test658 test659 test66 test660 test661 test662 test663 test664 test665 test666 test667 test668 test669 test67 test670 test671 test672 test673 test674 test675 test676 test677 test678 test679 test68 test680 test681 test682 test683 test684 test685 test686 test687 test688 test689 test69 test690 test691 test692 test693 test694 test695 test696 test697 test698 test699 test7 test70 test700 test701 test702 test703 test704 test705 test706 test707 test708 test709 test71 test710 test711 test712 test713 test714 test715 test716 test717 test718 test719 test72 test720 test721 test722 test723 test724 test725 test726 test727 test728 test729 test73 test730 test731 test732 test733 test734 test735 test736 test737 test738 test739 test74 test740 test741 test742 test743 test744 test745 test746 test747 test748 test749 test75 test750 test751 test752 test753 test754 test755 test756 test757 test758 test759 test76 test760 test761 test762 test763 test764 test765 test766 test767 test768 test769 test77 test770 test771 test772 test773 test774 test775 test776 test777 test778 test779 test78 test780 test781 test782 test783 test784 test785 test786 test787 test788 test789 test79 test790 test791 test792 test793 test794 test795 test796 test797 test798 test799 test8 test80 test800 test801 test802 test803 test804 test805 test806 test807 test808 test809 test81 test810 test811 test812 test813 test814 test815 test816 test817 test818 test819 test82 test820 test821 test822 test823 test824 test825 test826 test827 test828 test829 test83 test830 test831 test832 test833 test834 test835 test836 test837 test838 test839 test84 test840 test841 test842 test843 test844 test845 test846 test847 test848 test849 test85 test850 test851 test852 test853 test854 test855 test856 test857 test858 test859 test86 test860 test861 test862 test863 test864 test865 test866 test867 test868 test869 test87 test870 test871 test872 test873 test874 test875 test876 test877 test878 test879 test88 test880 test881 test882 test883 test884 test885 test886 test887 test888 test889 test89 test890 test891 test892 test893 test894 test895 test896 test897 test898 test899 test9 test90 test900 test901 test902 test903 test904 test905 test906 test907 test908 test909 test91 test910 test911 test912 test913 test914 test915 test916 test917 test918 test919 test92 test920 test921 test922 test923 test924 test925 test926 test927 test928 test929 test93 test930 test931 test932 test933 test934 test935 test936 test937 test938 test939 test94 test940 test941 test942 test943 test944 test945 test946 test947 test948 test949 test95 test950 test951 test952 test953 test954 test955 test956 test957 test958 test959 test96 test960 test961 test962 test963 test964 test965 test966 test967 test968 test969 test97 test970 test971 test972 test973 test974 test975 test976 test977 test978 test979 test98 test980 test981 test982 test983 test984 test985 test986 test987 test988 test989 test99 test990 test991 test992 test993 test994 test995 test996 test997 test998 test999http
testenv
__init__.py caddy.py certs.py client.py curl.py dante.py dnsd.py env.py httpd.py nghttpx.py ports.py sshd.py vsftpd.py ws_echo_server.pylibtest
.gitignore CMakeLists.txt Makefile.am Makefile.inc cli_ftp_upload.c cli_h2_pausing.c cli_h2_serverpush.c cli_h2_upgrade_extreme.c cli_hx_download.c cli_hx_upload.c cli_tls_session_reuse.c cli_upload_pausing.c cli_ws_data.c cli_ws_pingpong.c first.c first.h lib1156.c lib1301.c lib1308.c lib1485.c lib1500.c lib1501.c lib1502.c lib1506.c lib1507.c lib1508.c lib1509.c lib1510.c lib1511.c lib1512.c lib1513.c lib1514.c lib1515.c lib1517.c lib1518.c lib1520.c lib1522.c lib1523.c lib1525.c lib1526.c lib1527.c lib1528.c lib1529.c lib1530.c lib1531.c lib1532.c lib1533.c lib1534.c lib1535.c lib1536.c lib1537.c lib1538.c lib1540.c lib1541.c lib1542.c lib1545.c lib1549.c lib1550.c lib1551.c lib1552.c lib1553.c lib1554.c lib1555.c lib1556.c lib1557.c lib1558.c lib1559.c lib1560.c lib1564.c lib1565.c lib1567.c lib1568.c lib1569.c lib1571.c lib1576.c lib1582.c lib1587.c lib1588.c lib1589.c lib1591.c lib1592.c lib1593.c lib1594.c lib1597.c lib1598.c lib1599.c lib1662.c lib1900.c lib1901.c lib1902.c lib1903.c lib1905.c lib1906.c lib1907.c lib1908.c lib1910.c lib1911.c lib1912.c lib1913.c lib1915.c lib1916.c lib1918.c lib1919.c lib1920.c lib1921.c lib1933.c lib1934.c lib1935.c lib1936.c lib1937.c lib1938.c lib1939.c lib1940.c lib1945.c lib1947.c lib1948.c lib1955.c lib1956.c lib1957.c lib1958.c lib1959.c lib1960.c lib1964.c lib1965.c lib1970.c lib1971.c lib1972.c lib1973.c lib1974.c lib1975.c lib1977.c lib1978.c lib2023.c lib2032.c lib2082.c lib2301.c lib2302.c lib2304.c lib2306.c lib2308.c lib2309.c lib2402.c lib2404.c lib2405.c lib2502.c lib2504.c lib2505.c lib2506.c lib2700.c lib3010.c lib3025.c lib3026.c lib3027.c lib3033.c lib3034.c lib3100.c lib3101.c lib3102.c lib3103.c lib3104.c lib3105.c lib3207.c lib3208.c lib500.c lib501.c lib502.c lib503.c lib504.c lib505.c lib506.c lib507.c lib508.c lib509.c lib510.c lib511.c lib512.c lib513.c lib514.c lib515.c lib516.c lib517.c lib518.c lib519.c lib520.c lib521.c lib523.c lib524.c lib525.c lib526.c lib530.c lib533.c lib536.c lib537.c lib539.c lib540.c lib541.c lib542.c lib543.c lib544.c lib547.c lib549.c lib552.c lib553.c lib554.c lib555.c lib556.c lib557.c lib558.c lib559.c lib560.c lib562.c lib564.c lib566.c lib567.c lib568.c lib569.c lib570.c lib571.c lib572.c lib573.c lib574.c lib575.c lib576.c lib578.c lib579.c lib582.c lib583.c lib586.c lib589.c lib590.c lib591.c lib597.c lib598.c lib599.c lib643.c lib650.c lib651.c lib652.c lib653.c lib654.c lib655.c lib658.c lib659.c lib661.c lib666.c lib667.c lib668.c lib670.c lib674.c lib676.c lib677.c lib678.c lib694.c lib695.c lib751.c lib753.c lib757.c lib758.c lib766.c memptr.c mk-lib1521.pl test1013.pl test1022.pl test307.pl test610.pl test613.pl testtrace.c testtrace.h testutil.c testutil.h unitcheck.hserver
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc dnsd.c first.c first.h getpart.c mqttd.c resolve.c rtspd.c sockfilt.c socksd.c sws.c tftpd.c util.ctunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md tool1394.c tool1604.c tool1621.c tool1622.c tool1623.c tool1720.cunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md unit1300.c unit1302.c unit1303.c unit1304.c unit1305.c unit1307.c unit1309.c unit1323.c unit1330.c unit1395.c unit1396.c unit1397.c unit1398.c unit1399.c unit1600.c unit1601.c unit1602.c unit1603.c unit1605.c unit1606.c unit1607.c unit1608.c unit1609.c unit1610.c unit1611.c unit1612.c unit1614.c unit1615.c unit1616.c unit1620.c unit1625.c unit1626.c unit1627.c unit1636.c unit1650.c unit1651.c unit1652.c unit1653.c unit1654.c unit1655.c unit1656.c unit1657.c unit1658.c unit1660.c unit1661.c unit1663.c unit1664.c unit1666.c unit1667.c unit1668.c unit1669.c unit1674.c unit1675.c unit1676.c unit1979.c unit1980.c unit2600.c unit2601.c unit2602.c unit2603.c unit2604.c unit2605.c unit3200.c unit3205.c unit3211.c unit3212.c unit3213.c unit3214.c unit3216.c unit3219.c unit3300.c unit3301.c unit3302.cexamples
.env config.ini crypto_test.lua env_test.lua fs_example.lua http_server.lua https_test.lua ini_example.lua json.lua log.lua path_fs_example.lua process_example.lua request_download.lua request_test.lua run_all.lua sqlite_example.lua sqlite_http_template.lua stash_test.lua template_test.lua timer.lua websocket.luainiparser
example
iniexample.c iniwrite.c parse.c twisted-errors.ini twisted-genhuge.py twisted-ofkey.ini twisted-ofval.ini twisted.initest
CMakeLists.txt test_dictionary.c test_iniparser.c unity-config.yml unity_config.hjinjac
libjinjac
src
CMakeLists.txt ast.c ast.h block_statement.c block_statement.h buffer.c buffer.h buildin.c buildin.h common.h convert.c convert.h flex_decl.h jfunction.c jfunction.h jinja_expression.l jinja_expression.y jinjac_parse.c jinjac_parse.h jinjac_stream.c jinjac_stream.h jlist.c jlist.h jobject.c jobject.h parameter.c parameter.h str_obj.c str_obj.h trace.c trace.htest
.gitignore CMakeLists.txt autotest.rb test_01.expected test_01.jinja test_01b.expected test_01b.jinja test_01c.expected test_01c.jinja test_01d.expected test_01d.jinja test_02.expected test_02.jinja test_03.expected test_03.jinja test_04.expected test_04.jinja test_05.expected test_05.jinja test_06.expected test_06.jinja test_07.expected test_07.jinja test_08.expected test_08.jinja test_08b.expected test_08b.jinja test_09.expected test_09.jinja test_10.expected test_10.jinja test_11.expected test_11.jinja test_12.expected test_12.jinja test_13.expected test_13.jinja test_14.expected test_14.jinja test_15.expected test_15.jinja test_16.expected test_16.jinja test_17.expected test_17.jinja test_18.expected test_18.jinja test_18b.expected test_18b.jinja test_18c.expected test_18c.jinja test_19.expected test_19.jinja test_19b.expected test_19b.jinja test_19c.expected test_19c.jinja test_19d.expected test_19d.jinja test_19e.expected test_19e.jinja test_19f.expected test_19f.jinja test_20.expected test_20.jinja test_21.expected test_21.jinja test_22.expected test_22.jinja test_22a.expected test_22a.jinja test_22b.expected test_22b.jinja test_23.expected test_23.jinja test_24.expected test_24.jinjalibev
Changes LICENSE Makefile Makefile.am Makefile.in README Symbols.ev Symbols.event aclocal.m4 autogen.sh compile config.guess config.h config.h.in config.status config.sub configure configure.ac depcomp ev++.h ev.3 ev.c ev.h ev.pod ev_epoll.c ev_kqueue.c ev_poll.c ev_port.c ev_select.c ev_vars.h ev_win32.c ev_wrap.h event.c event.h install-sh libev.m4 libtool ltmain.sh missing mkinstalldirs stamp-h1luajit
doc
bluequad-print.css bluequad.css contact.html ext_buffer.html ext_c_api.html ext_ffi.html ext_ffi_api.html ext_ffi_semantics.html ext_ffi_tutorial.html ext_jit.html ext_profiler.html extensions.html install.html luajit.html running.htmldynasm
dasm_arm.h dasm_arm.lua dasm_arm64.h dasm_arm64.lua dasm_mips.h dasm_mips.lua dasm_mips64.lua dasm_ppc.h dasm_ppc.lua dasm_proto.h dasm_x64.lua dasm_x86.h dasm_x86.lua dynasm.luasrc
host
.gitignore README buildvm.c buildvm.h buildvm_asm.c buildvm_fold.c buildvm_lib.c buildvm_libbc.h buildvm_peobj.c genlibbc.lua genminilua.lua genversion.lua minilua.cjit
.gitignore bc.lua bcsave.lua dis_arm.lua dis_arm64.lua dis_arm64be.lua dis_mips.lua dis_mips64.lua dis_mips64el.lua dis_mips64r6.lua dis_mips64r6el.lua dis_mipsel.lua dis_ppc.lua dis_x64.lua dis_x86.lua dump.lua p.lua v.lua zone.luawolfssl
.github
workflows
ada.yml arduino.yml async-examples.yml async.yml atecc608-sim.yml bind.yml cmake-autoconf.yml cmake.yml codespell.yml coverity-scan-fixes.yml cryptocb-only.yml curl.yml cyrus-sasl.yml disable-pk-algs.yml docker-Espressif.yml docker-OpenWrt.yml emnet-nonblock.yml fil-c.yml freertos-mem-track.yml gencertbuf.yml grpc.yml haproxy.yml hostap-vm.yml intelasm-c-fallback.yml ipmitool.yml jwt-cpp.yml krb5.yml libspdm.yml libssh2.yml libvncserver.yml linuxkm.yml macos-apple-native-cert-validation.yml mbedtls.sh mbedtls.yml membrowse-comment.yml membrowse-onboard.yml membrowse-report.yml memcached.sh memcached.yml mono.yml mosquitto.yml msmtp.yml msys2.yml multi-arch.yml multi-compiler.yml net-snmp.yml nginx.yml no-malloc.yml no-tls.yml nss.sh nss.yml ntp.yml ocsp.yml openldap.yml openssh.yml openssl-ech.yml opensslcoexist.yml openvpn.yml os-check.yml packaging.yml pam-ipmi.yml pq-all.yml pr-commit-check.yml psk.yml puf.yml python.yml rng-tools.yml rust-wrapper.yml se050-sim.yml smallStackSize.yml socat.yml softhsm.yml sssd.yml stm32-sim.yml stsafe-a120-sim.yml stunnel.yml symbol-prefixes.yml threadx.yml tls-anvil.yml trackmemory.yml watcomc.yml win-csharp-test.yml wolfCrypt-Wconversion.yml wolfboot-integration.yml wolfsm.yml xcode.yml zephyr-4.x.yml zephyr.ymlIDE
ARDUINO
Arduino_README_prepend.md README.md include.am keywords.txt library.properties.template wolfssl-arduino.cpp wolfssl-arduino.sh wolfssl.hECLIPSE
Espressif
ESP-IDF
examples
template
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266wolfssl_benchmark
VisualGDB
wolfssl_benchmark_IDF_v4.4_ESP32.sln wolfssl_benchmark_IDF_v4.4_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32.sln wolfssl_benchmark_IDF_v5_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32C3.sln wolfssl_benchmark_IDF_v5_ESP32C3.vgdbproj wolfssl_benchmark_IDF_v5_ESP32S3.sln wolfssl_benchmark_IDF_v5_ESP32S3.vgdbprojwolfssl_client
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_client_ESP8266.vgdbprojwolfssl_server
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_server_ESP8266.vgdbprojwolfssl_test
VisualGDB
wolfssl_test-IDF_v5_ESP32.sln wolfssl_test-IDF_v5_ESP32.vgdbproj wolfssl_test-IDF_v5_ESP32C3.sln wolfssl_test-IDF_v5_ESP32C3.vgdbproj wolfssl_test-IDF_v5_ESP32C6.sln wolfssl_test-IDF_v5_ESP32C6.vgdbproj wolfssl_test_IDF_v5_ESP32S3.sln wolfssl_test_IDF_v5_ESP32S3.vgdbprojGCC-ARM
Makefile Makefile.bench Makefile.client Makefile.common Makefile.server Makefile.static Makefile.test README.md include.am linker.ld linker_fips.ldIAR-EWARM
embOS
SAMV71_XULT
embOS_SAMV71_XULT_user_settings
user_settings.h user_settings_simple_example.h user_settings_verbose_example.hembOS_wolfcrypt_benchmark_SAMV71_XULT
README_wolfcrypt_benchmark wolfcrypt_benchmark.ewd wolfcrypt_benchmark.ewpINTIME-RTOS
Makefile README.md include.am libwolfssl.c libwolfssl.vcxproj user_settings.h wolfExamples.c wolfExamples.h wolfExamples.sln wolfExamples.vcxproj wolfssl-lib.sln wolfssl-lib.vcxprojMQX
Makefile README-jp.md README.md client-tls.c include.am server-tls.c user_config.h user_settings.hMSVS-2019-AZSPHERE
wolfssl_new_azsphere
.gitignore CMakeLists.txt CMakeSettings.json app_manifest.json applibs_versions.h launch.vs.json main.cNETOS
Makefile.wolfcrypt.inc README.md include.am user_settings.h user_settings.h-cert2425 user_settings.h-cert3389 wolfssl_netos_custom.cPlatformIO
examples
wolfssl_benchmark
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_benchmark.code-workspaceROWLEY-CROSSWORKS-ARM
Kinetis_FlashPlacement.xml README.md arm_startup.c benchmark_main.c hw.h include.am kinetis_hw.c retarget.c test_main.c user_settings.h wolfssl.hzp wolfssl_ltc.hzpRenesas
e2studio
RA6M3
README.md README_APRA6M_en.md README_APRA6M_jp.md include.amRX72N
EnvisionKit
Simple
README_EN.md README_JP.mdwolfssl_demo
key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h wolfssl_tsip_unit_test.cSTM32Cube
README.md STM32_Benchmarks.md default_conf.ftl include.am main.c wolfssl_example.c wolfssl_example.hWIN
README.txt include.am test.vcxproj user_settings.h user_settings_dtls.h wolfssl-fips.sln wolfssl-fips.vcxprojWIN-SRTP-KDF-140-3
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojWIN10
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojXCODE
Benchmark
include.amXilinxSDK
README.md bench.sh combine.sh eclipse_formatter_profile.xml graph.sh include.am user_settings.h wolfssl_example.capple-universal
wolfssl-multiplatform
iotsafe
Makefile README.md ca-cert.c devices.c devices.h include.am main.c memory-tls.c startup.c target.ld user_settings.hmynewt
README.md apps.wolfcrypttest.pkg.yml crypto.wolfssl.pkg.yml crypto.wolfssl.syscfg.yml include.am setup.shcerts
1024
ca-cert.der ca-cert.pem ca-key.der ca-key.pem client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der dh1024.der dh1024.pem dsa-pub-1024.pem dsa1024.der dsa1024.pem include.am rsa1024.der server-cert.der server-cert.pem server-key.der server-key.pemcrl
extra-crls
ca-int-cert-revoked.pem claim-root.pem crl_critical_entry.pem crlnum_57oct.pem crlnum_64oct.pem general-server-crl.pem large_crlnum.pem large_crlnum2.pemdilithium
bench_dilithium_level2_key.der bench_dilithium_level3_key.der bench_dilithium_level5_key.der include.amecc
bp256r1-key.der bp256r1-key.pem ca-secp256k1-cert.pem ca-secp256k1-key.pem client-bp256r1-cert.der client-bp256r1-cert.pem client-secp256k1-cert.der client-secp256k1-cert.pem genecc.sh include.am secp256k1-key.der secp256k1-key.pem secp256k1-param.pem secp256k1-privkey.der secp256k1-privkey.pem server-bp256r1-cert.der server-bp256r1-cert.pem server-secp256k1-cert.der server-secp256k1-cert.pem server2-secp256k1-cert.der server2-secp256k1-cert.pem wolfssl.cnf wolfssl_384.cnfed25519
ca-ed25519-key.der ca-ed25519-key.pem ca-ed25519-priv.der ca-ed25519-priv.pem ca-ed25519.der ca-ed25519.pem client-ed25519-key.der client-ed25519-key.pem client-ed25519-priv.der client-ed25519-priv.pem client-ed25519.der client-ed25519.pem eddsa-ed25519.der eddsa-ed25519.pem gen-ed25519-certs.sh gen-ed25519-keys.sh gen-ed25519.sh include.am root-ed25519-key.der root-ed25519-key.pem root-ed25519-priv.der root-ed25519-priv.pem root-ed25519.der root-ed25519.pem server-ed25519-cert.pem server-ed25519-key.der server-ed25519-key.pem server-ed25519-priv.der server-ed25519-priv.pem server-ed25519.der server-ed25519.pemed448
ca-ed448-key.der ca-ed448-key.pem ca-ed448-priv.der ca-ed448-priv.pem ca-ed448.der ca-ed448.pem client-ed448-key.der client-ed448-key.pem client-ed448-priv.der client-ed448-priv.pem client-ed448.der client-ed448.pem gen-ed448-certs.sh gen-ed448-keys.sh include.am root-ed448-key.der root-ed448-key.pem root-ed448-priv.der root-ed448-priv.pem root-ed448.der root-ed448.pem server-ed448-cert.pem server-ed448-key.der server-ed448-key.pem server-ed448-priv.der server-ed448-priv.pem server-ed448.der server-ed448.pemexternal
DigiCertGlobalRootCA.pem README.txt ca-digicert-ev.pem ca-globalsign-root.pem ca-google-root.pem ca_collection.pem include.amintermediate
ca_false_intermediate
gentestcert.sh int_ca.key server.key test_ca.key test_ca.pem test_int_not_cacert.pem test_sign_bynoca_srv.pem wolfssl_base.conf wolfssl_srv.conflms
bc_hss_L2_H5_W8_root.der bc_hss_L3_H5_W4_root.der bc_lms_chain_ca.der bc_lms_chain_leaf.der bc_lms_native_bc_root.der bc_lms_sha256_h10_w8_root.der bc_lms_sha256_h5_w4_root.der include.ammldsa
README.txt include.am mldsa44-cert.der mldsa44-cert.pem mldsa44-key.pem mldsa44_bare-priv.der mldsa44_bare-seed.der mldsa44_oqskeypair.der mldsa44_priv-only.der mldsa44_pub-spki.der mldsa44_seed-only.der mldsa44_seed-priv.der mldsa65-cert.der mldsa65-cert.pem mldsa65-key.pem mldsa65_bare-priv.der mldsa65_bare-seed.der mldsa65_oqskeypair.der mldsa65_priv-only.der mldsa65_pub-spki.der mldsa65_seed-only.der mldsa65_seed-priv.der mldsa87-cert.der mldsa87-cert.pem mldsa87-key.pem mldsa87_bare-priv.der mldsa87_bare-seed.der mldsa87_oqskeypair.der mldsa87_priv-only.der mldsa87_pub-spki.der mldsa87_seed-only.der mldsa87_seed-priv.derocsp
imposter-root-ca-cert.der imposter-root-ca-cert.pem imposter-root-ca-key.der imposter-root-ca-key.pem include.am index-ca-and-intermediate-cas.txt index-ca-and-intermediate-cas.txt.attr index-intermediate1-ca-issued-certs.txt index-intermediate1-ca-issued-certs.txt.attr index-intermediate2-ca-issued-certs.txt index-intermediate2-ca-issued-certs.txt.attr index-intermediate3-ca-issued-certs.txt index-intermediate3-ca-issued-certs.txt.attr intermediate1-ca-cert.der intermediate1-ca-cert.pem intermediate1-ca-key.der intermediate1-ca-key.pem intermediate2-ca-cert.der intermediate2-ca-cert.pem intermediate2-ca-key.der intermediate2-ca-key.pem intermediate3-ca-cert.der intermediate3-ca-cert.pem intermediate3-ca-key.der intermediate3-ca-key.pem ocsp-responder-cert.der ocsp-responder-cert.pem ocsp-responder-key.der ocsp-responder-key.pem openssl.cnf renewcerts-for-test.sh renewcerts.sh root-ca-cert.der root-ca-cert.pem root-ca-crl.pem root-ca-key.der root-ca-key.pem server1-cert.der server1-cert.pem server1-chain-noroot.pem server1-key.der server1-key.pem server2-cert.der server2-cert.pem server2-key.der server2-key.pem server3-cert.der server3-cert.pem server3-key.der server3-key.pem server4-cert.der server4-cert.pem server4-key.der server4-key.pem server5-cert.der server5-cert.pem server5-key.der server5-key.pem test-leaf-response.der test-multi-response.der test-response-nointern.der test-response-rsapss.der test-response.derp521
