/usr/share/doc/libssh-doc/html/index.html is in libssh-doc 0.6.1-0ubuntu3.5.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.6"/>
<title>libssh: Main Page</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 56px;">
<td style="padding-left: 0.5em;">
<div id="projectname">libssh
 <span id="projectnumber">0.6.1</span>
</div>
</td>
</tr>
</tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.6 -->
<div id="navrow1" class="tabs">
<ul class="tablist">
<li class="current"><a href="index.html"><span>Main Page</span></a></li>
<li><a href="pages.html"><span>Related Pages</span></a></li>
<li><a href="modules.html"><span>Modules</span></a></li>
<li><a href="annotated.html"><span>Data Structures</span></a></li>
<li><a href="files.html"><span>Files</span></a></li>
</ul>
</div>
</div><!-- top -->
<div class="header">
<div class="headertitle">
<div class="title">libssh Documentation</div> </div>
</div><!--header-->
<div class="contents">
<div class="textblock"><p>This is the online reference for developing with the libssh library. It documents the libssh C API and the C++ wrapper.</p>
<h1><a class="anchor" id="main-linking"></a>
Linking</h1>
<p>We created a small howto how to link libssh against your application, read <a class="el" href="libssh_linking.html">The Linking HowTo</a>.</p>
<h1><a class="anchor" id="main-tutorial"></a>
Tutorial</h1>
<p>You should start by reading <a class="el" href="libssh_tutorial.html">The Tutorial</a>, then reading the documentation of the interesting functions as you go.</p>
<h1><a class="anchor" id="main-features"></a>
Features</h1>
<p>The libssh library provides:</p>
<ul>
<li><b>Key Exchange Methods</b>: <em>ecdh-sha2-nistp256</em>, diffie-hellman-group1-sha1, diffie-hellman-group14-sha1</li>
<li><b>Hostkey Types</b>: <em>ecdsa-sha2-nistp256</em>, ssh-dss, ssh-rsa</li>
<li><b>Ciphers</b>: <em>aes256-ctr, aes192-ctr, aes128-ctr</em>, aes256-cbc (<a href="#" onclick="location.href='mai'+'lto:'+'rij'+'nd'+'ael'+'-c'+'bc@'+'ly'+'sat'+'or'+'.li'+'u.'+'se'; return false;">rijnd<span style="display: none;">.nosp@m.</span>ael-<span style="display: none;">.nosp@m.</span>cbc@l<span style="display: none;">.nosp@m.</span>ysat<span style="display: none;">.nosp@m.</span>or.li<span style="display: none;">.nosp@m.</span>u.se</a>), aes192-cbc, aes128-cbc, 3des-cbc, des-cbc-ssh1, blowfish-cbc, none</li>
<li><b>Compression Schemes</b>: zlib, <em><a href="#" onclick="location.href='mai'+'lto:'+'zli'+'b@'+'ope'+'ns'+'sh.'+'co'+'m'; return false;">zlib@<span style="display: none;">.nosp@m.</span>open<span style="display: none;">.nosp@m.</span>ssh.c<span style="display: none;">.nosp@m.</span>om</a></em>, none</li>
<li><b>MAC hashes</b>: hmac-sha1, none</li>
<li><b>Authentication</b>: none, password, public-key, hostbased, keyboard-interactive, <em>gssapi-with-mic</em></li>
<li><b>Channels</b>: shell, exec (incl. SCP wrapper), direct-tcpip, subsystem, <em><a href="#" onclick="location.href='mai'+'lto:'+'aut'+'h-'+'age'+'nt'+'-re'+'q@'+'ope'+'ns'+'sh.'+'co'+'m'; return false;">auth-<span style="display: none;">.nosp@m.</span>agen<span style="display: none;">.nosp@m.</span>t-req<span style="display: none;">.nosp@m.</span>@ope<span style="display: none;">.nosp@m.</span>nssh.<span style="display: none;">.nosp@m.</span>com</a></em></li>
<li><b>Global Requests</b>: tcpip-forward, forwarded-tcpip</li>
<li><b>Channel Requests</b>: x11, pty, <em>exit-status, signal, exit-signal, <a href="#" onclick="location.href='mai'+'lto:'+'kee'+'pa'+'liv'+'e@'+'ope'+'ns'+'sh.'+'co'+'m'; return false;">keepa<span style="display: none;">.nosp@m.</span>live<span style="display: none;">.nosp@m.</span>@open<span style="display: none;">.nosp@m.</span>ssh.<span style="display: none;">.nosp@m.</span>com</a>, <a href="#" onclick="location.href='mai'+'lto:'+'aut'+'h-'+'age'+'nt'+'-re'+'q@'+'ope'+'ns'+'sh.'+'co'+'m'; return false;">auth-<span style="display: none;">.nosp@m.</span>agen<span style="display: none;">.nosp@m.</span>t-req<span style="display: none;">.nosp@m.</span>@ope<span style="display: none;">.nosp@m.</span>nssh.<span style="display: none;">.nosp@m.</span>com</a></em></li>
<li><b>Subsystems</b>: sftp(version 3), publickey(version 2), <em>OpenSSH Extensions</em></li>
