blob: ac98d181463438e944b71738878922242f363743 [file] [log] [blame]
Damien Millerd4a8b7e1999-10-27 13:42:43 +10001/*
2
3ssh.h
4
5Author: Tatu Ylonen <ylo@cs.hut.fi>
6
7Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 All rights reserved
9
10Created: Fri Mar 17 17:09:37 1995 ylo
11
12Generic header file for ssh.
13
14*/
15
Damien Miller6d7b2cd1999-11-12 15:19:27 +110016/* RCSID("$Id: ssh.h,v 1.12 1999/11/12 04:19:27 damien Exp $"); */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100017
18#ifndef SSH_H
19#define SSH_H
20
Damien Millerab18c411999-11-11 10:40:23 +110021#include <netinet/in.h> /* For struct sockaddr_in */
22#include <pwd.h> /* For struct pw */
Damien Miller5ce662a1999-11-11 17:57:39 +110023#include <stdarg.h> /* For va_list */
Damien Miller7f6ea021999-10-28 13:25:17 +100024
Damien Millerd4a8b7e1999-10-27 13:42:43 +100025#include "rsa.h"
26#include "cipher.h"
27
28/* The default cipher used if IDEA is not supported by the remote host.
29 It is recommended that this be one of the mandatory ciphers (DES, 3DES),
30 though that is not required. */
31#define SSH_FALLBACK_CIPHER SSH_CIPHER_3DES
32
33/* Cipher used for encrypting authentication files. */
34#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
35
36/* Default port number. */
37#define SSH_DEFAULT_PORT 22
38
39/* Maximum number of TCP/IP ports forwarded per direction. */
40#define SSH_MAX_FORWARDS_PER_DIRECTION 100
41
42/* Maximum number of RSA authentication identity files that can be specified
43 in configuration files or on the command line. */
44#define SSH_MAX_IDENTITY_FILES 100
45
46/* Major protocol version. Different version indicates major incompatiblity
47 that prevents communication. */
48#define PROTOCOL_MAJOR 1
49
50/* Minor protocol version. Different version indicates minor incompatibility
51 that does not prevent interoperation. */
52#define PROTOCOL_MINOR 5
53
54/* Name for the service. The port named by this service overrides the default
55 port if present. */
56#define SSH_SERVICE_NAME "ssh"
57
58#ifndef ETCDIR
59#define ETCDIR "/etc"
60#endif /* ETCDIR */
61
62#define PIDDIR "/var/run"
63
64/* System-wide file containing host keys of known hosts. This file should be
65 world-readable. */
66#define SSH_SYSTEM_HOSTFILE ETCDIR "/ssh_known_hosts"
67
68/* HOST_KEY_FILE /etc/ssh_host_key,
69 SERVER_CONFIG_FILE /etc/sshd_config,
70and HOST_CONFIG_FILE /etc/ssh_config
71are all defined in Makefile.in. Of these, ssh_host_key should be readable
72only by root, whereas ssh_config should be world-readable. */
73
74#define HOST_KEY_FILE ETCDIR "/ssh_host_key"
75#define SERVER_CONFIG_FILE ETCDIR "/sshd_config"
76#define HOST_CONFIG_FILE ETCDIR "/ssh_config"
77
Damien Miller356a0b01999-11-08 15:30:59 +110078#ifndef SSH_PROGRAM
Damien Millerd4a8b7e1999-10-27 13:42:43 +100079#define SSH_PROGRAM "/usr/bin/ssh"
Damien Miller356a0b01999-11-08 15:30:59 +110080#endif /* SSH_PROGRAM */
81
82#ifndef LOGIN_PROGRAM
83#define LOGIN_PROGRAM "/usr/bin/login"
84#endif /* LOGIN_PROGRAM */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100085
Damien Millerc7b38ce1999-11-09 10:28:04 +110086#ifndef ASKPASS_PROGRAM
87#define ASKPASS_PROGRAM "/usr/lib/ssh/ssh-askpass"
88#endif /* ASKPASS_PROGRAM */
89
Damien Millerd4a8b7e1999-10-27 13:42:43 +100090/* The process id of the daemon listening for connections is saved
91 here to make it easier to kill the correct daemon when necessary. */
Damien Millera37010e1999-10-29 09:18:29 +100092#define SSH_DAEMON_PID_FILE PIDDIR "/sshd.pid"
Damien Millerd4a8b7e1999-10-27 13:42:43 +100093
94/* The directory in user\'s home directory in which the files reside.