ca-p521-key.der ca-p521-key.pem ca-p521-priv.der ca-p521-priv.pem ca-p521.der ca-p521.pem client-p521-key.der client-p521-key.pem client-p521-priv.der client-p521-priv.pem client-p521.der client-p521.pem gen-p521-certs.sh gen-p521-keys.sh include.am root-p521-key.der root-p521-key.pem root-p521-priv.der root-p521-priv.pem root-p521.der root-p521.pem server-p521-cert.pem server-p521-key.der server-p521-key.pem server-p521-priv.der server-p521-priv.pem server-p521.der server-p521.pemrpk
client-cert-rpk.der client-ecc-cert-rpk.der include.am server-cert-rpk.der server-ecc-cert-rpk.derrsapss
ca-3072-rsapss-key.der ca-3072-rsapss-key.pem ca-3072-rsapss-priv.der ca-3072-rsapss-priv.pem ca-3072-rsapss.der ca-3072-rsapss.pem ca-rsapss-key.der ca-rsapss-key.pem ca-rsapss-priv.der ca-rsapss-priv.pem ca-rsapss.der ca-rsapss.pem client-3072-rsapss-key.der client-3072-rsapss-key.pem client-3072-rsapss-priv.der client-3072-rsapss-priv.pem client-3072-rsapss.der client-3072-rsapss.pem client-rsapss-key.der client-rsapss-key.pem client-rsapss-priv.der client-rsapss-priv.pem client-rsapss.der client-rsapss.pem gen-rsapss-keys.sh include.am renew-rsapss-certs.sh root-3072-rsapss-key.der root-3072-rsapss-key.pem root-3072-rsapss-priv.der root-3072-rsapss-priv.pem root-3072-rsapss.der root-3072-rsapss.pem root-rsapss-key.der root-rsapss-key.pem root-rsapss-priv.der root-rsapss-priv.pem root-rsapss.der root-rsapss.pem server-3072-rsapss-cert.pem server-3072-rsapss-key.der server-3072-rsapss-key.pem server-3072-rsapss-priv.der server-3072-rsapss-priv.pem server-3072-rsapss.der server-3072-rsapss.pem server-mix-rsapss-cert.pem server-rsapss-cert.pem server-rsapss-key.der server-rsapss-key.pem server-rsapss-priv.der server-rsapss-priv.pem server-rsapss.der server-rsapss.pemslhdsa
bench_slhdsa_sha2_128f_key.der bench_slhdsa_sha2_128s_key.der bench_slhdsa_sha2_192f_key.der bench_slhdsa_sha2_192s_key.der bench_slhdsa_sha2_256f_key.der bench_slhdsa_sha2_256s_key.der bench_slhdsa_shake128f_key.der bench_slhdsa_shake128s_key.der bench_slhdsa_shake192f_key.der bench_slhdsa_shake192s_key.der bench_slhdsa_shake256f_key.der bench_slhdsa_shake256s_key.der client-mldsa44-priv.pem client-mldsa44-sha2.der client-mldsa44-sha2.pem client-mldsa44-shake.der client-mldsa44-shake.pem gen-slhdsa-mldsa-certs.sh include.am root-slhdsa-sha2-128s-priv.der root-slhdsa-sha2-128s-priv.pem root-slhdsa-sha2-128s.der root-slhdsa-sha2-128s.pem root-slhdsa-shake-128s-priv.der root-slhdsa-shake-128s-priv.pem root-slhdsa-shake-128s.der root-slhdsa-shake-128s.pem server-mldsa44-priv.pem server-mldsa44-sha2.der server-mldsa44-sha2.pem server-mldsa44-shake.der server-mldsa44-shake.pemsm2
ca-sm2-key.der ca-sm2-key.pem ca-sm2-priv.der ca-sm2-priv.pem ca-sm2.der ca-sm2.pem client-sm2-key.der client-sm2-key.pem client-sm2-priv.der client-sm2-priv.pem client-sm2.der client-sm2.pem fix_sm2_spki.py gen-sm2-certs.sh gen-sm2-keys.sh include.am root-sm2-key.der root-sm2-key.pem root-sm2-priv.der root-sm2-priv.pem root-sm2.der root-sm2.pem self-sm2-cert.pem self-sm2-key.pem self-sm2-priv.pem server-sm2-cert.der server-sm2-cert.pem server-sm2-key.der server-sm2-key.pem server-sm2-priv.der server-sm2-priv.pem server-sm2.der server-sm2.pemstatickeys
dh-ffdhe2048-params.pem dh-ffdhe2048-pub.der dh-ffdhe2048-pub.pem dh-ffdhe2048.der dh-ffdhe2048.pem ecc-secp256r1.der ecc-secp256r1.pem gen-static.sh include.am x25519-pub.der x25519-pub.pem x25519.der x25519.pemtest
catalog.txt cert-bad-neg-int.der cert-bad-oid.der cert-bad-utf8.der cert-ext-ia.cfg cert-ext-ia.der cert-ext-ia.pem cert-ext-joi.cfg cert-ext-joi.der cert-ext-joi.pem cert-ext-mnc.der cert-ext-multiple.cfg cert-ext-multiple.der cert-ext-multiple.pem cert-ext-nc-combined.der cert-ext-nc-combined.pem cert-ext-nc.cfg cert-ext-nc.der cert-ext-nc.pem cert-ext-ncdns.der cert-ext-ncdns.pem cert-ext-ncip.der cert-ext-ncip.pem cert-ext-ncmixed.der cert-ext-ncmulti.der cert-ext-ncmulti.pem cert-ext-ncrid.der cert-ext-ncrid.pem cert-ext-nct.cfg cert-ext-nct.der cert-ext-nct.pem cert-ext-ndir-exc.cfg cert-ext-ndir-exc.der cert-ext-ndir-exc.pem cert-ext-ndir.cfg cert-ext-ndir.der cert-ext-ndir.pem cert-ext-ns.der cert-over-max-altnames.cfg cert-over-max-altnames.der cert-over-max-altnames.pem cert-over-max-nc.cfg cert-over-max-nc.der cert-over-max-nc.pem client-ecc-cert-ski.hex cn-ip-literal.der cn-ip-wildcard.der crit-cert.pem crit-key.pem dh1024.der dh1024.pem dh512.der dh512.pem digsigku.pem encrypteddata.msg gen-badsig.sh gen-ext-certs.sh gen-testcerts.sh include.am kari-keyid-cms.msg ktri-keyid-cms.msg ossl-trusted-cert.pem server-badaltname.der server-badaltname.pem server-badaltnull.der server-badaltnull.pem server-badcn.der server-badcn.pem server-badcnnull.der server-badcnnull.pem server-cert-ecc-badsig.der server-cert-ecc-badsig.pem server-cert-rsa-badsig.der server-cert-rsa-badsig.pem server-duplicate-policy.pem server-garbage.der server-garbage.pem server-goodalt.der server-goodalt.pem server-goodaltwild.der server-goodaltwild.pem server-goodcn.der server-goodcn.pem server-goodcnwild.der server-goodcnwild.pem server-localhost.der server-localhost.pem smime-test-canon.p7s smime-test-multipart-badsig.p7s smime-test-multipart.p7s smime-test.p7stest-pathlen
assemble-chains.sh chainA-ICA1-key.pem chainA-ICA1-pathlen0.pem chainA-assembled.pem chainA-entity-key.pem chainA-entity.pem chainB-ICA1-key.pem chainB-ICA1-pathlen0.pem chainB-ICA2-key.pem chainB-ICA2-pathlen1.pem chainB-assembled.pem chainB-entity-key.pem chainB-entity.pem chainC-ICA1-key.pem chainC-ICA1-pathlen1.pem chainC-assembled.pem chainC-entity-key.pem chainC-entity.pem chainD-ICA1-key.pem chainD-ICA1-pathlen127.pem chainD-assembled.pem chainD-entity-key.pem chainD-entity.pem chainE-ICA1-key.pem chainE-ICA1-pathlen128.pem chainE-assembled.pem chainE-entity-key.pem chainE-entity.pem chainF-ICA1-key.pem chainF-ICA1-pathlen1.pem chainF-ICA2-key.pem chainF-ICA2-pathlen0.pem chainF-assembled.pem chainF-entity-key.pem chainF-entity.pem chainG-ICA1-key.pem chainG-ICA1-pathlen0.pem chainG-ICA2-key.pem chainG-ICA2-pathlen1.pem chainG-ICA3-key.pem chainG-ICA3-pathlen99.pem chainG-ICA4-key.pem chainG-ICA4-pathlen5.pem chainG-ICA5-key.pem chainG-ICA5-pathlen20.pem chainG-ICA6-key.pem chainG-ICA6-pathlen10.pem chainG-ICA7-key.pem chainG-ICA7-pathlen100.pem chainG-assembled.pem chainG-entity-key.pem chainG-entity.pem chainH-ICA1-key.pem chainH-ICA1-pathlen0.pem chainH-ICA2-key.pem chainH-ICA2-pathlen2.pem chainH-ICA3-key.pem chainH-ICA3-pathlen2.pem chainH-ICA4-key.pem chainH-ICA4-pathlen2.pem chainH-assembled.pem chainH-entity-key.pem chainH-entity.pem chainI-ICA1-key.pem chainI-ICA1-no_pathlen.pem chainI-ICA2-key.pem chainI-ICA2-no_pathlen.pem chainI-ICA3-key.pem chainI-ICA3-pathlen2.pem chainI-assembled.pem chainI-entity-key.pem chainI-entity.pem chainJ-ICA1-key.pem chainJ-ICA1-no_pathlen.pem chainJ-ICA2-key.pem chainJ-ICA2-no_pathlen.pem chainJ-ICA3-key.pem chainJ-ICA3-no_pathlen.pem chainJ-ICA4-key.pem chainJ-ICA4-pathlen2.pem chainJ-assembled.pem chainJ-entity-key.pem chainJ-entity.pem include.am refreshkeys.shtest-serial0
ee_normal.pem ee_serial0.pem generate_certs.sh include.am intermediate_serial0.pem root_serial0.pem root_serial0_key.pem selfsigned_nonca_serial0.pemxmss
bc_xmss_chain_ca.der bc_xmss_chain_leaf.der bc_xmss_sha2_10_256_root.der bc_xmss_sha2_16_256_root.der bc_xmssmt_sha2_20_2_256_root.der bc_xmssmt_sha2_20_4_256_root.der bc_xmssmt_sha2_40_8_256_root.der include.amcmake
Config.cmake.in README.md config.in functions.cmake include.am options.h.in wolfssl-config-version.cmake.in wolfssl-targets.cmake.indebian
changelog.in control.in copyright include.am libwolfssl-dev.install libwolfssl.install rules.indoc
dox_comments
header_files
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h puf.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wc_she.h wc_slhdsa.h wolfio.hheader_files-ja
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wolfio.hexamples
async
Makefile README.md async_client.c async_server.c async_tls.c async_tls.h include.am user_settings.hconfigs
README.md include.am user_settings_EBSnet.h user_settings_all.h user_settings_arduino.h user_settings_baremetal.h user_settings_ca.h user_settings_curve25519nonblock.h user_settings_dtls13.h user_settings_eccnonblock.h user_settings_espressif.h user_settings_fipsv2.h user_settings_fipsv5.h user_settings_min_ecc.h user_settings_openssl_compat.h user_settings_pkcs7.h user_settings_platformio.h user_settings_pq.h user_settings_rsa_only.h user_settings_stm32.h user_settings_template.h user_settings_tls12.h user_settings_tls13.h user_settings_wolfboot_keytools.h user_settings_wolfssh.h user_settings_wolftpm.hechoclient
echoclient.c echoclient.h echoclient.sln echoclient.vcproj echoclient.vcxproj include.am quitlinuxkm
Kbuild Makefile README.md get_thread_size.c include.am linuxkm-fips-hash-wrapper.sh linuxkm-fips-hash.c linuxkm_memory.c linuxkm_memory.h linuxkm_wc_port.h lkcapi_aes_glue.c lkcapi_dh_glue.c lkcapi_ecdh_glue.c lkcapi_ecdsa_glue.c lkcapi_glue.c lkcapi_rsa_glue.c lkcapi_sha_glue.c module_exports.c.template module_hooks.c pie_redirect_table.c wolfcrypt.lds x86_vector_register_glue.cm4
ax_add_am_macro.m4 ax_am_jobserver.m4 ax_am_macros.m4 ax_append_compile_flags.m4 ax_append_flag.m4 ax_append_link_flags.m4 ax_append_to_file.m4 ax_atomic.m4 ax_bsdkm.m4 ax_check_compile_flag.m4 ax_check_link_flag.m4 ax_compiler_version.m4 ax_count_cpus.m4 ax_create_generic_config.m4 ax_debug.m4 ax_file_escapes.m4 ax_harden_compiler_flags.m4 ax_linuxkm.m4 ax_print_to_file.m4 ax_pthread.m4 ax_require_defined.m4 ax_tls.m4 ax_vcs_checkout.m4 hexversion.m4 lib_socket_nsl.m4 visibility.m4mqx
wolfcrypt_benchmark
ReferencedRSESystems.xml wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfcrypt_test
ReferencedRSESystems.xml wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfssl_client
ReferencedRSESystems.xml wolfssl_client_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchscripts
aria-cmake-build-test.sh asn1_oid_sum.pl benchmark.test benchmark_compare.sh cleanup_testfiles.sh crl-gen-openssl.test crl-revoked.test dertoc.pl dtls.test dtlscid.test external.test google.test include.am makedistsmall.sh memtest.sh ocsp-responder-openssl-interop.test ocsp-stapling-with-ca-as-responder.test ocsp-stapling-with-wolfssl-responder.test ocsp-stapling.test ocsp-stapling2.test ocsp-stapling_tls13multi.test ocsp.test openssl.test openssl_srtp.test pem.test ping.test pkcallbacks.test psk.test resume.test rsapss.test sniffer-gen.sh sniffer-ipv6.pcap sniffer-static-rsa.pcap sniffer-testsuite.test sniffer-tls12-keylog.out sniffer-tls12-keylog.pcap sniffer-tls12-keylog.sslkeylog sniffer-tls13-dh-resume.pcap sniffer-tls13-dh.pcap sniffer-tls13-ecc-resume.pcap sniffer-tls13-ecc.pcap sniffer-tls13-hrr.pcap sniffer-tls13-keylog.out sniffer-tls13-keylog.pcap sniffer-tls13-keylog.sslkeylog sniffer-tls13-x25519-resume.pcap sniffer-tls13-x25519.pcap stm32l4-v4_0_1_build.sh tls13.test trusted_peer.test unit.test.in user_settings_asm.shsrc
bio.c conf.c crl.c dtls.c dtls13.c include.am internal.c keys.c ocsp.c pk.c pk_ec.c pk_rsa.c quic.c sniffer.c ssl.c ssl_api_cert.c ssl_api_crl_ocsp.c ssl_api_pk.c ssl_asn1.c ssl_bn.c ssl_certman.c ssl_crypto.c ssl_ech.c ssl_load.c ssl_misc.c ssl_p7p12.c ssl_sess.c ssl_sk.c tls.c tls13.c wolfio.c x509.c x509_str.ctests
api
api.h api_decl.h create_ocsp_test_blobs.py include.am test_aes.c test_aes.h test_arc4.c test_arc4.h test_ascon.c test_ascon.h test_ascon_kats.h test_asn.c test_asn.h test_blake2.c test_blake2.h test_camellia.c test_camellia.h test_certman.c test_certman.h test_chacha.c test_chacha.h test_chacha20_poly1305.c test_chacha20_poly1305.h test_cmac.c test_cmac.h test_curve25519.c test_curve25519.h test_curve448.c test_curve448.h test_des3.c test_des3.h test_dh.c test_dh.h test_digest.h test_dsa.c test_dsa.h test_dtls.c test_dtls.h test_ecc.c test_ecc.h test_ed25519.c test_ed25519.h test_ed448.c test_ed448.h test_evp.c test_evp.h test_evp_cipher.c test_evp_cipher.h test_evp_digest.c test_evp_digest.h test_evp_pkey.c test_evp_pkey.h test_hash.c test_hash.h test_hmac.c test_hmac.h test_md2.c test_md2.h test_md4.c test_md4.h test_md5.c test_md5.h test_mldsa.c test_mldsa.h test_mlkem.c test_mlkem.h test_ocsp.c test_ocsp.h test_ocsp_test_blobs.h test_ossl_asn1.c test_ossl_asn1.h test_ossl_bio.c test_ossl_bio.h test_ossl_bn.c test_ossl_bn.h test_ossl_cipher.c test_ossl_cipher.h test_ossl_dgst.c test_ossl_dgst.h test_ossl_dh.c test_ossl_dh.h test_ossl_dsa.c test_ossl_dsa.h test_ossl_ec.c test_ossl_ec.h test_ossl_ecx.c test_ossl_ecx.h test_ossl_mac.c test_ossl_mac.h test_ossl_obj.c test_ossl_obj.h test_ossl_p7p12.c test_ossl_p7p12.h test_ossl_pem.c test_ossl_pem.h test_ossl_rand.c test_ossl_rand.h test_ossl_rsa.c test_ossl_rsa.h test_ossl_sk.c test_ossl_sk.h test_ossl_x509.c test_ossl_x509.h test_ossl_x509_acert.c test_ossl_x509_acert.h test_ossl_x509_crypto.c test_ossl_x509_crypto.h test_ossl_x509_ext.c test_ossl_x509_ext.h test_ossl_x509_info.c test_ossl_x509_info.h test_ossl_x509_io.c test_ossl_x509_io.h test_ossl_x509_lu.c test_ossl_x509_lu.h test_ossl_x509_name.c test_ossl_x509_name.h test_ossl_x509_pk.c test_ossl_x509_pk.h test_ossl_x509_str.c test_ossl_x509_str.h test_ossl_x509_vp.c test_ossl_x509_vp.h test_pkcs12.c test_pkcs12.h test_pkcs7.c test_pkcs7.h test_poly1305.c test_poly1305.h test_random.c test_random.h test_rc2.c test_rc2.h test_ripemd.c test_ripemd.h test_rsa.c test_rsa.h test_sha.c test_sha.h test_sha256.c test_sha256.h test_sha3.c test_sha3.h test_sha512.c test_sha512.h test_she.c test_she.h test_signature.c test_signature.h test_slhdsa.c test_slhdsa.h test_sm2.c test_sm2.h test_sm3.c test_sm3.h test_sm4.c test_sm4.h test_tls.c test_tls.h test_tls13.c test_tls13.h test_tls_ext.c test_tls_ext.h test_wc_encrypt.c test_wc_encrypt.h test_wolfmath.c test_wolfmath.h test_x509.c test_x509.hwolfcrypt
benchmark
README.md benchmark-VS2022.sln benchmark-VS2022.vcxproj benchmark-VS2022.vcxproj.user benchmark.c benchmark.h benchmark.sln benchmark.vcproj benchmark.vcxproj include.amsrc
port
Espressif
esp_crt_bundle
README.md cacrt_all.pem cacrt_deprecated.pem cacrt_local.pem esp_crt_bundle.c gen_crt_bundle.py pio_install_cryptography.pyRenesas
README.md renesas_common.c renesas_fspsm_aes.c renesas_fspsm_rsa.c renesas_fspsm_sha.c renesas_fspsm_util.c renesas_rx64_hw_sha.c renesas_rx64_hw_util.c renesas_tsip_aes.c renesas_tsip_rsa.c renesas_tsip_sha.c renesas_tsip_util.carm
armv8-32-aes-asm.S armv8-32-aes-asm_c.c armv8-32-chacha-asm.S armv8-32-chacha-asm_c.c armv8-32-curve25519.S armv8-32-curve25519_c.c armv8-32-mlkem-asm.S armv8-32-mlkem-asm_c.c armv8-32-poly1305-asm.S armv8-32-poly1305-asm_c.c armv8-32-sha256-asm.S armv8-32-sha256-asm_c.c armv8-32-sha3-asm.S armv8-32-sha3-asm_c.c armv8-32-sha512-asm.S armv8-32-sha512-asm_c.c armv8-aes-asm.S armv8-aes-asm_c.c armv8-aes.c armv8-chacha-asm.S armv8-chacha-asm_c.c armv8-curve25519.S armv8-curve25519_c.c armv8-mlkem-asm.S armv8-mlkem-asm_c.c armv8-poly1305-asm.S armv8-poly1305-asm_c.c armv8-sha256-asm.S armv8-sha256-asm_c.c armv8-sha256.c armv8-sha3-asm.S armv8-sha3-asm_c.c armv8-sha512-asm.S armv8-sha512-asm_c.c armv8-sha512.c cryptoCell.c cryptoCellHash.c thumb2-aes-asm.S thumb2-aes-asm_c.c thumb2-chacha-asm.S thumb2-chacha-asm_c.c thumb2-curve25519.S thumb2-curve25519_c.c thumb2-mlkem-asm.S thumb2-mlkem-asm_c.c thumb2-poly1305-asm.S thumb2-poly1305-asm_c.c thumb2-sha256-asm.S thumb2-sha256-asm_c.c thumb2-sha3-asm.S thumb2-sha3-asm_c.c thumb2-sha512-asm.S thumb2-sha512-asm_c.ccaam
README.md caam_aes.c caam_doc.pdf caam_driver.c caam_error.c caam_integrity.c caam_qnx.c caam_sha.c wolfcaam_aes.c wolfcaam_cmac.c wolfcaam_ecdsa.c wolfcaam_fsl_nxp.c wolfcaam_hash.c wolfcaam_hmac.c wolfcaam_init.c wolfcaam_qnx.c wolfcaam_rsa.c wolfcaam_seco.c wolfcaam_x25519.cdevcrypto
README.md devcrypto_aes.c devcrypto_ecdsa.c devcrypto_hash.c devcrypto_hmac.c devcrypto_rsa.c devcrypto_x25519.c wc_devcrypto.criscv
riscv-64-aes.c riscv-64-chacha.c riscv-64-poly1305.c riscv-64-sha256.c riscv-64-sha3.c riscv-64-sha512.cwolfssl
openssl
aes.h asn1.h asn1t.h bio.h bn.h buffer.h camellia.h cmac.h cms.h compat_types.h conf.h crypto.h des.h dh.h dsa.h ec.h ec25519.h ec448.h ecdh.h ecdsa.h ed25519.h ed448.h engine.h err.h evp.h fips_rand.h hmac.h include.am kdf.h lhash.h md4.h md5.h modes.h obj_mac.h objects.h ocsp.h opensslconf.h opensslv.h ossl_typ.h pem.h pkcs12.h pkcs7.h rand.h rc4.h ripemd.h rsa.h safestack.h sha.h sha3.h srp.h ssl.h ssl23.h stack.h tls1.h txt_db.h ui.h x509.h x509_vfy.h x509v3.hwolfcrypt
port
Renesas
renesas-fspsm-crypt.h renesas-fspsm-types.h renesas-rx64-hw-crypt.h renesas-tsip-crypt.h renesas_cmn.h renesas_fspsm_internal.h renesas_sync.h renesas_tsip_internal.h renesas_tsip_types.hcaam
caam_driver.h caam_error.h caam_qnx.h wolfcaam.h wolfcaam_aes.h wolfcaam_cmac.h wolfcaam_ecdsa.h wolfcaam_fsl_nxp.h wolfcaam_hash.h wolfcaam_qnx.h wolfcaam_rsa.h wolfcaam_seco.h wolfcaam_sha.h wolfcaam_x25519.hwrapper
Ada
examples
src
aes_verify_main.adb rsa_verify_main.adb sha256_main.adb spark_sockets.adb spark_sockets.ads spark_terminal.adb spark_terminal.ads tls_client.adb tls_client.ads tls_client_main.adb tls_server.adb tls_server.ads tls_server_main.adbtests
src
aes_bindings_tests.adb aes_bindings_tests.ads rsa_verify_bindings_tests.adb rsa_verify_bindings_tests.ads sha256_bindings_tests.adb sha256_bindings_tests.ads tests.adbCSharp
wolfSSL-Example-IOCallbacks
App.config wolfSSL-Example-IOCallbacks.cs wolfSSL-Example-IOCallbacks.csprojwolfSSL-TLS-ServerThreaded
App.config wolfSSL-TLS-ServerThreaded.cs wolfSSL-TLS-ServerThreaded.csprojrust
wolfssl-wolfcrypt
src
aes.rs blake2.rs chacha20_poly1305.rs cmac.rs cmac_mac.rs curve25519.rs dh.rs dilithium.rs ecc.rs ecdsa.rs ed25519.rs ed448.rs fips.rs hkdf.rs hmac.rs hmac_mac.rs kdf.rs lib.rs lms.rs mlkem.rs mlkem_kem.rs pbkdf2_password_hash.rs prf.rs random.rs rsa.rs rsa_pkcs1v15.rs sha.rs sha_digest.rs sys.rstests
test_aes.rs test_blake2.rs test_chacha20_poly1305.rs test_cmac.rs test_cmac_mac.rs test_curve25519.rs test_dh.rs test_dilithium.rs test_ecc.rs test_ecdsa.rs test_ed25519.rs test_ed448.rs test_hkdf.rs test_hmac.rs test_hmac_mac.rs test_kdf.rs test_lms.rs test_mlkem.rs test_mlkem_kem.rs test_pbkdf2_password_hash.rs test_prf.rs test_random.rs test_rsa.rs test_rsa_pkcs1v15.rs test_sha.rs test_sha_digest.rs test_wolfcrypt.rszephyr
samples
wolfssl_benchmark
CMakeLists.txt README install_test.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.confwolfssl_test
CMakeLists.txt README install_test.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
curl/lib/vssh/libssh.c
raw
1/***************************************************************************
2 * _ _ ____ _
3 * Project ___| | | | _ \| |
4 * / __| | | | |_) | |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
7 *
8 * Copyright (C) Red Hat, Inc.