<li><b>SFTP</b>: <em><a href="#" onclick="location.href='mai'+'lto:'+'sta'+'tv'+'fs@'+'op'+'ens'+'sh'+'.co'+'m'; return false;">statv<span style="display: none;">.nosp@m.</span>fs@o<span style="display: none;">.nosp@m.</span>penss<span style="display: none;">.nosp@m.</span>h.co<span style="display: none;">.nosp@m.</span>m</a>, <a href="#" onclick="location.href='mai'+'lto:'+'fst'+'at'+'vfs'+'@o'+'pen'+'ss'+'h.c'+'om'; return false;">fstat<span style="display: none;">.nosp@m.</span>vfs@<span style="display: none;">.nosp@m.</span>opens<span style="display: none;">.nosp@m.</span>sh.c<span style="display: none;">.nosp@m.</span>om</a></em></li>
<li><b>Thread-safe</b>: Just don't share sessions</li>
<li><b>Non-blocking</b>: it can be used both blocking and non-blocking</li>
<li><b>Your sockets</b>: the app hands over the socket, or uses libssh sockets</li>
<li><b>OpenSSL</b> or <b>gcrypt</b>: builds with either</li>
</ul>
<h1><a class="anchor" id="main-additional-features"></a>
Additional Features</h1>
<ul>
<li>Client <b>and</b> server support</li>
<li>SSHv2 and SSHv1 protocol support</li>
<li>Supports <a href="http://test.libssh.org/" target="_blank">Linux, UNIX, BSD, Solaris, OS/2 and Windows</a></li>
<li>Automated test cases with nightly <a href="http://test.libssh.org/" target="_blank">tests</a></li>
<li>Event model based on poll(2), or a poll(2)-emulation.</li>
</ul>
<h1><a class="anchor" id="main-copyright"></a>
Copyright Policy</h1>
<p>libssh is a project with distributed copyright ownership, which means we prefer the copyright on parts of libssh to be held by individuals rather than corporations if possible. There are historical legal reasons for this, but one of the best ways to explain it is that it’s much easier to work with individuals who have ownership than corporate legal departments if we ever need to make reasonable compromises with people using and working with libssh.</p>
<p>We track the ownership of every part of libssh via git, our source code control system, so we know the provenance of every piece of code that is committed to libssh.</p>
<p>So if possible, if you’re doing libssh changes on behalf of a company who normally owns all the work you do please get them to assign personal copyright ownership of your changes to you as an individual, that makes things very easy for us to work with and avoids bringing corporate legal departments into the picture.</p>
<p>If you can’t do this we can still accept patches from you owned by your employer under a standard employment contract with corporate copyright ownership. It just requires a simple set-up process first.</p>
<p>We use a process very similar to the way things are done in the Linux Kernel community, so it should be very easy to get a sign off from your corporate legal department. The only changes we’ve made are to accommodate the license we use, which is LGPLv2 (or later) whereas the Linux kernel uses GPLv2.</p>
<p>The process is called signing.</p>
<h2>How to sign your work </h2>
<p>Once you have permission to contribute to libssh from your employer, simply email a copy of the following text from your corporate email address to:</p>
<p><a href="#" onclick="location.href='mai'+'lto:'+'con'+'tr'+'ibu'+'ti'+'ng@'+'li'+'bss'+'h.'+'org'; return false;">contr<span style="display: none;">.nosp@m.</span>ibut<span style="display: none;">.nosp@m.</span>ing@l<span style="display: none;">.nosp@m.</span>ibss<span style="display: none;">.nosp@m.</span>h.org</a></p>
<pre class="fragment">libssh Developer's Certificate of Origin. Version 1.0
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the appropriate
version of the GNU General Public License; or
(b) The contribution is based upon previous work that, to the best of
my knowledge, is covered under an appropriate open source license
and I have the right under that license to submit that work with
modifications, whether created in whole or in part by me, under
the GNU General Public License, in the appropriate version; or
(c) The contribution was provided directly to me by some other
person who certified (a) or (b) and I have not modified it.
(d) I understand and agree that this project and the contribution are
public and that a record of the contribution (including all
metadata and personal information I submit with it, including my
sign-off) is maintained indefinitely and may be redistributed
consistent with the libssh Team's policies and the requirements of
the GNU GPL where they are relevant.