95 The directory should be world-readable (though not all files are). */
96#define SSH_USER_DIR ".ssh"
97
98/* Per-user file containing host keys of known hosts. This file need
99 not be readable by anyone except the user him/herself, though this does
100 not contain anything particularly secret. */
101#define SSH_USER_HOSTFILE "~/.ssh/known_hosts"
102
103/* Name of the default file containing client-side authentication key.
104 This file should only be readable by the user him/herself. */
105#define SSH_CLIENT_IDENTITY ".ssh/identity"
106
107/* Configuration file in user\'s home directory. This file need not be
108 readable by anyone but the user him/herself, but does not contain
109 anything particularly secret. If the user\'s home directory resides
110 on an NFS volume where root is mapped to nobody, this may need to be
111 world-readable. */
112#define SSH_USER_CONFFILE ".ssh/config"
113
114/* File containing a list of those rsa keys that permit logging in as
115 this user. This file need not be
116 readable by anyone but the user him/herself, but does not contain
117 anything particularly secret. If the user\'s home directory resides
118 on an NFS volume where root is mapped to nobody, this may need to be
119 world-readable. (This file is read by the daemon which is running as
120 root.) */
121#define SSH_USER_PERMITTED_KEYS ".ssh/authorized_keys"
122
123/* Per-user and system-wide ssh "rc" files. These files are executed with
124 /bin/sh before starting the shell or command if they exist. They
125 will be passed "proto cookie" as arguments if X11 forwarding with
126 spoofing is in use. xauth will be run if neither of these exists. */
127#define SSH_USER_RC ".ssh/rc"
128#define SSH_SYSTEM_RC ETCDIR "/sshrc"
129
130/* Ssh-only version of /etc/hosts.equiv. */
131#define SSH_HOSTS_EQUIV ETCDIR "/shosts.equiv"
132
133/* Additionally, the daemon may use ~/.rhosts and /etc/hosts.equiv if
134 rhosts authentication is enabled. */
135
136/* Name of the environment variable containing the pathname of the
137 authentication socket. */
138#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
139
Damien Miller5eeedae1999-10-29 10:21:15 +1000140/* Name of the environment variable containing the pathname of the
Damien Miller32265091999-11-12 11:33:04 +1100141 authentication socket. */
142#define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID"
Damien Miller5eeedae1999-10-29 10:21:15 +1000143
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000144/* Force host key length and server key length to differ by at least this
145 many bits. This is to make double encryption with rsaref work. */
146#define SSH_KEY_BITS_RESERVED 128
147
148/* Length of the session key in bytes. (Specified as 256 bits in the
149 protocol.) */
150#define SSH_SESSION_KEY_LENGTH 32
151
152/* Name of Kerberos service for SSH to use. */
153#define KRB4_SERVICE_NAME "rcmd"
154
155/* Authentication methods. New types can be added, but old types should not
156 be removed for compatibility. The maximum allowed value is 31. */
157#define SSH_AUTH_RHOSTS 1
158#define SSH_AUTH_RSA 2
159#define SSH_AUTH_PASSWORD 3
160#define SSH_AUTH_RHOSTS_RSA 4
161 /* 5 is TIS */
162#define SSH_AUTH_KERBEROS 6
163#define SSH_PASS_KERBEROS_TGT 7
164 /* 8 to 15 are reserved */
165#define SSH_PASS_AFS_TOKEN 21
166
167/* Protocol flags. These are bit masks. */
168#define SSH_PROTOFLAG_SCREEN_NUMBER 1 /* X11 forwarding includes screen */
169#define SSH_PROTOFLAG_HOST_IN_FWD_OPEN 2 /* forwarding opens contain host */
170
171/* Definition of message types. New values can be added, but old values
172 should not be removed or without careful consideration of the consequences
173 for compatibility. The maximum value is 254; value 255 is reserved