9 *
10 * Authors: Nikos Mavrogiannopoulos, Tomas Mraz, Stanislav Zidek,
11 * Robert Kolcun, Andreas Schneider
12 *
13 * This software is licensed as described in the file COPYING, which
14 * you should have received as part of this distribution. The terms
15 * are also available at https://curl.se/docs/copyright.html.
16 *
17 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
18 * copies of the Software, and permit persons to whom the Software is
19 * furnished to do so, under the terms of the COPYING file.
20 *
21 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
22 * KIND, either express or implied.
23 *
24 * SPDX-License-Identifier: curl
25 *
26 ***************************************************************************/
27#include "curl_setup.h"
28
29#ifdef USE_LIBSSH
30
31#ifdef HAVE_NETINET_IN_H
32#include <netinet/in.h>
33#endif
34#ifdef HAVE_ARPA_INET_H
35#include <arpa/inet.h>
36#endif
37#ifdef HAVE_NETDB_H
38#include <netdb.h>
39#endif
40#ifdef __VMS
41#include <in.h>
42#include <inet.h>
43#endif
44
45#include "urldata.h"
46#include "sendf.h"
47#include "curl_trc.h"
48#include "hostip.h"
49#include "progress.h"
50#include "transfer.h"
51#include "vssh/ssh.h"
52#include "url.h"
53#include "cfilters.h"
54#include "connect.h"
55#include "parsedate.h" /* for the week day and month names */
56#include "curlx/strparse.h"
57#include "multiif.h"
58#include "select.h"
59#include "vssh/vssh.h"
60#include "curlx/base64.h" /* for curlx_base64_encode() */
61
62#ifdef HAVE_UNISTD_H
63#include <unistd.h>
64#endif
65#ifdef HAVE_FCNTL_H
66#include <fcntl.h>
67#endif
68
69/* A recent macro provided by libssh. Or make our own. */
70#ifndef SSH_STRING_FREE_CHAR
71#define SSH_STRING_FREE_CHAR(x) \
72 do { \
73 if(x) { \
74 ssh_string_free_char(x); \
75 x = NULL; \
76 } \
77 } while(0)
78#endif
79
80/* These stat values may not be the same as the user's S_IFMT / S_IFLNK */
81#ifndef SSH_S_IFMT
82#define SSH_S_IFMT 00170000
83#endif
84#ifndef SSH_S_IFLNK
85#define SSH_S_IFLNK 0120000
86#endif
87
88static CURLcode sftp_error_to_CURLE(int err)
89{
90 switch(err) {
91 case SSH_FX_OK:
92 return CURLE_OK;
93
94 case SSH_FX_NO_SUCH_FILE:
95 case SSH_FX_NO_SUCH_PATH:
96 return CURLE_REMOTE_FILE_NOT_FOUND;
97
98 case SSH_FX_PERMISSION_DENIED:
99 case SSH_FX_WRITE_PROTECT:
100 return CURLE_REMOTE_ACCESS_DENIED;
101
102 case SSH_FX_FILE_ALREADY_EXISTS:
103 return CURLE_REMOTE_FILE_EXISTS;
104
105 default:
106 break;
107 }
108
109 return CURLE_SSH;
110}
111
112/* Multiple options:
113 * 1. data->set.str[STRING_SSH_HOST_PUBLIC_KEY_SHA256] is set with a SHA256
114 * hash.
115 * 2. data->set.str[STRING_SSH_HOST_PUBLIC_KEY_MD5] is set with an MD5
116 * hash (90s style auth, not sure we should have it here)
117 * 3. data->set.ssh_keyfunc callback is set. Then we do trust on first
118 * use. We even save on knownhosts if CURLKHSTAT_FINE_ADD_TO_FILE
119 * is returned by it.
120 * 4. none of the above. We only accept if it is present on known hosts.
121 *
122 * Returns SSH_OK or SSH_ERROR.
123 */
124static int myssh_is_known(struct Curl_easy *data, struct ssh_conn *sshc)
125{
126 int rc;
127 ssh_key pubkey;
128 unsigned char *hash_sha256 = NULL;
129 size_t hlen_sha256;
130 unsigned char *hash_md5 = NULL;
131 size_t hlen_md5;
132 char *found_base64 = NULL;
133 char *known_base64 = NULL;
134 int vstate;
135 enum curl_khmatch keymatch;
136 struct curl_khkey foundkey;
137 struct curl_khkey *knownkeyp = NULL;
138 curl_sshkeycallback func = data->set.ssh_keyfunc;
139 struct ssh_knownhosts_entry *knownhostsentry = NULL;
140 struct curl_khkey knownkey;
141
142 rc = ssh_get_server_publickey(sshc->ssh_session, &pubkey);
143
144 if(rc != SSH_OK)
145 return rc;
146
147 if(data->set.str[STRING_SSH_HOST_PUBLIC_KEY_SHA256]) {
148 const char *pubkey_sha256 =
149 data->set.str[STRING_SSH_HOST_PUBLIC_KEY_SHA256];
150 char *fingerprint_b64 = NULL;
151 size_t fingerprint_b64_len;
152 size_t pub_pos = 0;
153 size_t b64_pos = 0;
154
155 rc = ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_SHA256,
156 &hash_sha256, &hlen_sha256);
157 if(rc != SSH_OK || hlen_sha256 != 32) {
158 failf(data, "Denied establishing ssh session: "
159 "SHA256 fingerprint not available");
160 goto cleanup;
161 }
162
163 if(curlx_base64_encode((const uint8_t *)hash_sha256, 32, &fingerprint_b64,
164 &fingerprint_b64_len) != CURLE_OK) {
165 rc = SSH_ERROR;
166 goto cleanup;
167 }
168
169 infof(data, "SSH SHA256 fingerprint: %s", fingerprint_b64);
170
171 /* Find the position of any = padding characters in the public key */
172 while((pubkey_sha256[pub_pos] != '=') && pubkey_sha256[pub_pos]) {
173 pub_pos++;
174 }
175
176 /* Find the position of any = padding characters in the base64 coded
177 * hostkey fingerprint */
178 while((fingerprint_b64[b64_pos] != '=') && fingerprint_b64[b64_pos]) {
179 b64_pos++;
180 }
181
182 /* Before we authenticate we check the hostkey's SHA256 fingerprint
183 * against a known fingerprint, if available.
184 */
185 if((pub_pos != b64_pos) ||
186 strncmp(fingerprint_b64, pubkey_sha256, pub_pos)) {
187 failf(data,
188 "Denied establishing ssh session: mismatch SHA256 fingerprint. "
189 "Remote %s is not equal to %s", fingerprint_b64, pubkey_sha256);
190 curlx_free(fingerprint_b64);
191 rc = SSH_ERROR;
192 goto cleanup;
193 }
194
195 curlx_free(fingerprint_b64);
196
197 rc = SSH_OK;
198 goto cleanup;
199 }
200
201 if(data->set.str[STRING_SSH_HOST_PUBLIC_KEY_MD5]) {
202 const char *pubkey_md5 = data->set.str[STRING_SSH_HOST_PUBLIC_KEY_MD5];
203 char md5buffer[33];
204 int i;
205
206 rc = ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_MD5,
207 &hash_md5, &hlen_md5);
208 if(rc != SSH_OK || hlen_md5 != 16) {
209 failf(data,
210 "Denied establishing ssh session: MD5 fingerprint not available");
211 goto cleanup;
212 }
213
214 for(i = 0; i < 16; i++)
215 curl_msnprintf(&md5buffer[i * 2], 3, "%02x", hash_md5[i]);
216
217 infof(data, "SSH MD5 fingerprint: %s", md5buffer);
218
219 if(!curl_strequal(md5buffer, pubkey_md5)) {
220 failf(data,
221 "Denied establishing ssh session: mismatch MD5 fingerprint. "
222 "Remote %s is not equal to %s", md5buffer, pubkey_md5);
223 rc = SSH_ERROR;
224 goto cleanup;
225 }
226
227 rc = SSH_OK;
228 goto cleanup;
229 }
230
231 if(data->set.str[STRING_SSH_KNOWNHOSTS]) {
232
233 /* Get the known_key from the known hosts file */
234 vstate = ssh_session_get_known_hosts_entry(sshc->ssh_session,
235 &knownhostsentry);
236
237 /* Case an entry was found in a known hosts file */
238 if(knownhostsentry) {
239 if(knownhostsentry->publickey) {
240 rc = ssh_pki_export_pubkey_base64(knownhostsentry->publickey,
241 &known_base64);
242 if(rc != SSH_OK) {
243 goto cleanup;
244 }
245 knownkey.key = known_base64;
246 knownkey.len = strlen(known_base64);
247
248 switch(ssh_key_type(knownhostsentry->publickey)) {
249 case SSH_KEYTYPE_RSA:
250 knownkey.keytype = CURLKHTYPE_RSA;
251 break;
252 case SSH_KEYTYPE_RSA1:
253 knownkey.keytype = CURLKHTYPE_RSA1;
254 break;
255 case SSH_KEYTYPE_ECDSA:
256 case SSH_KEYTYPE_ECDSA_P256:
257 case SSH_KEYTYPE_ECDSA_P384:
258 case SSH_KEYTYPE_ECDSA_P521:
259 knownkey.keytype = CURLKHTYPE_ECDSA;
260 break;
261 case SSH_KEYTYPE_ED25519:
262 knownkey.keytype = CURLKHTYPE_ED25519;
263 break;
264 case SSH_KEYTYPE_DSS:
265 knownkey.keytype = CURLKHTYPE_DSS;
266 break;
267 default:
268 rc = SSH_ERROR;
269 goto cleanup;
270 }
271 knownkeyp = &knownkey;
272 }
273 }
274
275 switch(vstate) {
276 case SSH_KNOWN_HOSTS_OK:
277 keymatch = CURLKHMATCH_OK;
278 break;
279 case SSH_KNOWN_HOSTS_OTHER:
280 case SSH_KNOWN_HOSTS_NOT_FOUND:
281 case SSH_KNOWN_HOSTS_UNKNOWN:
282 case SSH_KNOWN_HOSTS_ERROR:
283 keymatch = CURLKHMATCH_MISSING;
284 break;
285 default:
286 keymatch = CURLKHMATCH_MISMATCH;
287 break;
288 }
289
290 if(func) { /* use callback to determine action */
291 rc = ssh_pki_export_pubkey_base64(pubkey, &found_base64);
292 if(rc != SSH_OK)
293 goto cleanup;
294
295 foundkey.key = found_base64;
296 foundkey.len = strlen(found_base64);
297
298 switch(ssh_key_type(pubkey)) {
299 case SSH_KEYTYPE_RSA:
300 foundkey.keytype = CURLKHTYPE_RSA;
301 break;
302 case SSH_KEYTYPE_RSA1:
303 foundkey.keytype = CURLKHTYPE_RSA1;
304 break;
305 case SSH_KEYTYPE_ECDSA:
306 case SSH_KEYTYPE_ECDSA_P256:
307 case SSH_KEYTYPE_ECDSA_P384:
308 case SSH_KEYTYPE_ECDSA_P521:
309 foundkey.keytype = CURLKHTYPE_ECDSA;
310 break;
311 case SSH_KEYTYPE_ED25519:
312 foundkey.keytype = CURLKHTYPE_ED25519;
313 break;
314 case SSH_KEYTYPE_DSS:
315 foundkey.keytype = CURLKHTYPE_DSS;
316 break;
317 default:
318 rc = SSH_ERROR;
319 goto cleanup;
320 }
321
322 Curl_set_in_callback(data, TRUE);
323 rc = func(data, knownkeyp, /* from the knownhosts file */
324 &foundkey, /* from the remote host */
325 keymatch, data->set.ssh_keyfunc_userp);
326 Curl_set_in_callback(data, FALSE);
327
328 switch(rc) {
329 case CURLKHSTAT_FINE_ADD_TO_FILE:
330 rc = ssh_session_update_known_hosts(sshc->ssh_session);
331 if(rc != SSH_OK) {
332 goto cleanup;
333 }
334 break;
335 case CURLKHSTAT_FINE:
336 break;
337 default: /* REJECT/DEFER */
338 rc = SSH_ERROR;
339 goto cleanup;
340 }
341 }
342 else {
343 if(keymatch != CURLKHMATCH_OK) {
344 rc = SSH_ERROR;
345 goto cleanup;
346 }
347 }
348 }
349 rc = SSH_OK;
350
351cleanup:
352 if(found_base64) {
353 /* !checksrc! disable BANNEDFUNC 1 */
354 free(found_base64); /* allocated by libssh, deallocate with system free */
355 }
356 if(known_base64) {
357 /* !checksrc! disable BANNEDFUNC 1 */
358 free(known_base64); /* allocated by libssh, deallocate with system free */
359 }
360 if(hash_sha256)
361 ssh_clean_pubkey_hash(&hash_sha256);
362 if(hash_md5)
363 ssh_clean_pubkey_hash(&hash_md5);
364 ssh_key_free(pubkey);
365 if(knownhostsentry) {
366 ssh_knownhosts_entry_free(knownhostsentry);
367 }
368 return rc;
369}
370
371static int myssh_to_ERROR(struct Curl_easy *data,
372 struct ssh_conn *sshc,
373 CURLcode result)
374{
375 myssh_to(data, sshc, SSH_SESSION_DISCONNECT);
376 sshc->actualcode = result;
377 return SSH_ERROR;
378}
379
380static int myssh_to_SFTP_CLOSE(struct Curl_easy *data,
381 struct ssh_conn *sshc)
382{
383 myssh_to(data, sshc, SSH_SFTP_CLOSE);
384 sshc->actualcode = sftp_error_to_CURLE(sftp_get_error(sshc->sftp_session));
385 return SSH_ERROR;
386}
387
388static int myssh_to_PASSWD_AUTH(struct Curl_easy *data,
389 struct ssh_conn *sshc)
390{
391 if(sshc->auth_methods & SSH_AUTH_METHOD_PASSWORD) {
392 myssh_to(data, sshc, SSH_AUTH_PASS_INIT);
393 return SSH_OK;
394 }
395 return myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
396}
397
398static int myssh_to_KEY_AUTH(struct Curl_easy *data,
399 struct ssh_conn *sshc)
400{
401 if(sshc->auth_methods & SSH_AUTH_METHOD_INTERACTIVE) {
402 myssh_to(data, sshc, SSH_AUTH_KEY_INIT);
403 return SSH_OK;
404 }
405 return myssh_to_PASSWD_AUTH(data, sshc);
406}
407
408static int myssh_to_GSSAPI_AUTH(struct Curl_easy *data,
409 struct ssh_conn *sshc)
410{
411 if(sshc->auth_methods & SSH_AUTH_METHOD_GSSAPI_MIC) {
412 myssh_to(data, sshc, SSH_AUTH_GSSAPI);
413 return SSH_OK;
414 }
415 return myssh_to_KEY_AUTH(data, sshc);
416}
417
418static int myssh_in_SFTP_READDIR_INIT(struct Curl_easy *data,
419 struct ssh_conn *sshc,
420 struct SSHPROTO *sshp)
421{
422 if(!sshp)
423 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
424 Curl_pgrsSetDownloadSize(data, -1);
425 if(data->req.no_body) {
426 myssh_to(data, sshc, SSH_STOP);
427 return SSH_NO_ERROR;
428 }
429
430 /*
431 * This is a directory that we are trying to get, so produce a directory
432 * listing
433 */
434 sshc->sftp_dir = sftp_opendir(sshc->sftp_session,
435 sshp->path);
436 if(!sshc->sftp_dir) {
437 failf(data, "Could not open directory for reading: %s",
438 ssh_get_error(sshc->ssh_session));
439 return myssh_to_SFTP_CLOSE(data, sshc);
440 }
441 myssh_to(data, sshc, SSH_SFTP_READDIR);
442 return SSH_NO_ERROR;
443}
444
445static int myssh_in_SFTP_READDIR(struct Curl_easy *data,
446 struct ssh_conn *sshc,
447 struct SSHPROTO *sshp)
448{
449 CURLcode result = CURLE_OK;
450
451 if(!sshp)
452 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
453 curlx_dyn_reset(&sshc->readdir_buf);
454 if(sshc->readdir_attrs)
455 sftp_attributes_free(sshc->readdir_attrs);
456
457 sshc->readdir_attrs = sftp_readdir(sshc->sftp_session, sshc->sftp_dir);
458 if(sshc->readdir_attrs) {
459 sshc->readdir_filename = sshc->readdir_attrs->name;
460 sshc->readdir_longentry = sshc->readdir_attrs->longname;
461 sshc->readdir_len = strlen(sshc->readdir_filename);
462
463 if(data->set.list_only) {
464 char *tmpLine;
465
466 tmpLine = curl_maprintf("%s\n", sshc->readdir_filename);
467 if(!tmpLine) {
468 myssh_to(data, sshc, SSH_SFTP_CLOSE);
469 sshc->actualcode = CURLE_OUT_OF_MEMORY;
470 return SSH_ERROR;
471 }
472 result = Curl_client_write(data, CLIENTWRITE_BODY,
473 tmpLine, sshc->readdir_len + 1);
474 curlx_free(tmpLine);
475
476 if(result) {
477 myssh_to(data, sshc, SSH_STOP);
478 sshc->actualcode = result;
479 return SSH_NO_ERROR;
480 }
481 }
482 else {
483 if(curlx_dyn_add(&sshc->readdir_buf, sshc->readdir_longentry)) {
484 sshc->actualcode = CURLE_OUT_OF_MEMORY;
485 myssh_to(data, sshc, SSH_STOP);
486 return SSH_ERROR;
487 }
488
489 if((sshc->readdir_attrs->flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
490 ((sshc->readdir_attrs->permissions & SSH_S_IFMT) ==
491 SSH_S_IFLNK)) {
492 sshc->readdir_linkPath = curl_maprintf("%s%s", sshp->path,
493 sshc->readdir_filename);
494
495 if(!sshc->readdir_linkPath) {
496 myssh_to(data, sshc, SSH_SFTP_CLOSE);
497 sshc->actualcode = CURLE_OUT_OF_MEMORY;
498 return SSH_ERROR;
499 }
500
501 myssh_to(data, sshc, SSH_SFTP_READDIR_LINK);
502 return SSH_NO_ERROR;
503 }
504 myssh_to(data, sshc, SSH_SFTP_READDIR_BOTTOM);
505 return SSH_NO_ERROR;
506 }
507 }
508 else if(sftp_dir_eof(sshc->sftp_dir)) {
509 myssh_to(data, sshc, SSH_SFTP_READDIR_DONE);
510 }
511 else {
512 failf(data, "Could not open remote directory for reading: %s",
513 ssh_get_error(sshc->ssh_session));
514 return myssh_to_SFTP_CLOSE(data, sshc);
515 }
516 return SSH_NO_ERROR;
517}
518
519static int myssh_in_SFTP_READDIR_LINK(struct Curl_easy *data,
520 struct ssh_conn *sshc)
521{
522 if(sshc->readdir_link_attrs)
523 sftp_attributes_free(sshc->readdir_link_attrs);
524
525 sshc->readdir_link_attrs = sftp_lstat(sshc->sftp_session,
526 sshc->readdir_linkPath);
527 if(!sshc->readdir_link_attrs) {
528 failf(data, "Could not read symlink for reading: %s",
529 ssh_get_error(sshc->ssh_session));
530 return myssh_to_SFTP_CLOSE(data, sshc);
531 }
532
533 if(!sshc->readdir_link_attrs->name) {
534 sshc->readdir_tmp = sftp_readlink(sshc->sftp_session,
535 sshc->readdir_linkPath);
536 if(!sshc->readdir_tmp)
537 sshc->readdir_len = 0;
538 else
539 sshc->readdir_len = strlen(sshc->readdir_tmp);
540 sshc->readdir_longentry = NULL;
541 sshc->readdir_filename = sshc->readdir_tmp;
542 }
543 else {
544 sshc->readdir_len = strlen(sshc->readdir_link_attrs->name);
545 sshc->readdir_filename = sshc->readdir_link_attrs->name;
546 sshc->readdir_longentry = sshc->readdir_link_attrs->longname;
547 }
548
549 curlx_safefree(sshc->readdir_linkPath);
550
551 if(curlx_dyn_addf(&sshc->readdir_buf, " -> %s", sshc->readdir_filename)) {
552 /* Not using:
553 * return myssh_to_SFTP_CLOSE(data, sshc);
554 *
555 * as that assumes an sftp related error while
556 * assigning sshc->actualcode whereas the current
557 * error is curlx_dyn_addf() related.