(e) I am granting this work to this project under the terms of the
GNU Lesser General Public License as published by the
Free Software Foundation; either version 2.1 of
the License, or (at the option of the project) any later version.
http://www.gnu.org/licenses/lgpl-2.1.html
</pre><p>We will maintain a copy of that email as a record that you have the rights to contribute code to libssh under the required licenses whilst working for the company where the email came from.</p>
<p>Then when sending in a patch via the normal mechanisms described above, add a line that states:</p>
<pre class="fragment"> Signed-off-by: Random J Developer <random@developer.example.org>
</pre><p>using your real name and the email address you sent the original email you used to send the libssh Developer’s Certificate of Origin to us (sorry, no pseudonyms or anonymous contributions.)</p>
<p>That’s it! Such code can then quite happily contain changes that have copyright messages such as:</p>
<pre class="fragment"> (c) Example Corporation.
</pre><p>and can be merged into the libssh codebase in the same way as patches from any other individual. You don’t need to send in a copy of the libssh Developer’s Certificate of Origin for each patch, or inside each patch. Just the sign-off message is all that is required once we’ve received the initial email.</p>
<p>Have fun and happy libssh hacking!</p>
<p>The libssh Team</p>
<h1><a class="anchor" id="main-rfc"></a>
Internet standard</h1>
<h2><a class="anchor" id="main-rfc-secsh"></a>
Secure Shell (SSH)</h2>
<p>The following RFC documents described SSH-2 protcol as an Internet standard.</p>
<ul>
<li><a href="http://tools.ietf.org/html/rfc4250" target="_blank">RFC 4250</a>, The Secure Shell (SSH) Protocol Assigned Numbers</li>
<li><a href="http://tools.ietf.org/html/rfc4251" target="_blank">RFC 4251</a>, The Secure Shell (SSH) Protocol Architecture</li>
<li><a href="http://tools.ietf.org/html/rfc4252" target="_blank">RFC 4252</a>, The Secure Shell (SSH) Authentication Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4253" target="_blank">RFC 4253</a>, The Secure Shell (SSH) Transport Layer Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4254" target="_blank">RFC 4254</a>, The Secure Shell (SSH) Connection Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4255" target="_blank">RFC 4255</a>, Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</li>
<li><a href="http://tools.ietf.org/html/rfc4256" target="_blank">RFC 4256</a>, Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)</li>
<li><a href="http://tools.ietf.org/html/rfc4335" target="_blank">RFC 4335</a>, The Secure Shell (SSH) Session Channel Break Extension</li>
<li><a href="http://tools.ietf.org/html/rfc4344" target="_blank">RFC 4344</a>, The Secure Shell (SSH) Transport Layer Encryption Modes</li>
<li><a href="http://tools.ietf.org/html/rfc4345" target="_blank">RFC 4345</a>, Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol</li>
</ul>
<p>It was later modified and expanded by the following RFCs.</p>
<ul>
<li><a href="http://tools.ietf.org/html/rfc4419" target="_blank">RFC 4419</a>, Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4432" target="_blank">RFC 4432</a>, RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4462" target="_blank">RFC 4462</a>, Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol</li>
<li><a href="http://tools.ietf.org/html/rfc4716" target="_blank">RFC 4716</a>, The Secure Shell (SSH) Public Key File Format</li>
<li><a href="http://tools.ietf.org/html/rfc5656" target="_blank">RFC 5656</a>, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer</li>
</ul>
<p>Interesting cryptography documents:</p>
<ul>
<li><a href="http://www.cryptsoft.com/pkcs11doc/" target="_blank">PKCS #11</a>, PKCS #11 reference documents, describing interface with smartcards.</li>
</ul>
<h2><a class="anchor" id="main-rfc-sftp"></a>
Secure Shell File Transfer Protocol (SFTP)</h2>
<p>The protocol is not an Internet standard but it is still widely implemented. OpenSSH and most other implementation implement Version 3 of the protocol. We do the same in libssh.</p>
<ul>
<li><a href="http://tools.ietf.org/html/draft-ietf-secsh-filexfer-02" target="_blank">draft-ietf-secsh-filexfer-02.txt</a>, SSH File Transfer Protocol</li>
</ul>
<h2><a class="anchor" id="main-rfc-extensions"></a>
Secure Shell Extensions</h2>
<p>The OpenSSH project has defined some extensions to the protocol. We support some of them like the statvfs calls in SFTP or the ssh-agent.</p>
<ul>
<li><a href="http://api.libssh.org/rfc/PROTOCOL" target="_blank">OpenSSH's deviations and extensions</a></li>
<li><a href="http://api.libssh.org/rfc/PROTOCOL.agent" target="_blank">OpenSSH's ssh-agent</a></li>
<li><a href="http://api.libssh.org/rfc/PROTOCOL.certkeys" target="_blank">OpenSSH's pubkey certificate authentication</a> </li>
</ul>
</div></div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated by  <a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.6
</small></address>
</body>
</html>
|