174 for future extension. */
175/* Message name */ /* msg code */ /* arguments */
176#define SSH_MSG_NONE 0 /* no message */
177#define SSH_MSG_DISCONNECT 1 /* cause (string) */
178#define SSH_SMSG_PUBLIC_KEY 2 /* ck,msk,srvk,hostk */
179#define SSH_CMSG_SESSION_KEY 3 /* key (BIGNUM) */
180#define SSH_CMSG_USER 4 /* user (string) */
181#define SSH_CMSG_AUTH_RHOSTS 5 /* user (string) */
182#define SSH_CMSG_AUTH_RSA 6 /* modulus (BIGNUM) */
183#define SSH_SMSG_AUTH_RSA_CHALLENGE 7 /* int (BIGNUM) */
184#define SSH_CMSG_AUTH_RSA_RESPONSE 8 /* int (BIGNUM) */
185#define SSH_CMSG_AUTH_PASSWORD 9 /* pass (string) */
186#define SSH_CMSG_REQUEST_PTY 10 /* TERM, tty modes */
187#define SSH_CMSG_WINDOW_SIZE 11 /* row,col,xpix,ypix */
188#define SSH_CMSG_EXEC_SHELL 12 /* */
189#define SSH_CMSG_EXEC_CMD 13 /* cmd (string) */
190#define SSH_SMSG_SUCCESS 14 /* */
191#define SSH_SMSG_FAILURE 15 /* */
192#define SSH_CMSG_STDIN_DATA 16 /* data (string) */
193#define SSH_SMSG_STDOUT_DATA 17 /* data (string) */
194#define SSH_SMSG_STDERR_DATA 18 /* data (string) */
195#define SSH_CMSG_EOF 19 /* */
196#define SSH_SMSG_EXITSTATUS 20 /* status (int) */
197#define SSH_MSG_CHANNEL_OPEN_CONFIRMATION 21 /* channel (int) */
198#define SSH_MSG_CHANNEL_OPEN_FAILURE 22 /* channel (int) */
199#define SSH_MSG_CHANNEL_DATA 23 /* ch,data (int,str) */
200#define SSH_MSG_CHANNEL_CLOSE 24 /* channel (int) */
201#define SSH_MSG_CHANNEL_CLOSE_CONFIRMATION 25 /* channel (int) */
202/* SSH_CMSG_X11_REQUEST_FORWARDING 26 OBSOLETE */
203#define SSH_SMSG_X11_OPEN 27 /* channel (int) */
204#define SSH_CMSG_PORT_FORWARD_REQUEST 28 /* p,host,hp (i,s,i) */
205#define SSH_MSG_PORT_OPEN 29 /* ch,h,p (i,s,i) */
206#define SSH_CMSG_AGENT_REQUEST_FORWARDING 30 /* */
207#define SSH_SMSG_AGENT_OPEN 31 /* port (int) */
208#define SSH_MSG_IGNORE 32 /* string */
209#define SSH_CMSG_EXIT_CONFIRMATION 33 /* */
210#define SSH_CMSG_X11_REQUEST_FORWARDING 34 /* proto,data (s,s) */
211#define SSH_CMSG_AUTH_RHOSTS_RSA 35 /* user,mod (s,mpi) */
212#define SSH_MSG_DEBUG 36 /* string */
213#define SSH_CMSG_REQUEST_COMPRESSION 37 /* level 1-9 (int) */
214#define SSH_CMSG_MAX_PACKET_SIZE 38 /* size 4k-1024k (int) */
215#define SSH_CMSG_AUTH_TIS 39 /* this is proto-1.5, but we ignore TIS */
216#define SSH_SMSG_AUTH_TIS_CHALLENGE 40
217#define SSH_CMSG_AUTH_TIS_RESPONSE 41
218
219#define SSH_CMSG_AUTH_KERBEROS 42 /* (KTEXT) */
220#define SSH_SMSG_AUTH_KERBEROS_RESPONSE 43 /* (KTEXT) */
221#define SSH_CMSG_HAVE_KERBEROS_TGT 44 /* credentials (s) */
222#define SSH_CMSG_HAVE_AFS_TOKEN 65 /* token (s) */
223
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000224/*------------ definitions for login.c -------------*/
225
226/* Returns the time when the user last logged in. Returns 0 if the
227 information is not available. This must be called before record_login.
228 The host from which the user logged in is stored in buf. */
229unsigned long get_last_login_time(uid_t uid, const char *logname,
230 char *buf, unsigned int bufsize);
231
232/* Records that the user has logged in. This does many things normally
233 done by login(1). */
234void record_login(int pid, const char *ttyname, const char *user, uid_t uid,
235 const char *host, struct sockaddr_in *addr);
236
237/* Records that the user has logged out. This does many thigs normally
238 done by login(1) or init. */
239void record_logout(int pid, const char *ttyname);
240
241/*------------ definitions for sshconnect.c ----------*/
242
243/* Opens a TCP/IP connection to the remote server on the given host. If
244 port is 0, the default port will be used. If anonymous is zero,
245 a privileged port will be allocated to make the connection.