558 */
559 myssh_to(data, sshc, SSH_SFTP_CLOSE);
560 sshc->actualcode = CURLE_OUT_OF_MEMORY;
561 return SSH_ERROR;
562 }
563
564 sftp_attributes_free(sshc->readdir_link_attrs);
565 sshc->readdir_link_attrs = NULL;
566 sshc->readdir_filename = NULL;
567 sshc->readdir_longentry = NULL;
568
569 myssh_to(data, sshc, SSH_SFTP_READDIR_BOTTOM);
570 return SSH_NO_ERROR;
571}
572
573static int myssh_in_SFTP_READDIR_BOTTOM(struct Curl_easy *data,
574 struct ssh_conn *sshc)
575{
576 CURLcode result;
577
578 if(curlx_dyn_addn(&sshc->readdir_buf, "\n", 1))
579 result = CURLE_OUT_OF_MEMORY;
580 else
581 result = Curl_client_write(data, CLIENTWRITE_BODY,
582 curlx_dyn_ptr(&sshc->readdir_buf),
583 curlx_dyn_len(&sshc->readdir_buf));
584
585 ssh_string_free_char(sshc->readdir_tmp);
586 sshc->readdir_tmp = NULL;
587
588 if(result) {
589 myssh_to(data, sshc, SSH_STOP);
590 sshc->actualcode = result;
591 }
592 else
593 myssh_to(data, sshc, SSH_SFTP_READDIR);
594 return SSH_NO_ERROR;
595}
596
597static int myssh_in_SFTP_READDIR_DONE(struct Curl_easy *data,
598 struct ssh_conn *sshc)
599{
600 sftp_closedir(sshc->sftp_dir);
601 sshc->sftp_dir = NULL;
602
603 /* no data to transfer */
604 Curl_xfer_setup_nop(data);
605 myssh_to(data, sshc, SSH_STOP);
606 return SSH_NO_ERROR;
607}
608
609static void myssh_quote_error(struct Curl_easy *data, struct ssh_conn *sshc,
610 const char *cmd)
611{
612 if(cmd)
613 failf(data, "%s command failed: %s", cmd,
614 ssh_get_error(sshc->ssh_session));
615 curlx_safefree(sshc->quote_path1);
616 curlx_safefree(sshc->quote_path2);
617 myssh_to(data, sshc, SSH_SFTP_CLOSE);
618 sshc->nextstate = SSH_NO_STATE;
619 sshc->actualcode = CURLE_QUOTE_ERROR;
620}
621
622static int myssh_in_SFTP_QUOTE_STATVFS(struct Curl_easy *data,
623 struct ssh_conn *sshc)
624{
625 sftp_statvfs_t statvfs;
626
627 statvfs = sftp_statvfs(sshc->sftp_session, sshc->quote_path1);
628 if(!statvfs && !sshc->acceptfail) {
629 myssh_quote_error(data, sshc, "statvfs");
630 return SSH_OK;
631 }
632 else if(statvfs) {
633#ifdef _MSC_VER
634#define CURL_LIBSSH_VFS_SIZE_MASK "I64u"
635#elif defined(__MINGW32__) && (__MINGW64_VERSION_MAJOR <= 6)
636#define CURL_LIBSSH_VFS_SIZE_MASK "llu"
637#else
638#define CURL_LIBSSH_VFS_SIZE_MASK PRIu64
639#endif
640 CURLcode result = CURLE_OK;
641 char *tmp = curl_maprintf("statvfs:\n"
642 "f_bsize: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
643 "f_frsize: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
644 "f_blocks: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
645 "f_bfree: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
646 "f_bavail: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
647 "f_files: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
648 "f_ffree: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
649 "f_favail: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
650 "f_fsid: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
651 "f_flag: %" CURL_LIBSSH_VFS_SIZE_MASK "\n"
652 "f_namemax: %" CURL_LIBSSH_VFS_SIZE_MASK "\n",
653 statvfs->f_bsize, statvfs->f_frsize,
654 statvfs->f_blocks, statvfs->f_bfree,
655 statvfs->f_bavail, statvfs->f_files,
656 statvfs->f_ffree, statvfs->f_favail,
657 statvfs->f_fsid, statvfs->f_flag,
658 statvfs->f_namemax);
659 sftp_statvfs_free(statvfs);
660
661 if(!tmp)
662 result = CURLE_OUT_OF_MEMORY;
663
664 if(!result) {
665 result = Curl_client_write(data, CLIENTWRITE_HEADER, tmp, strlen(tmp));
666 curlx_free(tmp);
667 }
668 if(result) {
669 myssh_to(data, sshc, SSH_SFTP_CLOSE);
670 sshc->nextstate = SSH_NO_STATE;
671 sshc->actualcode = result;
672 }
673 }
674 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
675 return SSH_OK;
676}
677
678static int myssh_auth_interactive(struct connectdata *conn,
679 struct ssh_conn *sshc)
680{
681 int rc;
682 int nprompts;
683
684restart:
685 switch(sshc->kbd_state) {
686 case 0:
687 rc = ssh_userauth_kbdint(sshc->ssh_session, NULL, NULL);
688 if(rc == SSH_AUTH_AGAIN)
689 return SSH_AGAIN;
690
691 if(rc != SSH_AUTH_INFO)
692 return SSH_ERROR;
693
694 nprompts = ssh_userauth_kbdint_getnprompts(sshc->ssh_session);
695 if(nprompts != 1)
696 return SSH_ERROR;
697
698 rc = ssh_userauth_kbdint_setanswer(sshc->ssh_session, 0,
699 Curl_creds_passwd(conn->creds));
700 if(rc < 0)
701 return SSH_ERROR;
702
703 FALLTHROUGH();
704 case 1:
705 sshc->kbd_state = 1;
706
707 rc = ssh_userauth_kbdint(sshc->ssh_session, NULL, NULL);
708 if(rc == SSH_AUTH_AGAIN)
709 return SSH_AGAIN;
710 else if(rc == SSH_AUTH_SUCCESS)
711 rc = SSH_OK;
712 else if(rc == SSH_AUTH_INFO) {
713 nprompts = ssh_userauth_kbdint_getnprompts(sshc->ssh_session);
714 if(nprompts)
715 return SSH_ERROR;
716
717 sshc->kbd_state = 2;
718 goto restart;
719 }
720 else
721 rc = SSH_ERROR;
722 break;
723 case 2:
724 sshc->kbd_state = 2;
725
726 rc = ssh_userauth_kbdint(sshc->ssh_session, NULL, NULL);
727 if(rc == SSH_AUTH_AGAIN)
728 return SSH_AGAIN;
729 else if(rc == SSH_AUTH_SUCCESS)
730 rc = SSH_OK;
731 else
732 rc = SSH_ERROR;
733
734 break;
735 default:
736 return SSH_ERROR;
737 }
738
739 sshc->kbd_state = 0;
740 return rc;
741}
742
743static void myssh_state_init(struct Curl_easy *data,
744 struct ssh_conn *sshc)
745{
746 sshc->secondCreateDirs = 0;
747 sshc->nextstate = SSH_NO_STATE;
748 sshc->actualcode = CURLE_OK;
749
750#if 0
751 ssh_set_log_level(SSH_LOG_PROTOCOL);
752#endif
753
754 /* Set libssh to non-blocking, since everything internally is
755 non-blocking */
756 ssh_set_blocking(sshc->ssh_session, 0);
757
758 myssh_to(data, sshc, SSH_S_STARTUP);
759}
760
761static void myssh_block2waitfor(struct connectdata *conn,
762 struct ssh_conn *sshc,
763 bool block)
764{
765 (void)conn;
766 if(block) {
767 int dir = ssh_get_poll_flags(sshc->ssh_session);
768 /* translate the libssh define bits into our own bit defines */
769 sshc->waitfor =
770 ((dir & SSH_READ_PENDING) ? REQ_IO_RECV : 0) |
771 ((dir & SSH_WRITE_PENDING) ? REQ_IO_SEND : 0);
772 }
773 else
774 sshc->waitfor = 0;
775}
776
777static int myssh_in_S_STARTUP(struct Curl_easy *data,
778 struct ssh_conn *sshc)
779{
780 struct connectdata *conn = data->conn;
781 int rc = ssh_connect(sshc->ssh_session);
782
783 myssh_block2waitfor(conn, sshc, (rc == SSH_AGAIN));
784 if(rc == SSH_AGAIN) {
785 CURL_TRC_SSH(data, "connect -> EAGAIN");
786 }
787 else if(rc != SSH_OK) {
788 failf(data, "Failure establishing ssh session");
789 rc = myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
790 }
791 else
792 myssh_to(data, sshc, SSH_HOSTKEY);
793
794 return rc;
795}
796
797static int myssh_in_AUTHLIST(struct Curl_easy *data,
798 struct ssh_conn *sshc)
799{
800 int rc;
801 sshc->authed = FALSE;
802
803 rc = ssh_userauth_none(sshc->ssh_session, NULL);
804 if(rc == SSH_AUTH_AGAIN)
805 return SSH_AGAIN;
806
807 if(rc == SSH_AUTH_SUCCESS) {
808 sshc->authed = TRUE;
809 infof(data, "Authenticated with none");
810 myssh_to(data, sshc, SSH_AUTH_DONE);
811 return rc;
812 }
813 else if(rc == SSH_AUTH_ERROR) {
814 rc = myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
815 return rc;
816 }
817
818 sshc->auth_methods =
819 (unsigned int)ssh_userauth_list(sshc->ssh_session, NULL);
820 if(sshc->auth_methods)
821 infof(data, "SSH authentication methods available: %s%s%s%s",
822 sshc->auth_methods & SSH_AUTH_METHOD_PUBLICKEY ?
823 "public key, " : "",
824 sshc->auth_methods & SSH_AUTH_METHOD_GSSAPI_MIC ?
825 "GSSAPI, " : "",
826 sshc->auth_methods & SSH_AUTH_METHOD_INTERACTIVE ?
827 "keyboard-interactive, " : "",
828 sshc->auth_methods & SSH_AUTH_METHOD_PASSWORD ?
829 "password" : "");
830 /* For public key auth we need either the private key or
831 CURLSSH_AUTH_AGENT. */
832 if((sshc->auth_methods & SSH_AUTH_METHOD_PUBLICKEY) &&
833 (data->set.str[STRING_SSH_PRIVATE_KEY] ||
834 (data->set.ssh_auth_types & CURLSSH_AUTH_AGENT))) {
835 myssh_to(data, sshc, SSH_AUTH_PKEY_INIT);
836 infof(data, "Authentication using SSH public key file");
837 }
838 else if(sshc->auth_methods & SSH_AUTH_METHOD_GSSAPI_MIC) {
839 myssh_to(data, sshc, SSH_AUTH_GSSAPI);
840 }
841 else if(sshc->auth_methods & SSH_AUTH_METHOD_INTERACTIVE) {
842 myssh_to(data, sshc, SSH_AUTH_KEY_INIT);
843 }
844 else if(sshc->auth_methods & SSH_AUTH_METHOD_PASSWORD) {
845 myssh_to(data, sshc, SSH_AUTH_PASS_INIT);
846 }
847 else { /* unsupported authentication method */
848 rc = myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
849 }
850 return rc;
851}
852
853static int myssh_in_AUTH_PKEY_INIT(struct Curl_easy *data,
854 struct ssh_conn *sshc)
855{
856 int rc;
857 if(!(data->set.ssh_auth_types & CURLSSH_AUTH_PUBLICKEY)) {
858 rc = myssh_to_GSSAPI_AUTH(data, sshc);
859 return rc;
860 }
861
862 /* Two choices, (1) private key was given on CMD,
863 * (2) use the "default" keys. */
864 if(data->set.str[STRING_SSH_PRIVATE_KEY]) {
865 if(sshc->pubkey && !data->set.ssl.key_passwd) {
866 rc = ssh_userauth_try_publickey(sshc->ssh_session, NULL, sshc->pubkey);
867 if(rc == SSH_AUTH_AGAIN)
868 return SSH_AGAIN;
869
870 if(rc != SSH_OK) {
871 rc = myssh_to_GSSAPI_AUTH(data, sshc);
872 return rc;
873 }
874 }
875
876 rc = ssh_pki_import_privkey_file(data->
877 set.str[STRING_SSH_PRIVATE_KEY],
878 data->set.ssl.key_passwd, NULL,
879 NULL, &sshc->privkey);
880 if(rc != SSH_OK) {
881 failf(data, "Could not load private key file %s",
882 data->set.str[STRING_SSH_PRIVATE_KEY]);
883 rc = myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
884 return rc;
885 }
886
887 myssh_to(data, sshc, SSH_AUTH_PKEY);
888 }
889 else {
890 rc = ssh_userauth_publickey_auto(sshc->ssh_session, NULL,
891 data->set.ssl.key_passwd);
892 if(rc == SSH_AUTH_AGAIN)
893 return SSH_AGAIN;
894
895 if(rc == SSH_AUTH_SUCCESS) {
896 rc = SSH_OK;
897 sshc->authed = TRUE;
898 infof(data, "Completed public key authentication");
899 myssh_to(data, sshc, SSH_AUTH_DONE);
900 return rc;
901 }
902
903 rc = myssh_to_GSSAPI_AUTH(data, sshc);
904 }
905 return rc;
906}
907
908static int myssh_in_AUTH_PKEY(struct Curl_easy *data,
909 struct ssh_conn *sshc)
910{
911 int rc = ssh_userauth_publickey(sshc->ssh_session, NULL, sshc->privkey);
912 if(rc == SSH_AUTH_AGAIN)
913 return SSH_AGAIN;
914 else if(rc == SSH_AUTH_SUCCESS) {
915 sshc->authed = TRUE;
916 infof(data, "Completed public key authentication");
917 myssh_to(data, sshc, SSH_AUTH_DONE);
918 return SSH_OK;
919 }
920 else {
921 infof(data, "Failed public key authentication (rc: %d)", rc);
922 return myssh_to_GSSAPI_AUTH(data, sshc);
923 }
924}
925
926static int myssh_in_AUTH_GSSAPI(struct Curl_easy *data,
927 struct ssh_conn *sshc)
928{
929 int rc;
930 if(!(data->set.ssh_auth_types & CURLSSH_AUTH_GSSAPI))
931 return myssh_to_KEY_AUTH(data, sshc);
932
933 rc = ssh_userauth_gssapi(sshc->ssh_session);
934 if(rc == SSH_AUTH_AGAIN)
935 return SSH_AGAIN;
936
937 if(rc == SSH_AUTH_SUCCESS) {
938 sshc->authed = TRUE;
939 infof(data, "Completed gssapi authentication");
940 myssh_to(data, sshc, SSH_AUTH_DONE);
941 return SSH_OK;
942 }
943
944 return myssh_to_KEY_AUTH(data, sshc);
945}
946
947static int myssh_in_AUTH_KEY_INIT(struct Curl_easy *data,
948 struct ssh_conn *sshc)
949{
950 if(data->set.ssh_auth_types & CURLSSH_AUTH_KEYBOARD) {
951 myssh_to(data, sshc, SSH_AUTH_KEY);
952 return SSH_NO_ERROR;
953 }
954 return myssh_to_PASSWD_AUTH(data, sshc);
955}
956
957static int myssh_in_AUTH_KEY(struct Curl_easy *data,
958 struct ssh_conn *sshc)
959{
960 /* keyboard-interactive authentication */
961 int rc = myssh_auth_interactive(data->conn, sshc);
962 if(rc == SSH_AGAIN)
963 return rc;
964 else if(rc == SSH_OK) {
965 sshc->authed = TRUE;
966 infof(data, "completed keyboard interactive authentication");
967 myssh_to(data, sshc, SSH_AUTH_DONE);
968 return SSH_NO_ERROR;
969 }
970 else
971 return myssh_to_PASSWD_AUTH(data, sshc);
972}
973
974static int myssh_in_AUTH_PASS_INIT(struct Curl_easy *data,
975 struct ssh_conn *sshc)
976{
977 if(!(data->set.ssh_auth_types & CURLSSH_AUTH_PASSWORD))
978 return myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
979 myssh_to(data, sshc, SSH_AUTH_PASS);
980 return SSH_NO_ERROR;
981}
982
983static int myssh_in_AUTH_PASS(struct Curl_easy *data,
984 struct ssh_conn *sshc)
985{
986 int rc = ssh_userauth_password(sshc->ssh_session, NULL,
987 Curl_creds_passwd(data->conn->creds));
988 if(rc == SSH_AUTH_AGAIN)
989 return SSH_AGAIN;
990 else if(rc == SSH_AUTH_SUCCESS) {
991 sshc->authed = TRUE;
992 infof(data, "Completed password authentication");
993 myssh_to(data, sshc, SSH_AUTH_DONE);
994 return SSH_NO_ERROR;
995 }
996 return myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
997}
998
999static int myssh_in_AUTH_DONE(struct Curl_easy *data,
1000 struct ssh_conn *sshc)
1001{
1002 struct connectdata *conn = data->conn;
1003 if(!sshc->authed) {
1004 failf(data, "Authentication failure");
1005 return myssh_to_ERROR(data, sshc, CURLE_LOGIN_DENIED);
1006 }
1007
1008 /* At this point we have an authenticated ssh session. */
1009 infof(data, "Authentication complete");
1010 Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSH is connected */
1011 conn->recv_idx = FIRSTSOCKET;
1012 conn->send_idx = -1;
1013
1014 if(conn->scheme->protocol == CURLPROTO_SFTP) {
1015 myssh_to(data, sshc, SSH_SFTP_INIT);
1016 return SSH_NO_ERROR;
1017 }
1018 infof(data, "SSH CONNECT phase done");
1019 myssh_to(data, sshc, SSH_STOP);
1020 return SSH_NO_ERROR;
1021}
1022
1023static int myssh_in_UPLOAD_INIT(struct Curl_easy *data,
1024 struct ssh_conn *sshc,
1025 struct SSHPROTO *sshp)
1026{
1027 int flags;
1028 int rc = 0;
1029
1030 if(!sshp)
1031 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1032
1033 if(data->state.resume_from) {
1034 sftp_attributes attrs;
1035
1036 if(data->state.resume_from < 0) {
1037 attrs = sftp_stat(sshc->sftp_session, sshp->path);
1038 if(attrs) {
1039 curl_off_t size = attrs->size;
1040 sftp_attributes_free(attrs);
1041 if(size < 0) {
1042 failf(data, "Bad file size (%" FMT_OFF_T ")", size);
1043 rc = myssh_to_ERROR(data, sshc, CURLE_BAD_DOWNLOAD_RESUME);
1044 return rc;
1045 }
1046 data->state.resume_from = size;
1047 }
1048 else {
1049 data->state.resume_from = 0;
1050 }
1051 }
1052 }
1053
1054 if(data->set.remote_append) {
1055 /* True append mode: create if nonexisting */
1056 flags = O_WRONLY | O_CREAT | O_APPEND;
1057 }
1058 else if(data->state.resume_from > 0) {
1059 /*
1060 * Resume MUST NOT use O_APPEND. Many SFTP servers/impls force all
1061 * writes to EOF when O_APPEND is set, ignoring a prior seek().
1062 * Open write-only and seek to the resume offset instead.
1063 */
1064 flags = O_WRONLY;
1065 }
1066 else
1067 /* Clear file before writing (normal behavior) */
1068 flags = O_WRONLY | O_CREAT | O_TRUNC;
1069
1070 if(sshc->sftp_file)
1071 sftp_close(sshc->sftp_file);
1072 sshc->sftp_file =
1073 sftp_open(sshc->sftp_session, sshp->path,
1074 flags, (mode_t)data->set.new_file_perms);
1075 if(!sshc->sftp_file) {
1076 int err = sftp_get_error(sshc->sftp_session);
1077
1078 if((err == SSH_FX_NO_SUCH_FILE ||
1079 err == SSH_FX_FAILURE ||
1080 err == SSH_FX_NO_SUCH_PATH) &&
1081 data->set.ftp_create_missing_dirs &&
1082 (strlen(sshp->path) > 1)) {
1083 /* try to create the path remotely */
1084 rc = 0;
1085 sshc->secondCreateDirs = 1;
1086 myssh_to(data, sshc, SSH_SFTP_CREATE_DIRS_INIT);
1087 return rc;
1088 }
1089 else {
1090 rc = myssh_to_SFTP_CLOSE(data, sshc);
1091 return rc;
1092 }
1093 }
1094
1095 /* If we have a restart point then we need to seek to the correct
1096 position. Skip if in explicit remote append mode. */
1097 if(data->state.resume_from > 0 && !data->set.remote_append) {
1098 int seekerr = CURL_SEEKFUNC_OK;
1099 /* Let's read off the proper amount of bytes from the input. */
1100 if(data->set.seek_func) {
1101 Curl_set_in_callback(data, TRUE);
1102 seekerr = data->set.seek_func(data->set.seek_client,
1103 data->state.resume_from, SEEK_SET);
1104 Curl_set_in_callback(data, FALSE);
1105 }
1106
1107 if(seekerr != CURL_SEEKFUNC_OK) {
1108 curl_off_t passed = 0;
1109
1110 if(seekerr != CURL_SEEKFUNC_CANTSEEK) {
1111 failf(data, "Could not seek stream");
1112 rc = myssh_to_ERROR(data, sshc, CURLE_FTP_COULDNT_USE_REST);
1113 return rc;
1114 }
1115 /* seekerr == CURL_SEEKFUNC_CANTSEEK (cannot seek to offset) */
1116 do {
1117 char scratch[4 * 1024];
1118 size_t readthisamountnow =
1119 (data->state.resume_from - passed >
1120 (curl_off_t)sizeof(scratch)) ?
1121 sizeof(scratch) : curlx_sotouz(data->state.resume_from - passed);
1122
1123 size_t actuallyread =
1124 data->state.fread_func(scratch, 1,
1125 readthisamountnow, data->state.in);
1126
1127 passed += actuallyread;
1128 if((actuallyread == 0) || (actuallyread > readthisamountnow)) {
1129 /* this checks for greater-than only to make sure that the
1130 CURL_READFUNC_ABORT return code still aborts */
1131 failf(data, "Failed to read data");
1132 rc = myssh_to_ERROR(data, sshc, CURLE_FTP_COULDNT_USE_REST);
1133 return rc;
1134 }
1135 } while(passed < data->state.resume_from);
1136 }
1137
1138 /* now, decrease the size of the read */
1139 if(data->state.infilesize > 0) {
1140 if(data->state.resume_from > data->state.infilesize) {
1141 failf(data, "Resume point beyond size");
1142 return myssh_to_ERROR(data, sshc, CURLE_BAD_FUNCTION_ARGUMENT);
1143 }
1144 data->state.infilesize -= data->state.resume_from;
1145 data->req.size = data->state.infilesize;
1146 Curl_pgrsSetUploadSize(data, data->state.infilesize);
1147 }
1148
1149 rc = sftp_seek64(sshc->sftp_file, data->state.resume_from);
1150 if(rc) {
1151 rc = myssh_to_SFTP_CLOSE(data, sshc);
1152 return rc;
1153 }
1154 }
1155 if(data->state.infilesize > 0) {
1156 data->req.size = data->state.infilesize;
1157 Curl_pgrsSetUploadSize(data, data->state.infilesize);
1158 }
1159 /* upload data */
1160 Curl_xfer_setup_send(data, FIRSTSOCKET);
1161
1162 /* not set by Curl_xfer_setup to preserve io_flags */
1163 data->conn->recv_idx = FIRSTSOCKET;
1164
1165 /* since we do not really wait for anything at this point, we want the
1166 state machine to move on as soon as possible so we mark this as dirty */
1167 Curl_multi_mark_dirty(data);
1168#if LIBSSH_VERSION_INT > SSH_VERSION_INT(0, 11, 0)
1169 sshc->sftp_send_state = 0;
1170#endif
1171 myssh_to(data, sshc, SSH_STOP);
1172 return rc;
1173}
1174
1175static int myssh_in_SFTP_DOWNLOAD_INIT(struct Curl_easy *data,
1176 struct ssh_conn *sshc,
1177 struct SSHPROTO *sshp)
1178{
1179 if(!sshp)
1180 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1181 /* Work on getting the specified file */
1182 if(sshc->sftp_file)
1183 sftp_close(sshc->sftp_file);
1184
1185 sshc->sftp_file = sftp_open(sshc->sftp_session, sshp->path,
1186 O_RDONLY, (mode_t)data->set.new_file_perms);
1187 if(!sshc->sftp_file) {
1188 failf(data, "Could not open remote file for reading: %s",
1189 ssh_get_error(sshc->ssh_session));
1190
1191 return myssh_to_SFTP_CLOSE(data, sshc);
1192 }
1193 sftp_file_set_nonblocking(sshc->sftp_file);
1194 myssh_to(data, sshc, SSH_SFTP_DOWNLOAD_STAT);
1195 return SSH_NO_ERROR;
1196}
1197
1198static int myssh_in_SFTP_DOWNLOAD_STAT(struct Curl_easy *data,
1199 struct ssh_conn *sshc)
1200{
1201 curl_off_t size;
1202 int rc = 0;
1203 sftp_attributes attrs = sftp_fstat(sshc->sftp_file);
1204 if(!attrs ||
1205 !(attrs->flags & SSH_FILEXFER_ATTR_SIZE) ||
1206 (attrs->size == 0)) {
1207 /*
1208 * sftp_fstat did not return an error, so maybe the server
1209 * does not support stat()
1210 * OR the server does not return a file size with a stat()
1211 * OR file size is 0
1212 */
1213 data->req.size = -1;
1214 data->req.maxdownload = -1;
1215 Curl_pgrsSetDownloadSize(data, -1);
1216 size = 0;
1217 if(attrs)
1218 sftp_attributes_free(attrs);
1219 }
1220 else {
1221 size = attrs->size;
1222
1223 sftp_attributes_free(attrs);
1224
1225 if(size < 0) {
1226 failf(data, "Bad file size (%" FMT_OFF_T ")", size);
1227 return myssh_to_ERROR(data, sshc, CURLE_BAD_DOWNLOAD_RESUME);
1228 }
1229 if(data->state.use_range) {
1230 curl_off_t from;
1231 CURLcode result = Curl_ssh_range(data, data->state.range, size,
1232 &from, &size);
1233 if(result)
1234 return myssh_to_ERROR(data, sshc, result);
1235
1236 rc = sftp_seek64(sshc->sftp_file, from);
1237 if(rc)
1238 return myssh_to_SFTP_CLOSE(data, sshc);
1239 }
1240 data->req.size = size;
1241 data->req.maxdownload = size;
1242 Curl_pgrsSetDownloadSize(data, size);
1243 }
1244
1245 /* We can resume if we can seek to the resume position */
1246 if(data->state.resume_from) {
1247 if(data->state.resume_from < 0) {
1248 /* We are supposed to download the last abs(from) bytes */
1249 if(size < -data->state.resume_from) {
1250 failf(data, "Offset (%" FMT_OFF_T ") was beyond file size (%"
1251 FMT_OFF_T ")", data->state.resume_from, size);
1252 return myssh_to_ERROR(data, sshc, CURLE_BAD_DOWNLOAD_RESUME);
1253 }
1254 /* download from where? */
1255 data->state.resume_from += size;
1256 }
1257 else {
1258 if(size < data->state.resume_from) {
1259 failf(data, "Offset (%" FMT_OFF_T
1260 ") was beyond file size (%" FMT_OFF_T ")",
1261 data->state.resume_from, size);
1262 return myssh_to_ERROR(data, sshc, CURLE_BAD_DOWNLOAD_RESUME);
1263 }
1264 }
1265 /* Now store the number of bytes we are expected to download */
1266 data->req.size = size - data->state.resume_from;
1267 data->req.maxdownload = size - data->state.resume_from;
1268 Curl_pgrsSetDownloadSize(data, size - data->state.resume_from);
1269
1270 rc = sftp_seek64(sshc->sftp_file, data->state.resume_from);
1271 if(rc)
1272 return myssh_to_SFTP_CLOSE(data, sshc);
1273 }
1274
1275 /* Setup the actual download */
1276 if(data->req.size == 0) {
1277 /* no data to transfer */
1278 Curl_xfer_setup_nop(data);
1279 infof(data, "File already completely downloaded");
1280 myssh_to(data, sshc, SSH_STOP);
1281 return rc;
1282 }
1283 Curl_xfer_setup_recv(data, FIRSTSOCKET, data->req.size);
1284
1285 /* not set by Curl_xfer_setup to preserve io_flags */
1286 data->conn->send_idx = 0;
1287
1288 sshc->sftp_recv_state = 0;
1289 myssh_to(data, sshc, SSH_STOP);
1290
1291 return rc;
1292}
1293
1294static int myssh_in_SFTP_CLOSE(struct Curl_easy *data,
1295 struct ssh_conn *sshc,
1296 struct SSHPROTO *sshp)
1297{
1298 if(!sshp)
1299 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1300 if(sshc->sftp_file) {
1301 sftp_close(sshc->sftp_file);
1302 sshc->sftp_file = NULL;
1303 }
1304 curlx_safefree(sshp->path);
1305
1306 CURL_TRC_SSH(data, "SFTP DONE done");
1307
1308 /* Check if nextstate is set and move .nextstate could be POSTQUOTE_INIT
1309 After nextstate is executed, the control should come back to
1310 SSH_SFTP_CLOSE to pass the correct result back */
1311 if(sshc->nextstate != SSH_NO_STATE &&
1312 sshc->nextstate != SSH_SFTP_CLOSE) {
1313 myssh_to(data, sshc, sshc->nextstate);
1314 sshc->nextstate = SSH_SFTP_CLOSE;
1315 }
1316 else {
1317 myssh_to(data, sshc, SSH_STOP);
1318 }
1319 return SSH_NO_ERROR;
1320}
1321
1322static int myssh_in_SFTP_SHUTDOWN(struct Curl_easy *data,
1323 struct ssh_conn *sshc)
1324{
1325 /* during times we get here due to a broken transfer and then the
1326 sftp_handle might not have been taken down so make sure that is done
1327 before we proceed */
1328 ssh_set_blocking(sshc->ssh_session, 0);
1329#if LIBSSH_VERSION_INT > SSH_VERSION_INT(0, 11, 0)
1330 SFTP_AIO_FREE(sshc->sftp_send_aio);
1331 SFTP_AIO_FREE(sshc->sftp_recv_aio);
1332#endif
1333
1334 if(sshc->sftp_file) {
1335 sftp_close(sshc->sftp_file);
1336 sshc->sftp_file = NULL;
1337 }
1338
1339 if(sshc->sftp_session) {
1340 sftp_free(sshc->sftp_session);
1341 sshc->sftp_session = NULL;
1342 }
1343
1344 SSH_STRING_FREE_CHAR(sshc->homedir);
1345
1346 myssh_to(data, sshc, SSH_SESSION_DISCONNECT);
1347 return SSH_NO_ERROR;
1348}
1349
1350static int myssh_in_SFTP_INIT(struct Curl_easy *data,
1351 struct ssh_conn *sshc)
1352{
1353 int rc;
1354 ssh_set_blocking(sshc->ssh_session, 1);
1355
1356 sshc->sftp_session = sftp_new(sshc->ssh_session);
1357 if(!sshc->sftp_session) {
1358 failf(data, "Failure initializing sftp session: %s",
1359 ssh_get_error(sshc->ssh_session));
1360 return myssh_to_ERROR(data, sshc, CURLE_COULDNT_CONNECT);
1361 }
1362
1363 rc = sftp_init(sshc->sftp_session);
1364 if(rc != SSH_OK) {
1365 failf(data, "Failure initializing sftp session: %s",
1366 ssh_get_error(sshc->ssh_session));
1367 return myssh_to_ERROR(data, sshc, sftp_error_to_CURLE(SSH_FX_FAILURE));
1368 }
1369 myssh_to(data, sshc, SSH_SFTP_REALPATH);
1370 return SSH_NO_ERROR;
1371}
1372
1373static int myssh_in_SFTP_REALPATH(struct Curl_easy *data,
1374 struct ssh_conn *sshc)
1375{
1376 /* Get the "home" directory */
1377 sshc->homedir = sftp_canonicalize_path(sshc->sftp_session, ".");
1378 if(!sshc->homedir)
1379 return myssh_to_ERROR(data, sshc, CURLE_COULDNT_CONNECT);
1380
1381 curlx_free(data->state.most_recent_ftp_entrypath);
1382 data->state.most_recent_ftp_entrypath = curlx_strdup(sshc->homedir);
1383 if(!data->state.most_recent_ftp_entrypath)
1384 return myssh_to_ERROR(data, sshc, CURLE_OUT_OF_MEMORY);
1385
1386 /* This is the last step in the SFTP connect phase. Do note that while
1387 we get the homedir here, we get the "workingpath" in the DO action
1388 since the homedir remains the same between request but the
1389 working path does not. */
1390 CURL_TRC_SSH(data, "CONNECT phase done");
1391 myssh_to(data, sshc, SSH_STOP);
1392 return SSH_NO_ERROR;
1393}
1394
1395static int myssh_in_SFTP_QUOTE_INIT(struct Curl_easy *data,
1396 struct ssh_conn *sshc,
1397 struct SSHPROTO *sshp)
1398{
1399 CURLcode result;
1400
1401 if(!sshp)
1402 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1403
1404 result = Curl_getworkingpath(data, sshc->homedir, &sshp->path);
1405 if(result) {
1406 sshc->actualcode = result;
1407 myssh_to(data, sshc, SSH_STOP);
1408 }
1409 else if(data->set.quote) {
1410 infof(data, "Sending quote commands");
1411 sshc->quote_item = data->set.quote;
1412 myssh_to(data, sshc, SSH_SFTP_QUOTE);
1413 }
1414 else
1415 myssh_to(data, sshc, SSH_SFTP_GETINFO);
1416 return SSH_NO_ERROR;
1417}
1418
1419static int myssh_in_SFTP_POSTQUOTE_INIT(struct Curl_easy *data,
1420 struct ssh_conn *sshc)
1421{
1422 if(data->set.postquote) {
1423 infof(data, "Sending quote commands");
1424 sshc->quote_item = data->set.postquote;
1425 myssh_to(data, sshc, SSH_SFTP_QUOTE);
1426 }
1427 else {
1428 myssh_to(data, sshc, SSH_STOP);
1429 }
1430 return SSH_NO_ERROR;
1431}
1432
1433static int quote_error(struct Curl_easy *data,
1434 struct ssh_conn *sshc)
1435{
1436 failf(data, "Suspicious data after the command line");
1437 curlx_safefree(sshc->quote_path1);
1438 curlx_safefree(sshc->quote_path2);
1439 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1440 sshc->nextstate = SSH_NO_STATE;
1441 sshc->actualcode = CURLE_QUOTE_ERROR;
1442 return SSH_NO_ERROR;
1443}
1444
1445static int myssh_in_SFTP_QUOTE(struct Curl_easy *data,
1446 struct ssh_conn *sshc,
1447 struct SSHPROTO *sshp)
1448{
1449 const char *cp;
1450 CURLcode result;
1451
1452 /*
1453 * Support some of the "FTP" commands
1454 */
1455 const char *cmd = sshc->quote_item->data;
1456 sshc->acceptfail = FALSE;
1457
1458 if(!sshp)
1459 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1460
1461 /* if a command starts with an asterisk, which a legal SFTP command never
1462 can, the command is allowed to fail without it causing any
1463 aborts or cancels etc. It causes libcurl to act as if the command
1464 is successful, whatever the server responds. */
1465
1466 if(cmd[0] == '*') {
1467 cmd++;
1468 sshc->acceptfail = TRUE;
1469 }
1470
1471 if(curl_strequal("pwd", cmd)) {
1472 /* output debug output if that is requested */
1473 char *tmp = curl_maprintf("257 \"%s\" is current directory.\n",
1474 sshp->path);
1475 if(!tmp) {
1476 sshc->actualcode = CURLE_OUT_OF_MEMORY;
1477 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1478 sshc->nextstate = SSH_NO_STATE;
1479 return SSH_NO_ERROR;
1480 }
1481 Curl_debug(data, CURLINFO_HEADER_OUT, "PWD\n", 4);
1482 Curl_debug(data, CURLINFO_HEADER_IN, tmp, strlen(tmp));
1483
1484 /* this sends an FTP-like "header" to the header callback so that
1485 the current directory can be read similar to how it is read when
1486 using ordinary FTP. */
1487 result = Curl_client_write(data, CLIENTWRITE_HEADER, tmp, strlen(tmp));
1488 curlx_free(tmp);
1489 if(result) {
1490 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1491 sshc->nextstate = SSH_NO_STATE;
1492 sshc->actualcode = result;
1493 }
1494 else
1495 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1496 return SSH_NO_ERROR;
1497 }
1498
1499 /*
1500 * the arguments following the command must be separated from the
1501 * command with a space so we can check for it unconditionally
1502 */
1503 cp = strchr(cmd, ' ');
1504 if(!cp) {
1505 failf(data, "Syntax error in SFTP command. Supply parameter(s)");
1506 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1507 sshc->nextstate = SSH_NO_STATE;
1508 sshc->actualcode = CURLE_QUOTE_ERROR;
1509 return SSH_NO_ERROR;
1510 }
1511
1512 /*
1513 * also, every command takes at least one argument so we get that
1514 * first argument right now
1515 */
1516 result = Curl_get_pathname(&cp, &sshc->quote_path1, sshc->homedir);
1517 if(result) {
1518 if(result == CURLE_OUT_OF_MEMORY)
1519 failf(data, "Out of memory");
1520 else
1521 failf(data, "Syntax error: Bad first parameter");
1522 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1523 sshc->nextstate = SSH_NO_STATE;
1524 sshc->actualcode = result;
1525 return SSH_NO_ERROR;
1526 }
1527
1528 /*
1529 * SFTP is a binary protocol, so we do not send text commands
1530 * to the server. Instead, we scan for commands used by
1531 * OpenSSH's sftp program and call the appropriate libssh
1532 * functions.