246 This requires super-user privileges if anonymous is false.
247 Connection_attempts specifies the maximum number of tries, one per
248 second. This returns true on success, and zero on failure. If the
249 connection is successful, this calls packet_set_connection for the
250 connection. */
251int ssh_connect(const char *host, struct sockaddr_in *hostaddr,
252 int port, int connection_attempts,
253 int anonymous, uid_t original_real_uid,
254 const char *proxy_command);
255
256/* Starts a dialog with the server, and authenticates the current user on the
257 server. This does not need any extra privileges. The basic connection
258 to the server must already have been established before this is called.
259 If login fails, this function prints an error and never returns.
260 This initializes the random state, and leaves it initialized (it will also
261 have references from the packet module). */
Damien Miller5ce662a1999-11-11 17:57:39 +1100262
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000263void ssh_login(int host_key_valid, RSA *host_key, const char *host,
Damien Miller6d7b2cd1999-11-12 15:19:27 +1100264 struct sockaddr_in *hostaddr, uid_t original_real_uid);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000265
266/*------------ Definitions for various authentication methods. -------*/
267
268/* Tries to authenticate the user using the .rhosts file. Returns true if
269 authentication succeeds. If ignore_rhosts is non-zero, this will not
Damien Miller6d7b2cd1999-11-12 15:19:27 +1100270 consider .rhosts and .shosts (/etc/hosts.equiv will still be used). */
271int auth_rhosts(struct passwd *pw, const char *client_user);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000272
273/* Tries to authenticate the user using the .rhosts file and the host using
274 its host key. Returns true if authentication succeeds. */
275int auth_rhosts_rsa(struct passwd *pw, const char *client_user,
276 unsigned int bits, BIGNUM *client_host_key_e,
Damien Miller32265091999-11-12 11:33:04 +1100277 BIGNUM *client_host_key_n);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000278
279/* Tries to authenticate the user using password. Returns true if
280 authentication succeeds. */
281int auth_password(struct passwd *pw, const char *password);
282
283/* Performs the RSA authentication dialog with the client. This returns
284 0 if the client could not be authenticated, and 1 if authentication was
285 successful. This may exit if there is a serious protocol violation. */
Damien Miller6d7b2cd1999-11-12 15:19:27 +1100286int auth_rsa(struct passwd *pw, BIGNUM *client_n);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000287
288/* Parses an RSA key (number of bits, e, n) from a string. Moves the pointer
289 over the key. Skips any whitespace at the beginning and at end. */
290int auth_rsa_read_key(char **cpp, unsigned int *bitsp, BIGNUM *e, BIGNUM *n);
291
292/* Returns the name of the machine at the other end of the socket. The
293 returned string should be freed by the caller. */
294char *get_remote_hostname(int socket);
295
296/* Return the canonical name of the host in the other side of the current
297 connection (as returned by packet_get_connection). The host name is
298 cached, so it is efficient to call this several times. */
299const char *get_canonical_hostname(void);
300
301/* Returns the remote IP address as an ascii string. The value need not be
302 freed by the caller. */
303const char *get_remote_ipaddr(void);
304
305/* Returns the port number of the peer of the socket. */
306int get_peer_port(int sock);
307
308/* Returns the port number of the remote host. */
309int get_remote_port(void);
310
311/* Tries to match the host name (which must be in all lowercase) against the
312 comma-separated sequence of subpatterns (each possibly preceded by ! to
313 indicate negation). Returns true if there is a positive match; zero
314 otherwise. */
315int match_hostname(const char *host, const char *pattern, unsigned int len);
316
317/* Checks whether the given host is already in the list of our known hosts.