1533 */
1534 if(!strncmp(cmd, "chgrp ", 6) ||
1535 !strncmp(cmd, "chmod ", 6) ||
1536 !strncmp(cmd, "chown ", 6) ||
1537 !strncmp(cmd, "atime ", 6) ||
1538 !strncmp(cmd, "mtime ", 6)) {
1539 /* attribute change */
1540
1541 /* sshc->quote_path1 contains the mode to set */
1542 /* get the destination */
1543 result = Curl_get_pathname(&cp, &sshc->quote_path2, sshc->homedir);
1544 if(result) {
1545 if(result == CURLE_OUT_OF_MEMORY)
1546 failf(data, "Out of memory");
1547 else
1548 failf(data, "Syntax error in chgrp/chmod/chown/atime/mtime: "
1549 "Bad second parameter");
1550 curlx_safefree(sshc->quote_path1);
1551 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1552 sshc->nextstate = SSH_NO_STATE;
1553 sshc->actualcode = result;
1554 return SSH_NO_ERROR;
1555 }
1556 if(*cp)
1557 return quote_error(data, sshc);
1558 sshc->quote_attrs = NULL;
1559 myssh_to(data, sshc, SSH_SFTP_QUOTE_STAT);
1560 return SSH_NO_ERROR;
1561 }
1562 if(!strncmp(cmd, "ln ", 3) ||
1563 !strncmp(cmd, "symlink ", 8)) {
1564 /* symbolic linking */
1565 /* sshc->quote_path1 is the source */
1566 /* get the destination */
1567 result = Curl_get_pathname(&cp, &sshc->quote_path2, sshc->homedir);
1568 if(result) {
1569 if(result == CURLE_OUT_OF_MEMORY)
1570 failf(data, "Out of memory");
1571 else
1572 failf(data, "Syntax error in ln/symlink: Bad second parameter");
1573 curlx_safefree(sshc->quote_path1);
1574 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1575 sshc->nextstate = SSH_NO_STATE;
1576 sshc->actualcode = result;
1577 return SSH_NO_ERROR;
1578 }
1579 if(*cp)
1580 return quote_error(data, sshc);
1581 myssh_to(data, sshc, SSH_SFTP_QUOTE_SYMLINK);
1582 return SSH_NO_ERROR;
1583 }
1584 else if(!strncmp(cmd, "mkdir ", 6)) {
1585 if(*cp)
1586 return quote_error(data, sshc);
1587 /* create directory */
1588 myssh_to(data, sshc, SSH_SFTP_QUOTE_MKDIR);
1589 return SSH_NO_ERROR;
1590 }
1591 else if(!strncmp(cmd, "rename ", 7)) {
1592 /* rename file */
1593 /* first param is the source path */
1594 /* second param is the dest. path */
1595 result = Curl_get_pathname(&cp, &sshc->quote_path2, sshc->homedir);
1596 if(result) {
1597 if(result == CURLE_OUT_OF_MEMORY)
1598 failf(data, "Out of memory");
1599 else
1600 failf(data, "Syntax error in rename: Bad second parameter");
1601 curlx_safefree(sshc->quote_path1);
1602 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1603 sshc->nextstate = SSH_NO_STATE;
1604 sshc->actualcode = result;
1605 return SSH_NO_ERROR;
1606 }
1607 if(*cp)
1608 return quote_error(data, sshc);
1609 myssh_to(data, sshc, SSH_SFTP_QUOTE_RENAME);
1610 return SSH_NO_ERROR;
1611 }
1612 else if(!strncmp(cmd, "rmdir ", 6)) {
1613 /* delete directory */
1614 if(*cp)
1615 return quote_error(data, sshc);
1616 myssh_to(data, sshc, SSH_SFTP_QUOTE_RMDIR);
1617 return SSH_NO_ERROR;
1618 }
1619 else if(!strncmp(cmd, "rm ", 3)) {
1620 if(*cp)
1621 return quote_error(data, sshc);
1622 myssh_to(data, sshc, SSH_SFTP_QUOTE_UNLINK);
1623 return SSH_NO_ERROR;
1624 }
1625#ifdef HAS_STATVFS_SUPPORT
1626 else if(!strncmp(cmd, "statvfs ", 8)) {
1627 if(*cp)
1628 return quote_error(data, sshc);
1629 myssh_to(data, sshc, SSH_SFTP_QUOTE_STATVFS);
1630 return SSH_NO_ERROR;
1631 }
1632#endif
1633
1634 failf(data, "Unknown SFTP command");
1635 curlx_safefree(sshc->quote_path1);
1636 curlx_safefree(sshc->quote_path2);
1637 myssh_to(data, sshc, SSH_SFTP_CLOSE);
1638 sshc->nextstate = SSH_NO_STATE;
1639 sshc->actualcode = CURLE_QUOTE_ERROR;
1640 return SSH_NO_ERROR;
1641}
1642
1643static int myssh_in_SFTP_NEXT_QUOTE(struct Curl_easy *data,
1644 struct ssh_conn *sshc)
1645{
1646 curlx_safefree(sshc->quote_path1);
1647 curlx_safefree(sshc->quote_path2);
1648
1649 sshc->quote_item = sshc->quote_item->next;
1650
1651 if(sshc->quote_item) {
1652 myssh_to(data, sshc, SSH_SFTP_QUOTE);
1653 }
1654 else {
1655 if(sshc->nextstate != SSH_NO_STATE) {
1656 myssh_to(data, sshc, sshc->nextstate);
1657 sshc->nextstate = SSH_NO_STATE;
1658 }
1659 else {
1660 myssh_to(data, sshc, SSH_SFTP_GETINFO);
1661 }
1662 }
1663 return SSH_NO_ERROR;
1664}
1665
1666static int myssh_in_SFTP_QUOTE_STAT(struct Curl_easy *data,
1667 struct ssh_conn *sshc)
1668{
1669 const char *cmd = sshc->quote_item->data;
1670 sshc->acceptfail = FALSE;
1671
1672 /* if a command starts with an asterisk, which a legal SFTP command never
1673 can, the command is allowed to fail without it causing any
1674 aborts or cancels etc. It causes libcurl to act as if the command
1675 is successful, whatever the server responds. */
1676
1677 if(cmd[0] == '*') {
1678 cmd++;
1679 sshc->acceptfail = TRUE;
1680 }
1681
1682 /* We read the file attributes, store them in sshc->quote_attrs
1683 * and modify them accordingly to command. Then we switch to
1684 * QUOTE_SETSTAT state to write new ones.
1685 */
1686
1687 if(sshc->quote_attrs)
1688 sftp_attributes_free(sshc->quote_attrs);
1689 sshc->quote_attrs = sftp_stat(sshc->sftp_session, sshc->quote_path2);
1690 if(!sshc->quote_attrs) {
1691 failf(data, "Attempt to get SFTP stats failed: %d",
1692 sftp_get_error(sshc->sftp_session));
1693 myssh_quote_error(data, sshc, NULL);
1694 return SSH_NO_ERROR;
1695 }
1696
1697 /* Now set the new attributes... */
1698 if(!strncmp(cmd, "chgrp", 5)) {
1699 const char *p = sshc->quote_path1;
1700 curl_off_t gid;
1701 if(curlx_str_number(&p, &gid, UINT_MAX)) {
1702 failf(data, "Syntax error: chgrp gid not a number");
1703 myssh_quote_error(data, sshc, NULL);
1704 return SSH_NO_ERROR;
1705 }
1706 sshc->quote_attrs->gid = (uint32_t)gid;
1707 sshc->quote_attrs->flags |= SSH_FILEXFER_ATTR_UIDGID;
1708 }
1709 else if(!strncmp(cmd, "chmod", 5)) {
1710 curl_off_t perms;
1711 const char *p = sshc->quote_path1;
1712 if(curlx_str_octal(&p, &perms, 07777)) {
1713 failf(data, "Syntax error: chmod permissions not a number");
1714 myssh_quote_error(data, sshc, NULL);
1715 return SSH_NO_ERROR;
1716 }
1717 sshc->quote_attrs->permissions = (mode_t)perms;
1718 sshc->quote_attrs->flags |= SSH_FILEXFER_ATTR_PERMISSIONS;
1719 }
1720 else if(!strncmp(cmd, "chown", 5)) {
1721 const char *p = sshc->quote_path1;
1722 curl_off_t uid;
1723 if(curlx_str_number(&p, &uid, UINT_MAX)) {
1724 failf(data, "Syntax error: chown uid not a number");
1725 myssh_quote_error(data, sshc, NULL);
1726 return SSH_NO_ERROR;
1727 }
1728 sshc->quote_attrs->uid = (uint32_t)uid;
1729 sshc->quote_attrs->flags |= SSH_FILEXFER_ATTR_UIDGID;
1730 }
1731 else if(!strncmp(cmd, "atime", 5) ||
1732 !strncmp(cmd, "mtime", 5)) {
1733 time_t date;
1734 bool fail = FALSE;
1735 if(Curl_getdate_capped(sshc->quote_path1, &date)) {
1736 failf(data, "incorrect date format for %.*s", 5, cmd);
1737 fail = TRUE;
1738 }
1739#if SIZEOF_TIME_T > 4
1740 else if(date > 0xffffffff) {
1741 failf(data, "date overflow");
1742 fail = TRUE; /* avoid setting a capped time */
1743 }
1744#endif
1745 if(fail) {
1746 myssh_quote_error(data, sshc, NULL);
1747 return SSH_NO_ERROR;
1748 }
1749 if(!strncmp(cmd, "atime", 5))
1750 sshc->quote_attrs->atime = (uint32_t)date;
1751 else /* mtime */
1752 sshc->quote_attrs->mtime = (uint32_t)date;
1753
1754 sshc->quote_attrs->flags |= SSH_FILEXFER_ATTR_ACMODTIME;
1755 }
1756
1757 /* Now send the completed structure... */
1758 myssh_to(data, sshc, SSH_SFTP_QUOTE_SETSTAT);
1759 return SSH_NO_ERROR;
1760}
1761
1762static void conn_forget_socket(struct Curl_easy *data, int sockindex)
1763{
1764 struct connectdata *conn = data->conn;
1765 if(conn && CONN_SOCK_IDX_VALID(sockindex)) {
1766 struct Curl_cfilter *cf = conn->cfilter[sockindex];
1767 if(cf)
1768 (void)Curl_conn_cf_cntrl(cf, data, TRUE, CF_CTRL_FORGET_SOCKET, 0, NULL);
1769 fake_sclose(conn->sock[sockindex]);
1770 conn->sock[sockindex] = CURL_SOCKET_BAD;
1771 }
1772}
1773
1774static void myssh_SESSION_DISCONNECT(struct Curl_easy *data,
1775 struct ssh_conn *sshc)
1776{
1777 /* during weird times when we have been prematurely aborted, the channel
1778 is still alive when we reach this state and we MUST kill the channel
1779 properly first */
1780 if(sshc->scp_session) {
1781 ssh_scp_free(sshc->scp_session);
1782 sshc->scp_session = NULL;
1783 }
1784
1785 if(sshc->sftp_file) {
1786 sftp_close(sshc->sftp_file);
1787 sshc->sftp_file = NULL;
1788 }
1789 if(sshc->sftp_session) {
1790 sftp_free(sshc->sftp_session);
1791 sshc->sftp_session = NULL;
1792 }
1793
1794 ssh_disconnect(sshc->ssh_session);
1795 if(!ssh_version(SSH_VERSION_INT(0, 10, 0))) {
1796 /* conn->sock[FIRSTSOCKET] is closed by ssh_disconnect behind our back,
1797 tell the connection to forget about it. This libssh
1798 bug is fixed in 0.10.0. */
1799 conn_forget_socket(data, FIRSTSOCKET);
1800 }
1801
1802 SSH_STRING_FREE_CHAR(sshc->homedir);
1803
1804 myssh_to(data, sshc, SSH_SESSION_FREE);
1805}
1806
1807static int myssh_SSH_SCP_DOWNLOAD(struct Curl_easy *data,
1808 struct ssh_conn *sshc)
1809{
1810 curl_off_t bytecount;
1811 int rc = ssh_scp_pull_request(sshc->scp_session);
1812 if(rc != SSH_SCP_REQUEST_NEWFILE) {
1813 const char *err_msg = ssh_get_error(sshc->ssh_session);
1814 failf(data, "%s", err_msg);
1815 return myssh_to_ERROR(data, sshc, CURLE_REMOTE_FILE_NOT_FOUND);
1816 }
1817
1818 /* download data */
1819 bytecount = ssh_scp_request_get_size(sshc->scp_session);
1820 data->req.maxdownload = bytecount;
1821 Curl_xfer_setup_recv(data, FIRSTSOCKET, bytecount);
1822
1823 /* not set by Curl_xfer_setup to preserve io_flags */
1824 data->conn->send_idx = 0;
1825
1826 myssh_to(data, sshc, SSH_STOP);
1827 return 0;
1828}
1829
1830static int myssh_in_TRANS_INIT(struct Curl_easy *data, struct ssh_conn *sshc,
1831 struct SSHPROTO *sshp)
1832{
1833 CURLcode result;
1834 int rc = 0;
1835 if(!sshp)
1836 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
1837
1838 result = Curl_getworkingpath(data, sshc->homedir, &sshp->path);
1839 if(result) {
1840 sshc->actualcode = result;
1841 myssh_to(data, sshc, SSH_STOP);
1842 return 0;
1843 }
1844
1845 /* Functions from the SCP subsystem cannot handle/return SSH_AGAIN */
1846 ssh_set_blocking(sshc->ssh_session, 1);
1847
1848 if(data->state.upload) {
1849 if(data->state.infilesize < 0) {
1850 failf(data, "SCP requires a known file size for upload");
1851 return myssh_to_ERROR(data, sshc, CURLE_UPLOAD_FAILED);
1852 }
1853
1854 sshc->scp_session =
1855 ssh_scp_new(sshc->ssh_session, SSH_SCP_WRITE, sshp->path);
1856 myssh_to(data, sshc, SSH_SCP_UPLOAD_INIT);
1857 }
1858 else {
1859 sshc->scp_session =
1860 ssh_scp_new(sshc->ssh_session, SSH_SCP_READ, sshp->path);
1861 myssh_to(data, sshc, SSH_SCP_DOWNLOAD_INIT);
1862 }
1863
1864 if(!sshc->scp_session) {
1865 const char *err_msg = ssh_get_error(sshc->ssh_session);
1866 failf(data, "%s", err_msg);
1867 rc = myssh_to_ERROR(data, sshc, CURLE_UPLOAD_FAILED);
1868 }
1869 return rc;
1870}
1871
1872static void sshc_cleanup(struct ssh_conn *sshc)
1873{
1874 if(sshc->initialized) {
1875 if(sshc->sftp_file) {
1876 sftp_close(sshc->sftp_file);
1877 sshc->sftp_file = NULL;
1878 }
1879 if(sshc->sftp_session) {
1880 sftp_free(sshc->sftp_session);
1881 sshc->sftp_session = NULL;
1882 }
1883 if(sshc->ssh_session) {
1884 ssh_free(sshc->ssh_session);
1885 sshc->ssh_session = NULL;
1886 }
1887
1888 /* worst-case scenario cleanup */
1889 DEBUGASSERT(sshc->ssh_session == NULL);
1890 DEBUGASSERT(sshc->scp_session == NULL);
1891
1892 if(sshc->readdir_tmp) {
1893 ssh_string_free_char(sshc->readdir_tmp);
1894 sshc->readdir_tmp = NULL;
1895 }
1896 if(sshc->quote_attrs) {
1897 sftp_attributes_free(sshc->quote_attrs);
1898 sshc->quote_attrs = NULL;
1899 }
1900 if(sshc->readdir_attrs) {
1901 sftp_attributes_free(sshc->readdir_attrs);
1902 sshc->readdir_attrs = NULL;
1903 }
1904 if(sshc->readdir_link_attrs) {
1905 sftp_attributes_free(sshc->readdir_link_attrs);
1906 sshc->readdir_link_attrs = NULL;
1907 }
1908 if(sshc->privkey) {
1909 ssh_key_free(sshc->privkey);
1910 sshc->privkey = NULL;
1911 }
1912 if(sshc->pubkey) {
1913 ssh_key_free(sshc->pubkey);
1914 sshc->pubkey = NULL;
1915 }
1916
1917 curlx_safefree(sshc->rsa_pub);
1918 curlx_safefree(sshc->rsa);
1919 curlx_safefree(sshc->quote_path1);
1920 curlx_safefree(sshc->quote_path2);
1921 curlx_dyn_free(&sshc->readdir_buf);
1922 curlx_safefree(sshc->readdir_linkPath);
1923 SSH_STRING_FREE_CHAR(sshc->homedir);
1924 sshc->initialized = FALSE;
1925 }
1926}
1927
1928static int myssh_in_SFTP_QUOTE_SETSTAT(struct Curl_easy *data,
1929 struct ssh_conn *sshc)
1930{
1931 int rc = sftp_setstat(sshc->sftp_session, sshc->quote_path2,
1932 sshc->quote_attrs);
1933 if(rc == SSH_AGAIN)
1934 return rc;
1935 if(rc && !sshc->acceptfail) {
1936 myssh_quote_error(data, sshc, "setstat");
1937 return rc;
1938 }
1939 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1940 return SSH_NO_ERROR;
1941}
1942
1943static int myssh_in_SFTP_QUOTE_SYMLINK(struct Curl_easy *data,
1944 struct ssh_conn *sshc)
1945{
1946 int rc = sftp_symlink(sshc->sftp_session, sshc->quote_path2,
1947 sshc->quote_path1);
1948 if(rc == SSH_AGAIN)
1949 return rc;
1950 if(rc && !sshc->acceptfail) {
1951 myssh_quote_error(data, sshc, "symlink");
1952 return rc;
1953 }
1954 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1955 return SSH_NO_ERROR;
1956}
1957
1958static int myssh_in_SFTP_QUOTE_MKDIR(struct Curl_easy *data,
1959 struct ssh_conn *sshc)
1960{
1961 int rc = sftp_mkdir(sshc->sftp_session, sshc->quote_path1,
1962 (mode_t)data->set.new_directory_perms);
1963 if(rc == SSH_AGAIN)
1964 return rc;
1965 if(rc && !sshc->acceptfail) {
1966 myssh_quote_error(data, sshc, "mkdir");
1967 return rc;
1968 }
1969 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1970 return SSH_NO_ERROR;
1971}
1972
1973static int myssh_in_SFTP_QUOTE_RENAME(struct Curl_easy *data,
1974 struct ssh_conn *sshc)
1975{
1976 int rc = sftp_rename(sshc->sftp_session, sshc->quote_path1,
1977 sshc->quote_path2);
1978 if(rc == SSH_AGAIN)
1979 return rc;
1980 if(rc && !sshc->acceptfail) {
1981 myssh_quote_error(data, sshc, "rename");
1982 return rc;
1983 }
1984 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1985 return SSH_NO_ERROR;
1986}
1987
1988static int myssh_in_SFTP_QUOTE_RMDIR(struct Curl_easy *data,
1989 struct ssh_conn *sshc)
1990{
1991 int rc = sftp_rmdir(sshc->sftp_session, sshc->quote_path1);
1992 if(rc == SSH_AGAIN)
1993 return rc;
1994 if(rc && !sshc->acceptfail) {
1995 myssh_quote_error(data, sshc, "rmdir");
1996 return rc;
1997 }
1998 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
1999 return SSH_NO_ERROR;
2000}
2001
2002static int myssh_in_SFTP_QUOTE_UNLINK(struct Curl_easy *data,
2003 struct ssh_conn *sshc)
2004{
2005 int rc = sftp_unlink(sshc->sftp_session, sshc->quote_path1);
2006 if(rc == SSH_AGAIN)
2007 return rc;
2008 if(rc && !sshc->acceptfail) {
2009 myssh_quote_error(data, sshc, "rm");
2010 return rc;
2011 }
2012 myssh_to(data, sshc, SSH_SFTP_NEXT_QUOTE);
2013 return SSH_NO_ERROR;
2014}
2015
2016static int myssh_in_SFTP_GETINFO(struct Curl_easy *data,
2017 struct ssh_conn *sshc)
2018{
2019 if(data->set.get_filetime)
2020 myssh_to(data, sshc, SSH_SFTP_FILETIME);
2021 else
2022 myssh_to(data, sshc, SSH_SFTP_TRANS_INIT);
2023 return SSH_NO_ERROR;
2024}
2025
2026static int myssh_in_SFTP_FILETIME(struct Curl_easy *data,
2027 struct ssh_conn *sshc,
2028 struct SSHPROTO *sshp)
2029{
2030 sftp_attributes attrs;
2031 if(!sshp)
2032 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2033
2034 attrs = sftp_stat(sshc->sftp_session, sshp->path);
2035 if(attrs) {
2036 data->info.filetime = attrs->mtime;
2037 sftp_attributes_free(attrs);
2038 }
2039
2040 myssh_to(data, sshc, SSH_SFTP_TRANS_INIT);
2041 return SSH_NO_ERROR;
2042}
2043
2044static int myssh_in_SFTP_TRANS_INIT(struct Curl_easy *data,
2045 struct ssh_conn *sshc,
2046 struct SSHPROTO *sshp)
2047{
2048 if(!sshp)
2049 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2050 if(data->state.upload)
2051 myssh_to(data, sshc, SSH_SFTP_UPLOAD_INIT);
2052 else {
2053 size_t path_len = strlen(sshp->path);
2054
2055 if(path_len && sshp->path[path_len - 1] == '/')
2056 myssh_to(data, sshc, SSH_SFTP_READDIR_INIT);
2057 else
2058 myssh_to(data, sshc, SSH_SFTP_DOWNLOAD_INIT);
2059 }
2060
2061 return SSH_NO_ERROR;
2062}
2063
2064static int myssh_in_SFTP_CREATE_DIRS_INIT(struct Curl_easy *data,
2065 struct ssh_conn *sshc,
2066 struct SSHPROTO *sshp)
2067{
2068 if(!sshp)
2069 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2070
2071 if(strlen(sshp->path) > 1) {
2072 sshc->slash_pos = sshp->path + 1; /* ignore the leading '/' */
2073 myssh_to(data, sshc, SSH_SFTP_CREATE_DIRS);
2074 }
2075 else {
2076 myssh_to(data, sshc, SSH_SFTP_UPLOAD_INIT);
2077 }
2078 return SSH_NO_ERROR;
2079}
2080
2081static int myssh_in_SFTP_CREATE_DIRS(struct Curl_easy *data,
2082 struct ssh_conn *sshc,
2083 struct SSHPROTO *sshp)
2084{
2085 if(!sshp)
2086 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2087
2088 sshc->slash_pos = strchr(sshc->slash_pos, '/');
2089 if(sshc->slash_pos) {
2090 *sshc->slash_pos = 0;
2091
2092 infof(data, "Creating directory '%s'", sshp->path);
2093 myssh_to(data, sshc, SSH_SFTP_CREATE_DIRS_MKDIR);
2094 return SSH_NO_ERROR;
2095 }
2096 myssh_to(data, sshc, SSH_SFTP_UPLOAD_INIT);
2097 return SSH_NO_ERROR;
2098}
2099
2100static int myssh_in_SFTP_CREATE_DIRS_MKDIR(struct Curl_easy *data,
2101 struct ssh_conn *sshc,
2102 struct SSHPROTO *sshp)
2103{
2104 int rc;
2105 int err;
2106 /* 'mode' - parameter is preliminary - default to 0644 */
2107 if(!sshp)
2108 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2109
2110 rc = sftp_mkdir(sshc->sftp_session, sshp->path,
2111 (mode_t)data->set.new_directory_perms);
2112 if(rc == SSH_AGAIN)
2113 return rc;
2114 *sshc->slash_pos = '/';
2115 ++sshc->slash_pos;
2116 if(rc < 0) {
2117 /*
2118 * Abort if failure was not that the directory already
2119 * exists or the permission was denied (creation might
2120 * succeed further down the path) - retry on unspecific
2121 * FAILURE also
2122 */
2123 err = sftp_get_error(sshc->sftp_session);
2124 if((err != SSH_FX_FILE_ALREADY_EXISTS) &&
2125 (err != SSH_FX_FAILURE) &&
2126 (err != SSH_FX_PERMISSION_DENIED)) {
2127 return myssh_to_SFTP_CLOSE(data, sshc);
2128 }
2129 rc = 0; /* clear rc and continue */
2130 }
2131 myssh_to(data, sshc, SSH_SFTP_CREATE_DIRS);
2132 return rc;
2133}
2134
2135static int myssh_in_SCP_UPLOAD_INIT(struct Curl_easy *data,
2136 struct ssh_conn *sshc,
2137 struct SSHPROTO *sshp)
2138{
2139 int rc;
2140 if(!sshp)
2141 return myssh_to_ERROR(data, sshc, CURLE_FAILED_INIT);
2142
2143 rc = ssh_scp_init(sshc->scp_session);
2144 if(rc != SSH_OK) {
2145 const char *err_msg = ssh_get_error(sshc->ssh_session);
2146 failf(data, "%s", err_msg);
2147 return myssh_to_ERROR(data, sshc, CURLE_UPLOAD_FAILED);
2148 }
2149
2150 rc = ssh_scp_push_file64(sshc->scp_session, sshp->path,
2151 (uint64_t)data->state.infilesize,
2152 (int)data->set.new_file_perms);
2153
2154 if(rc != SSH_OK) {
2155 const char *err_msg = ssh_get_error(sshc->ssh_session);
2156 failf(data, "%s", err_msg);
2157 return myssh_to_ERROR(data, sshc, CURLE_UPLOAD_FAILED);
2158 }
2159
2160 /* upload data */
2161 Curl_xfer_setup_send(data, FIRSTSOCKET);
2162
2163 /* not set by Curl_xfer_setup to preserve io_flags */
2164 data->conn->recv_idx = FIRSTSOCKET;
2165
2166 myssh_to(data, sshc, SSH_STOP);
2167 return SSH_NO_ERROR;
2168}
2169
2170static int myssh_in_SCP_DOWNLOAD_INIT(struct Curl_easy *data,
2171 struct ssh_conn *sshc)
2172{
2173 int rc = ssh_scp_init(sshc->scp_session);
2174 if(rc != SSH_OK) {
2175 const char *err_msg = ssh_get_error(sshc->ssh_session);
2176 failf(data, "%s", err_msg);
2177 return myssh_to_ERROR(data, sshc,
2178 CURLE_COULDNT_CONNECT);
2179 }
2180 myssh_to(data, sshc, SSH_SCP_DOWNLOAD);
2181 return SSH_NO_ERROR;
2182}
2183
2184static int myssh_in_SCP_DONE(struct Curl_easy *data,
2185 struct ssh_conn *sshc)
2186{
2187 if(data->state.upload)
2188 myssh_to(data, sshc, SSH_SCP_SEND_EOF);
2189 else
2190 myssh_to(data, sshc, SSH_SCP_CHANNEL_FREE);
2191 return SSH_NO_ERROR;
2192}
2193
2194static int myssh_in_SCP_SEND_EOF(struct Curl_easy *data,
2195 struct ssh_conn *sshc)
2196{
2197 if(sshc->scp_session) {
2198 int rc = ssh_scp_close(sshc->scp_session);
2199 if(rc == SSH_AGAIN) {
2200 /* Currently the ssh_scp_close handles waiting for
2201 * EOF in blocking way.
2202 */
2203 return SSH_AGAIN;
2204 }
2205 if(rc != SSH_OK) {
2206 infof(data,
2207 "Failed to close libssh scp channel: %s",
2208 ssh_get_error(sshc->ssh_session));
2209 }
2210 }
2211
2212 myssh_to(data, sshc, SSH_SCP_CHANNEL_FREE);
2213 return SSH_NO_ERROR;
2214}
2215
2216static int myssh_in_SCP_CHANNEL_FREE(struct Curl_easy *data,
2217 struct ssh_conn *sshc)
2218{
2219 if(sshc->scp_session) {
2220 ssh_scp_free(sshc->scp_session);
2221 sshc->scp_session = NULL;
2222 }
2223 CURL_TRC_SSH(data, "SCP DONE phase complete");
2224
2225 ssh_set_blocking(sshc->ssh_session, 0);
2226
2227 myssh_to(data, sshc, SSH_SESSION_DISCONNECT);
2228 return SSH_NO_ERROR;
2229}
2230
2231static CURLcode myssh_in_SESSION_FREE(struct Curl_easy *data,
2232 struct ssh_conn *sshc)
2233{
2234 CURLcode result;
2235 sshc_cleanup(sshc);
2236 /* the code we are about to return */
2237 result = sshc->actualcode;
2238 memset(sshc, 0, sizeof(struct ssh_conn));
2239 connclose(data->conn, "SSH session free");
2240 sshc->state = SSH_SESSION_FREE; /* current */
2241 sshc->nextstate = SSH_NO_STATE;
2242 myssh_to(data, sshc, SSH_STOP);
2243 return result;
2244}
2245
2246/*
2247 * myssh_statemachine() runs the SSH state machine as far as it can without
2248 * blocking and without reaching the end. The data the pointer 'block' points
2249 * to is set to TRUE if the libssh function returns SSH_AGAIN
2250 * meaning it wants to be called again when the socket is ready
2251 */
2252static CURLcode myssh_statemachine(struct Curl_easy *data,
2253 struct ssh_conn *sshc,
2254 struct SSHPROTO *sshp,
2255 bool *block)
2256{
2257 CURLcode result = CURLE_OK;
2258 int rc = SSH_NO_ERROR;
2259
2260 *block = FALSE; /* we are not blocking by default */
2261 do {
2262
2263 switch(sshc->state) {
2264 case SSH_INIT:
2265 myssh_state_init(data, sshc);
2266 FALLTHROUGH();
2267 case SSH_S_STARTUP:
2268 rc = myssh_in_S_STARTUP(data, sshc);
2269 if(rc)
2270 break;
2271 FALLTHROUGH();
2272 case SSH_HOSTKEY:
2273 rc = myssh_is_known(data, sshc);
2274 if(rc != SSH_OK) {
2275 rc = myssh_to_ERROR(data, sshc, CURLE_PEER_FAILED_VERIFICATION);
2276 break;
2277 }
2278 myssh_to(data, sshc, SSH_AUTHLIST);
2279 FALLTHROUGH();
2280 case SSH_AUTHLIST:
2281 rc = myssh_in_AUTHLIST(data, sshc);
2282 break;
2283 case SSH_AUTH_PKEY_INIT:
2284 rc = myssh_in_AUTH_PKEY_INIT(data, sshc);
2285 break;
2286 case SSH_AUTH_PKEY:
2287 rc = myssh_in_AUTH_PKEY(data, sshc);
2288 break;
2289 case SSH_AUTH_GSSAPI:
2290 rc = myssh_in_AUTH_GSSAPI(data, sshc);
2291 break;
2292 case SSH_AUTH_KEY_INIT:
2293 rc = myssh_in_AUTH_KEY_INIT(data, sshc);
2294 break;
2295 case SSH_AUTH_KEY:
2296 rc = myssh_in_AUTH_KEY(data, sshc);
2297 break;
2298 case SSH_AUTH_PASS_INIT:
2299 rc = myssh_in_AUTH_PASS_INIT(data, sshc);
2300 break;
2301 case SSH_AUTH_PASS:
2302 rc = myssh_in_AUTH_PASS(data, sshc);
2303 break;
2304 case SSH_AUTH_DONE:
2305 rc = myssh_in_AUTH_DONE(data, sshc);
2306 break;
2307 case SSH_SFTP_INIT:
2308 rc = myssh_in_SFTP_INIT(data, sshc);
2309 break;
2310 case SSH_SFTP_REALPATH:
2311 rc = myssh_in_SFTP_REALPATH(data, sshc);
2312 break;
2313 case SSH_SFTP_QUOTE_INIT:
2314 rc = myssh_in_SFTP_QUOTE_INIT(data, sshc, sshp);
2315 break;
2316 case SSH_SFTP_POSTQUOTE_INIT:
2317 rc = myssh_in_SFTP_POSTQUOTE_INIT(data, sshc);
2318 break;
2319 case SSH_SFTP_QUOTE:
2320 rc = myssh_in_SFTP_QUOTE(data, sshc, sshp);
2321 break;
2322 case SSH_SFTP_NEXT_QUOTE:
2323 rc = myssh_in_SFTP_NEXT_QUOTE(data, sshc);
2324 break;
2325 case SSH_SFTP_QUOTE_STAT:
2326 rc = myssh_in_SFTP_QUOTE_STAT(data, sshc);
2327 break;
2328 case SSH_SFTP_QUOTE_SETSTAT:
2329 rc = myssh_in_SFTP_QUOTE_SETSTAT(data, sshc);
2330 break;
2331 case SSH_SFTP_QUOTE_SYMLINK:
2332 rc = myssh_in_SFTP_QUOTE_SYMLINK(data, sshc);
2333 break;
2334 case SSH_SFTP_QUOTE_MKDIR:
2335 rc = myssh_in_SFTP_QUOTE_MKDIR(data, sshc);
2336 break;
2337 case SSH_SFTP_QUOTE_RENAME:
2338 rc = myssh_in_SFTP_QUOTE_RENAME(data, sshc);
2339 break;
2340 case SSH_SFTP_QUOTE_RMDIR:
2341 rc = myssh_in_SFTP_QUOTE_RMDIR(data, sshc);
2342 break;
2343 case SSH_SFTP_QUOTE_UNLINK:
2344 rc = myssh_in_SFTP_QUOTE_UNLINK(data, sshc);
2345 break;
2346 case SSH_SFTP_QUOTE_STATVFS:
2347 rc = myssh_in_SFTP_QUOTE_STATVFS(data, sshc);
2348 break;
2349 case SSH_SFTP_GETINFO:
2350 rc = myssh_in_SFTP_GETINFO(data, sshc);
2351 break;
2352 case SSH_SFTP_FILETIME:
2353 rc = myssh_in_SFTP_FILETIME(data, sshc, sshp);
2354 break;
2355 case SSH_SFTP_TRANS_INIT:
2356 rc = myssh_in_SFTP_TRANS_INIT(data, sshc, sshp);
2357 break;
2358 case SSH_SFTP_UPLOAD_INIT:
2359 rc = myssh_in_UPLOAD_INIT(data, sshc, sshp);
2360 break;
2361 case SSH_SFTP_CREATE_DIRS_INIT:
2362 rc = myssh_in_SFTP_CREATE_DIRS_INIT(data, sshc, sshp);
2363 break;
2364 case SSH_SFTP_CREATE_DIRS:
2365 rc = myssh_in_SFTP_CREATE_DIRS(data, sshc, sshp);
2366 break;
2367 case SSH_SFTP_CREATE_DIRS_MKDIR:
2368 rc = myssh_in_SFTP_CREATE_DIRS_MKDIR(data, sshc, sshp);
2369 break;
2370 case SSH_SFTP_READDIR_INIT:
2371 rc = myssh_in_SFTP_READDIR_INIT(data, sshc, sshp);
2372 break;
2373 case SSH_SFTP_READDIR:
2374 rc = myssh_in_SFTP_READDIR(data, sshc, sshp);
2375 break;
2376 case SSH_SFTP_READDIR_LINK:
2377 rc = myssh_in_SFTP_READDIR_LINK(data, sshc);
2378 break;
2379 case SSH_SFTP_READDIR_BOTTOM:
2380 rc = myssh_in_SFTP_READDIR_BOTTOM(data, sshc);
2381 break;
2382 case SSH_SFTP_READDIR_DONE:
2383 rc = myssh_in_SFTP_READDIR_DONE(data, sshc);
2384 break;
2385 case SSH_SFTP_DOWNLOAD_INIT:
2386 rc = myssh_in_SFTP_DOWNLOAD_INIT(data, sshc, sshp);
2387 break;
2388 case SSH_SFTP_DOWNLOAD_STAT:
2389 rc = myssh_in_SFTP_DOWNLOAD_STAT(data, sshc);
2390 break;
2391 case SSH_SFTP_CLOSE:
2392 rc = myssh_in_SFTP_CLOSE(data, sshc, sshp);
2393 break;
2394 case SSH_SFTP_SHUTDOWN:
2395 rc = myssh_in_SFTP_SHUTDOWN(data, sshc);
2396 break;
2397 case SSH_SCP_TRANS_INIT:
2398 rc = myssh_in_TRANS_INIT(data, sshc, sshp);
2399 break;
2400 case SSH_SCP_UPLOAD_INIT:
2401 rc = myssh_in_SCP_UPLOAD_INIT(data, sshc, sshp);
2402 break;
2403 case SSH_SCP_DOWNLOAD_INIT:
2404 rc = myssh_in_SCP_DOWNLOAD_INIT(data, sshc);
2405 if(rc)
2406 break;
2407 FALLTHROUGH();
2408 case SSH_SCP_DOWNLOAD:
2409 rc = myssh_SSH_SCP_DOWNLOAD(data, sshc);
2410 break;
2411 case SSH_SCP_DONE:
2412 rc = myssh_in_SCP_DONE(data, sshc);
2413 break;
2414 case SSH_SCP_SEND_EOF:
2415 rc = myssh_in_SCP_SEND_EOF(data, sshc);
2416 break;
2417 case SSH_SCP_CHANNEL_FREE:
2418 myssh_in_SCP_CHANNEL_FREE(data, sshc);
2419 FALLTHROUGH();
2420 case SSH_SESSION_DISCONNECT:
2421 myssh_SESSION_DISCONNECT(data, sshc);
2422 FALLTHROUGH();
2423 case SSH_SESSION_FREE:
2424 result = myssh_in_SESSION_FREE(data, sshc);
2425 break;
2426 case SSH_QUIT:
2427 default:
2428 /* internal error */
2429 sshc->nextstate = SSH_NO_STATE;
2430 myssh_to(data, sshc, SSH_STOP);
2431 break;
2432 }
2433 /* break the loop only on STOP or SSH_AGAIN. If `rc` is some
2434 * other error code, we will have progressed the state accordingly. */
2435 } while((rc != SSH_AGAIN) && (sshc->state != SSH_STOP));
2436
2437 if(rc == SSH_AGAIN) {
2438 /* we would block, we need to wait for the socket to be ready (in the
2439 right direction too)! */
2440 *block = TRUE;
2441 }
2442 if(!result && (sshc->state == SSH_STOP))
2443 result = sshc->actualcode;
2444 CURL_TRC_SSH(data, "[%s] statemachine() -> %d, block=%d",
2445 Curl_ssh_statename(sshc->state), result, *block);
2446 return result;
2447}
2448
2449/* called by the multi interface to figure out what socket(s) to wait for and
2450 for what actions in the DO_DONE, PERFORM and WAITPERFORM states */
2451static CURLcode myssh_pollset(struct Curl_easy *data,
2452 struct easy_pollset *ps)
2453{
2454 struct connectdata *conn = data->conn;
2455 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2456 curl_socket_t sock = conn->sock[FIRSTSOCKET];
2457 int waitfor;
2458
2459 if(!sshc || (sock == CURL_SOCKET_BAD))
2460 return CURLE_FAILED_INIT;
2461
2462 waitfor = sshc->waitfor ? sshc->waitfor : data->req.io_flags;
2463 if(waitfor) {
2464 int flags = 0;
2465 if(waitfor & REQ_IO_RECV)
2466 flags |= CURL_POLL_IN;
2467 if(waitfor & REQ_IO_SEND)
2468 flags |= CURL_POLL_OUT;
2469 DEBUGASSERT(flags);
2470 CURL_TRC_SSH(data, "pollset, flags=%x", flags);
2471 return Curl_pollset_change(data, ps, sock, flags, 0);
2472 }
2473 /* While we still have a session, we listen incoming data. */
2474 if(sshc->ssh_session)
2475 return Curl_pollset_change(data, ps, sock, CURL_POLL_IN, 0);
2476 return CURLE_OK;
2477}
2478
2479/* called repeatedly until done from multi.c */
2480static CURLcode myssh_multi_statemach(struct Curl_easy *data,
2481 bool *done)
2482{
2483 struct connectdata *conn = data->conn;
2484 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2485 struct SSHPROTO *sshp = Curl_meta_get(data, CURL_META_SSH_EASY);
2486 bool block; /* we store the status and use that to provide a ssh_pollset()
2487 implementation */
2488 CURLcode result;
2489
2490 if(!sshc || !sshp)
2491 return CURLE_FAILED_INIT;
2492 result = myssh_statemachine(data, sshc, sshp, &block);
2493 *done = (sshc->state == SSH_STOP);
2494 myssh_block2waitfor(conn, sshc, block);
2495
2496 return result;
2497}
2498
2499static CURLcode myssh_block_statemach(struct Curl_easy *data,
2500 struct ssh_conn *sshc,
2501 struct SSHPROTO *sshp,
2502 bool disconnect)
2503{
2504 struct connectdata *conn = data->conn;
2505 CURLcode result = CURLE_OK;
2506
2507 while((sshc->state != SSH_STOP) && !result) {
2508 bool block;
2509 timediff_t left_ms = 1000;
2510
2511 result = myssh_statemachine(data, sshc, sshp, &block);
2512 if(result)
2513 break;
2514
2515 if(!disconnect) {
2516 result = Curl_pgrsCheck(data);
2517 if(result)
2518 break;
2519
2520 left_ms = Curl_timeleft_ms(data);
2521 if(left_ms < 0) {
2522 failf(data, "Operation timed out");
2523 return CURLE_OPERATION_TIMEDOUT;
2524 }
2525 }
2526
2527 if(block) {
2528 curl_socket_t fd_read = conn->sock[FIRSTSOCKET];
2529 /* wait for the socket to become ready */
2530 (void)SOCKET_READABLE(fd_read, left_ms > 1000 ? 1000 : left_ms);
2531 }
2532 }
2533
2534 return result;
2535}
2536
2537static void myssh_easy_dtor(void *key, size_t klen, void *entry)
2538{
2539 struct SSHPROTO *sshp = entry;
2540 (void)key;
2541 (void)klen;
2542 curlx_safefree(sshp->path);
2543 curlx_free(sshp);
2544}
2545
2546static void myssh_conn_dtor(void *key, size_t klen, void *entry)
2547{
2548 struct ssh_conn *sshc = entry;
2549 (void)key;
2550 (void)klen;
2551 sshc_cleanup(sshc);
2552 curlx_free(sshc);
2553}
2554
2555/*
2556 * SSH setup connection
2557 */
2558static CURLcode myssh_setup_connection(struct Curl_easy *data,
2559 struct connectdata *conn)
2560{
2561 struct SSHPROTO *sshp;
2562 struct ssh_conn *sshc;
2563
2564 sshc = curlx_calloc(1, sizeof(*sshc));
2565 if(!sshc)
2566 return CURLE_OUT_OF_MEMORY;
2567
2568 curlx_dyn_init(&sshc->readdir_buf, CURL_PATH_MAX * 2);
2569 sshc->initialized = TRUE;
2570 if(Curl_conn_meta_set(conn, CURL_META_SSH_CONN, sshc, myssh_conn_dtor))
2571 return CURLE_OUT_OF_MEMORY;
2572
2573 sshp = curlx_calloc(1, sizeof(*sshp));
2574 if(!sshp ||
2575 Curl_meta_set(data, CURL_META_SSH_EASY, sshp, myssh_easy_dtor))
2576 return CURLE_OUT_OF_MEMORY;
2577
2578 return CURLE_OK;
2579}
2580
2581static Curl_recv scp_recv, sftp_recv;
2582static Curl_send scp_send, sftp_send;
2583
2584/*
2585 * Curl_ssh_connect() gets called from Curl_protocol_connect() to allow us to
2586 * do protocol-specific actions at connect-time.
2587 */
2588static CURLcode myssh_connect(struct Curl_easy *data, bool *done)
2589{
2590 CURLcode result;
2591 struct connectdata *conn = data->conn;
2592 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2593 struct SSHPROTO *ssh = Curl_meta_get(data, CURL_META_SSH_EASY);
2594 curl_socket_t sock = conn->sock[FIRSTSOCKET];
2595 int rc;
2596
2597 if(!sshc || !ssh)
2598 return CURLE_FAILED_INIT;
2599
2600 CURL_TRC_SSH(data, "myssh_connect");
2601 if(conn->scheme->protocol & CURLPROTO_SCP) {
2602 conn->recv[FIRSTSOCKET] = scp_recv;
2603 conn->send[FIRSTSOCKET] = scp_send;
2604 }
2605 else {
2606 conn->recv[FIRSTSOCKET] = sftp_recv;
2607 conn->send[FIRSTSOCKET] = sftp_send;
2608 }
2609
2610 sshc->ssh_session = ssh_new();
2611 if(!sshc->ssh_session) {
2612 failf(data, "Failure initialising ssh session");
2613 return CURLE_FAILED_INIT;
2614 }
2615
2616 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_HOST,
2617 (data->state.up.hostname[0] == '[') ?
2618 data->state.up.hostname : conn->origin->hostname);
2619
2620 if(rc != SSH_OK) {
2621 failf(data, "Could not set remote host");
2622 return CURLE_FAILED_INIT;
2623 }
2624
2625 rc = ssh_options_parse_config(sshc->ssh_session, NULL);
2626 if(rc != SSH_OK) {
2627 infof(data, "Could not parse SSH configuration files");
2628 /* ignore */
2629 }
2630
2631 CURL_TRC_SSH(data, "myssh_connect, set socket=%" FMT_SOCKET_T, sock);
2632 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_FD, &sock);
2633 if(rc != SSH_OK) {
2634 failf(data, "Could not set socket");
2635 return CURLE_FAILED_INIT;
2636 }
2637
2638 if(Curl_creds_has_user(conn->creds)) {
2639 infof(data, "User: %s", conn->creds->user);
2640 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_USER,
2641 conn->creds->user);
2642 if(rc != SSH_OK) {
2643 failf(data, "Could not set user");
2644 return CURLE_FAILED_INIT;
2645 }
2646 }
2647
2648 if(data->set.str[STRING_SSH_KNOWNHOSTS]) {
2649 infof(data, "Known hosts: %s", data->set.str[STRING_SSH_KNOWNHOSTS]);
2650 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_KNOWNHOSTS,
2651 data->set.str[STRING_SSH_KNOWNHOSTS]);
2652 if(rc == SSH_OK)
2653 /* libssh has two separate options for this. Set both to the same file
2654 to avoid surprises */
2655 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_GLOBAL_KNOWNHOSTS,
2656 data->set.str[STRING_SSH_KNOWNHOSTS]);
2657 if(rc != SSH_OK) {
2658 failf(data, "Could not set known hosts file path");
2659 return CURLE_FAILED_INIT;
2660 }
2661 }
2662
2663 if(conn->origin->port) {
2664 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_PORT,
2665 &conn->origin->port);
2666 if(rc != SSH_OK) {
2667 failf(data, "Could not set remote port");
2668 return CURLE_FAILED_INIT;
2669 }
2670 }
2671
2672 if(data->set.ssh_compression) {
2673 rc = ssh_options_set(sshc->ssh_session, SSH_OPTIONS_COMPRESSION,
2674 "zlib,zlib@openssh.com,none");
2675 if(rc != SSH_OK) {
2676 failf(data, "Could not set compression");
2677 return CURLE_FAILED_INIT;
2678 }
2679 }
2680
2681 sshc->privkey = NULL;
2682 sshc->pubkey = NULL;
2683
2684 if(data->set.str[STRING_SSH_PUBLIC_KEY]) {
2685 rc = ssh_pki_import_pubkey_file(data->set.str[STRING_SSH_PUBLIC_KEY],
2686 &sshc->pubkey);
2687 if(rc != SSH_OK) {
2688 failf(data, "Could not load public key file");
2689 return CURLE_FAILED_INIT;
2690 }
2691 }
2692
2693 /* we do not verify here, we do it at the state machine,
2694 * after connection */
2695
2696 myssh_to(data, sshc, SSH_INIT);
2697
2698 result = myssh_multi_statemach(data, done);
2699
2700 return result;
2701}
2702
2703/* called from multi.c while DOing */
2704static CURLcode scp_doing(struct Curl_easy *data, bool *dophase_done)
2705{
2706 CURLcode result;
2707
2708 result = myssh_multi_statemach(data, dophase_done);
2709
2710 if(*dophase_done) {
2711 CURL_TRC_SSH(data, "DO phase is complete");
2712 }
2713 return result;
2714}
2715
2716/*
2717 ***********************************************************************
2718 *
2719 * scp_perform()
2720 *
2721 * This is the actual DO function for SCP. Get a file according to
2722 * the options previously setup.
2723 */
2724
2725static CURLcode scp_perform(struct Curl_easy *data,
2726 bool *connected, bool *dophase_done)
2727{
2728 CURLcode result = CURLE_OK;
2729 struct ssh_conn *sshc = Curl_conn_meta_get(data->conn, CURL_META_SSH_CONN);
2730
2731 CURL_TRC_SSH(data, "DO phase starts");
2732
2733 *dophase_done = FALSE; /* not done yet */
2734 if(!sshc)
2735 return CURLE_FAILED_INIT;
2736
2737 /* start the first command in the DO phase */
2738 myssh_to(data, sshc, SSH_SCP_TRANS_INIT);
2739
2740 result = myssh_multi_statemach(data, dophase_done);
2741
2742 *connected = Curl_conn_is_connected(data->conn, FIRSTSOCKET);
2743
2744 if(*dophase_done) {
2745 CURL_TRC_SSH(data, "DO phase is complete");
2746 }
2747
2748 return result;
2749}
2750
2751/* BLOCKING, but the function is using the state machine so the only reason
2752 this is still blocking is that the multi interface code has no support for
2753 disconnecting operations that takes a while */
2754static CURLcode scp_disconnect(struct Curl_easy *data,
2755 struct connectdata *conn,
2756 bool dead_connection)
2757{
2758 CURLcode result = CURLE_OK;
2759 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2760 struct SSHPROTO *sshp = Curl_meta_get(data, CURL_META_SSH_EASY);
2761 (void)dead_connection;
2762
2763 if(sshc && sshc->ssh_session) {
2764 /* only if there is a session still around to use! */
2765 myssh_to(data, sshc, SSH_SESSION_DISCONNECT);
2766 result = myssh_block_statemach(data, sshc, sshp, TRUE);
2767 }
2768
2769 return result;
2770}
2771
2772/* generic done function for both SCP and SFTP called from their specific
2773 done functions */
2774static CURLcode myssh_done(struct Curl_easy *data,
2775 struct ssh_conn *sshc,
2776 CURLcode status)
2777{
2778 CURLcode result = CURLE_OK;
2779 struct SSHPROTO *sshp = Curl_meta_get(data, CURL_META_SSH_EASY);
2780
2781 if(!status && sshp) {
2782 /* run the state-machine */
2783 result = myssh_block_statemach(data, sshc, sshp, FALSE);
2784 }
2785 else
2786 result = status;
2787
2788 if(Curl_pgrsDone(data))
2789 return CURLE_ABORTED_BY_CALLBACK;
2790
2791 CURL_REQ_CLEAR_IO(data);
2792 return result;
2793}
2794
2795static CURLcode scp_done(struct Curl_easy *data, CURLcode status,
2796 bool premature)
2797{
2798 struct ssh_conn *sshc = Curl_conn_meta_get(data->conn, CURL_META_SSH_CONN);
2799 (void)premature;
2800
2801 if(!sshc)
2802 return CURLE_FAILED_INIT;
2803 if(!status)
2804 myssh_to(data, sshc, SSH_SCP_DONE);
2805
2806 return myssh_done(data, sshc, status);
2807}
2808
2809static CURLcode scp_send(struct Curl_easy *data, int sockindex,
2810 const uint8_t *mem, size_t len, bool eos,
2811 size_t *pnwritten)
2812{
2813 int rc;
2814 struct connectdata *conn = data->conn;
2815 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2816
2817 (void)sockindex; /* we only support SCP on the fixed known primary socket */
2818 (void)eos;
2819 *pnwritten = 0;
2820
2821 if(!sshc)
2822 return CURLE_FAILED_INIT;
2823
2824 rc = ssh_scp_write(sshc->scp_session, mem, len);
2825
2826#if 0
2827 /* The following code is misleading, mostly added as wishful thinking
2828 * that libssh at some point would implement non-blocking ssh_scp_write/read.
2829 * Currently rc can only be number of bytes read or SSH_ERROR. */
2830 myssh_block2waitfor(conn, sshc, (rc == SSH_AGAIN));
2831
2832 if(rc == SSH_AGAIN)
2833 return CURLE_AGAIN;
2834 else
2835#endif
2836 if(rc != SSH_OK)
2837 return CURLE_SSH;
2838
2839 *pnwritten = len;
2840 return CURLE_OK;
2841}
2842
2843static CURLcode scp_recv(struct Curl_easy *data, int sockindex,
2844 char *mem, size_t len, size_t *pnread)
2845{
2846 struct connectdata *conn = data->conn;
2847 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2848 int nread;
2849
2850 (void)sockindex; /* we only support SCP on the fixed known primary socket */
2851 *pnread = 0;
2852
2853 if(!sshc)
2854 return CURLE_FAILED_INIT;
2855
2856 /* libssh returns int */
2857 nread = ssh_scp_read(sshc->scp_session, mem, len);
2858 if(nread == SSH_ERROR)
2859 return CURLE_SSH;
2860#if 0
2861 /* The following code is misleading, mostly added as wishful thinking
2862 * that libssh at some point would implement non-blocking ssh_scp_write/read.
2863 * Currently rc can only be SSH_OK or SSH_ERROR. */
2864
2865 myssh_block2waitfor(conn, sshc, (nread == SSH_AGAIN));
2866 if(nread == SSH_AGAIN)
2867 return CURLE_AGAIN;
2868#endif
2869 *pnread = (size_t)nread;
2870 return CURLE_OK;
2871}
2872
2873/*
2874 * =============== SFTP ===============
2875 */
2876
2877/*
2878 ***********************************************************************
2879 *
2880 * sftp_perform()
2881 *
2882 * This is the actual DO function for SFTP. Get a file/directory according to
2883 * the options previously setup.
2884 */
2885
2886static CURLcode sftp_perform(struct Curl_easy *data,
2887 bool *connected,
2888 bool *dophase_done)
2889{
2890 struct ssh_conn *sshc = Curl_conn_meta_get(data->conn, CURL_META_SSH_CONN);
2891 CURLcode result = CURLE_OK;
2892
2893 CURL_TRC_SSH(data, "DO phase starts");
2894
2895 *dophase_done = FALSE; /* not done yet */
2896 if(!sshc)
2897 return CURLE_FAILED_INIT;
2898
2899 /* start the first command in the DO phase */
2900 myssh_to(data, sshc, SSH_SFTP_QUOTE_INIT);
2901
2902 /* run the state-machine */
2903 result = myssh_multi_statemach(data, dophase_done);
2904
2905 *connected = Curl_conn_is_connected(data->conn, FIRSTSOCKET);
2906
2907 if(*dophase_done) {
2908 CURL_TRC_SSH(data, "DO phase is complete");
2909 }
2910
2911 return result;
2912}
2913
2914/* called from multi.c while DOing */
2915static CURLcode sftp_doing(struct Curl_easy *data,
2916 bool *dophase_done)
2917{
2918 CURLcode result = myssh_multi_statemach(data, dophase_done);
2919 if(*dophase_done) {
2920 CURL_TRC_SSH(data, "DO phase is complete");
2921 }
2922 return result;
2923}
2924
2925/* BLOCKING, but the function is using the state machine so the only reason
2926 this is still blocking is that the multi interface code has no support for
2927 disconnecting operations that takes a while */
2928static CURLcode sftp_disconnect(struct Curl_easy *data,
2929 struct connectdata *conn,
2930 bool dead_connection)
2931{
2932 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2933 struct SSHPROTO *sshp = Curl_meta_get(data, CURL_META_SSH_EASY);
2934 CURLcode result = CURLE_OK;
2935 (void)dead_connection;
2936
2937 CURL_TRC_SSH(data, "DISCONNECT starts now");
2938
2939 if(sshc && sshc->ssh_session) {
2940 /* only if there is a session still around to use! */
2941 myssh_to(data, sshc, SSH_SFTP_SHUTDOWN);
2942 result = myssh_block_statemach(data, sshc, sshp, TRUE);
2943 }
2944
2945 CURL_TRC_SSH(data, "DISCONNECT is done");
2946 return result;
2947}
2948
2949static CURLcode sftp_done(struct Curl_easy *data, CURLcode status,
2950 bool premature)
2951{
2952 struct connectdata *conn = data->conn;
2953 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2954
2955 if(!sshc)
2956 return CURLE_FAILED_INIT;
2957 if(!status) {
2958 /* Post quote commands are executed after the SFTP_CLOSE state to avoid
2959 errors that could happen due to open file handles during POSTQUOTE
2960 operation */
2961 if(!premature && data->set.postquote && !conn->bits.retry)
2962 sshc->nextstate = SSH_SFTP_POSTQUOTE_INIT;
2963 myssh_to(data, sshc, SSH_SFTP_CLOSE);
2964 }
2965 return myssh_done(data, sshc, status);
2966}
2967
2968/* return number of sent bytes */
2969static CURLcode sftp_send(struct Curl_easy *data, int sockindex,
2970 const uint8_t *mem, size_t len, bool eos,
2971 size_t *pnwritten)
2972{
2973 struct connectdata *conn = data->conn;
2974 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
2975 ssize_t nwrite;
2976
2977 (void)sockindex;
2978 (void)eos;
2979 *pnwritten = 0;
2980
2981 if(!sshc)
2982 return CURLE_FAILED_INIT;
2983
2984#if LIBSSH_VERSION_INT > SSH_VERSION_INT(0, 11, 0)
2985 switch(sshc->sftp_send_state) {
2986 case 0:
2987 sftp_file_set_nonblocking(sshc->sftp_file);
2988 if(sftp_aio_begin_write(sshc->sftp_file, mem, len,
2989 &sshc->sftp_send_aio) == SSH_ERROR) {
2990 return CURLE_SEND_ERROR;
2991 }
2992 sshc->sftp_send_state = 1;
2993 FALLTHROUGH();
2994 case 1:
2995 nwrite = sftp_aio_wait_write(&sshc->sftp_send_aio);
2996 myssh_block2waitfor(conn, sshc, (nwrite == SSH_AGAIN) ? TRUE : FALSE);
2997 if(nwrite == SSH_AGAIN)
2998 return CURLE_AGAIN;
2999 else if(nwrite < 0)
3000 return CURLE_SEND_ERROR;
3001
3002 /*
3003 * sftp_aio_wait_write() would free sftp_send_aio and
3004 * assign it NULL in all cases except when it returns
3005 * SSH_AGAIN.
3006 */
3007
3008 sshc->sftp_send_state = 0;
3009 *pnwritten = (size_t)nwrite;
3010 return CURLE_OK;
3011 default:
3012 /* we never reach here */
3013 return CURLE_SEND_ERROR;
3014 }
3015#else
3016 /*
3017 * limit the writes to the maximum specified in Section 3 of
3018 * https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-02
3019 *
3020 * libssh started applying appropriate read/write length limits
3021 * internally since version 0.11.0, hence such an operation is
3022 * not needed for versions after (and including) 0.11.0.
3023 */
3024 if(len > 32768)
3025 len = 32768;
3026
3027 nwrite = sftp_write(sshc->sftp_file, mem, len);
3028
3029 myssh_block2waitfor(conn, sshc, FALSE);
3030
3031#if 0 /* not returned by libssh on write */
3032 if(nwrite == SSH_AGAIN) {
3033 *err = CURLE_AGAIN;
3034 nwrite = 0;
3035 }
3036 else
3037#endif
3038 if(nwrite < 0)
3039 return CURLE_SSH;
3040
3041 *pnwritten = (size_t)nwrite;
3042 return CURLE_OK;
3043#endif
3044}
3045
3046/*
3047 * Return number of received (decrypted) bytes
3048 * or <0 on error
3049 */
3050static CURLcode sftp_recv(struct Curl_easy *data, int sockindex,
3051 char *mem, size_t len, size_t *pnread)
3052{
3053 struct connectdata *conn = data->conn;
3054 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
3055 ssize_t nread;
3056
3057 (void)sockindex;
3058 *pnread = 0;
3059
3060 DEBUGASSERT(len < CURL_MAX_READ_SIZE);
3061 if(!sshc)
3062 return CURLE_FAILED_INIT;
3063
3064 switch(sshc->sftp_recv_state) {
3065 case 0:
3066#if LIBSSH_VERSION_INT > SSH_VERSION_INT(0, 11, 0)
3067 if(sftp_aio_begin_read(sshc->sftp_file, len,
3068 &sshc->sftp_recv_aio) == SSH_ERROR) {
3069 return CURLE_RECV_ERROR;
3070 }
3071#else
3072 sshc->sftp_file_index =
3073 sftp_async_read_begin(sshc->sftp_file, (uint32_t)len);
3074 if(sshc->sftp_file_index < 0)
3075 return CURLE_RECV_ERROR;
3076#endif
3077
3078 FALLTHROUGH();
3079 case 1:
3080 sshc->sftp_recv_state = 1;
3081
3082#if LIBSSH_VERSION_INT > SSH_VERSION_INT(0, 11, 0)
3083 nread = sftp_aio_wait_read(&sshc->sftp_recv_aio, mem, len);
3084#else
3085 nread = sftp_async_read(sshc->sftp_file, mem, (uint32_t)len,
3086 (uint32_t)sshc->sftp_file_index);
3087#endif
3088
3089 myssh_block2waitfor(conn, sshc, (nread == SSH_AGAIN));
3090
3091 if(nread == SSH_AGAIN)
3092 return CURLE_AGAIN;
3093 else if(nread < 0)
3094 return CURLE_RECV_ERROR;
3095
3096 /*
3097 * sftp_aio_wait_read() would free sftp_recv_aio and
3098 * assign it NULL in all cases except when it returns
3099 * SSH_AGAIN.
3100 */
3101
3102 sshc->sftp_recv_state = 0;
3103 *pnread = (size_t)nread;
3104 return CURLE_OK;
3105
3106 default:
3107 /* we never reach here */
3108 return CURLE_RECV_ERROR;
3109 }
3110}
3111
3112static CURLcode myssh_do_it(struct Curl_easy *data, bool *done)
3113{
3114 CURLcode result;
3115 bool connected = FALSE;
3116 struct connectdata *conn = data->conn;
3117 struct ssh_conn *sshc = Curl_conn_meta_get(conn, CURL_META_SSH_CONN);
3118
3119 *done = FALSE; /* default to false */
3120 if(!sshc)
3121 return CURLE_FAILED_INIT;
3122
3123 data->req.size = -1; /* make sure this is unknown at this point */
3124
3125 sshc->actualcode = CURLE_OK; /* reset error code */
3126 sshc->secondCreateDirs = 0; /* reset the create directory attempt state
3127 variable */
3128
3129 Curl_pgrsReset(data);
3130
3131 if(conn->scheme->protocol & CURLPROTO_SCP)
3132 result = scp_perform(data, &connected, done);
3133 else
3134 result = sftp_perform(data, &connected, done);
3135
3136 return result;
3137}
3138
3139CURLcode Curl_ssh_init(void)
3140{
3141 if(ssh_init()) {
3142 DEBUGF(curl_mfprintf(stderr, "Error: libssh_init failed\n"));
3143 return CURLE_FAILED_INIT;
3144 }
3145 return CURLE_OK;
3146}
3147
3148void Curl_ssh_cleanup(void)
3149{
3150 (void)ssh_finalize();
3151}
3152
3153void Curl_ssh_version(char *buffer, size_t buflen)
3154{
3155 (void)curl_msnprintf(buffer, buflen, "libssh/%s", ssh_version(0));
3156}
3157
3158/*
3159 * SCP.
3160 */
3161const struct Curl_protocol Curl_protocol_scp = {
3162 myssh_setup_connection, /* setup_connection */
3163 myssh_do_it, /* do_it */
3164 scp_done, /* done */
3165 ZERO_NULL, /* do_more */
3166 myssh_connect, /* connect_it */
3167 myssh_multi_statemach, /* connecting */
3168 scp_doing, /* doing */
3169 myssh_pollset, /* proto_pollset */
3170 myssh_pollset, /* doing_pollset */
3171 ZERO_NULL, /* domore_pollset */
3172 myssh_pollset, /* perform_pollset */
3173 scp_disconnect, /* disconnect */
3174 ZERO_NULL, /* write_resp */
3175 ZERO_NULL, /* write_resp_hd */
3176 ZERO_NULL, /* connection_is_dead */
3177 ZERO_NULL, /* attach connection */
3178 ZERO_NULL, /* follow */
3179};
3180
3181/*
3182 * SFTP.
3183 */
3184const struct Curl_protocol Curl_protocol_sftp = {
3185 myssh_setup_connection, /* setup_connection */
3186 myssh_do_it, /* do_it */
3187 sftp_done, /* done */
3188 ZERO_NULL, /* do_more */
3189 myssh_connect, /* connect_it */
3190 myssh_multi_statemach, /* connecting */
3191 sftp_doing, /* doing */
3192 myssh_pollset, /* proto_pollset */
3193 myssh_pollset, /* doing_pollset */
3194 ZERO_NULL, /* domore_pollset */
3195 myssh_pollset, /* perform_pollset */
3196 sftp_disconnect, /* disconnect */
3197 ZERO_NULL, /* write_resp */
3198 ZERO_NULL, /* write_resp_hd */
3199 ZERO_NULL, /* connection_is_dead */
3200 ZERO_NULL, /* attach connection */
3201 ZERO_NULL, /* follow */
3202};
3203
3204#endif /* USE_LIBSSH */