318 Returns HOST_OK if the host is known and has the specified key,
319 HOST_NEW if the host is not known, and HOST_CHANGED if the host is known
320 but used to have a different host key. The host must be in all lowercase. */
321typedef enum { HOST_OK, HOST_NEW, HOST_CHANGED } HostStatus;
322HostStatus check_host_in_hostfile(const char *filename,
323 const char *host, unsigned int bits,
324 BIGNUM *e, BIGNUM *n,
325 BIGNUM *ke, BIGNUM *kn);
326
327/* Appends an entry to the host file. Returns false if the entry
328 could not be appended. */
329int add_host_to_hostfile(const char *filename, const char *host,
330 unsigned int bits, BIGNUM *e, BIGNUM *n);
331
332/* Performs the RSA authentication challenge-response dialog with the client,
333 and returns true (non-zero) if the client gave the correct answer to
334 our challenge; returns zero if the client gives a wrong answer. */
335int auth_rsa_challenge_dialog(unsigned int bits, BIGNUM *e, BIGNUM *n);
336
337/* Reads a passphrase from /dev/tty with echo turned off. Returns the
338 passphrase (allocated with xmalloc). Exits if EOF is encountered.
339 If from_stdin is true, the passphrase will be read from stdin instead. */
340char *read_passphrase(const char *prompt, int from_stdin);
341
342/* Saves the authentication (private) key in a file, encrypting it with
343 passphrase. The identification of the file (lowest 64 bits of n)
344 will precede the key to provide identification of the key without
345 needing a passphrase. */
346int save_private_key(const char *filename, const char *passphrase,
347 RSA *private_key, const char *comment);
348
349/* Loads the public part of the key file (public key and comment).
350 Returns 0 if an error occurred; zero if the public key was successfully
351 read. The comment of the key is returned in comment_return if it is
352 non-NULL; the caller must free the value with xfree. */
353int load_public_key(const char *filename, RSA *pub,
354 char **comment_return);
355
356/* Loads the private key from the file. Returns 0 if an error is encountered
357 (file does not exist or is not readable, or passphrase is bad).
358 This initializes the private key. The comment of the key is returned
359 in comment_return if it is non-NULL; the caller must free the value
360 with xfree. */
361int load_private_key(const char *filename, const char *passphrase,
362 RSA *private_key, char **comment_return);
363
Damien Miller6d7b2cd1999-11-12 15:19:27 +1100364/*------------ Definitions for logging. -----------------------*/
365
366/* Supported syslog facilities and levels. */
367typedef enum
368{
369 SYSLOG_FACILITY_DAEMON,
370 SYSLOG_FACILITY_USER,
371 SYSLOG_FACILITY_AUTH,
372 SYSLOG_FACILITY_LOCAL0,
373 SYSLOG_FACILITY_LOCAL1,
374 SYSLOG_FACILITY_LOCAL2,
375 SYSLOG_FACILITY_LOCAL3,
376 SYSLOG_FACILITY_LOCAL4,
377 SYSLOG_FACILITY_LOCAL5,
378 SYSLOG_FACILITY_LOCAL6,
379 SYSLOG_FACILITY_LOCAL7
380} SyslogFacility;
381
382typedef enum
383{
384 SYSLOG_LEVEL_QUIET,
385 SYSLOG_LEVEL_FATAL,
386 SYSLOG_LEVEL_ERROR,
387 SYSLOG_LEVEL_INFO,
388 SYSLOG_LEVEL_CHAT,
389 SYSLOG_LEVEL_DEBUG
390} LogLevel;
391
392/* Initializes logging. */
393void log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr);
394
395/* Logging implementation, depending on server or client */
396void do_log(LogLevel level, const char *fmt, va_list args);
397
398/* Output a message to syslog or stderr */
399void fatal(const char *fmt, ...);
400void error(const char *fmt, ...);
401void log(const char *fmt, ...);
402void chat(const char *fmt, ...);
403void debug(const char *fmt, ...);
404
405/* same as fatal() but w/o logging */
406void fatal_cleanup(void);
407
408/* Registers a cleanup function to be called by fatal()/fatal_cleanup() before exiting.
409 It is permissible to call fatal_remove_cleanup for the function itself
410 from the function. */
411void fatal_add_cleanup(void (*proc)(void *context), void *context);
412
413/* Removes a cleanup function to be called at fatal(). */
414void fatal_remove_cleanup(void (*proc)(void *context), void *context);
415
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000416/*---------------- definitions for channels ------------------*/
417
418/* Sets specific protocol options. */
419void channel_set_options(int hostname_in_open);
420
421/* Allocate a new channel object and set its type and socket. Remote_name
422 must have been allocated with xmalloc; this will free it when the channel
423 is freed. */
424int channel_allocate(int type, int sock, char *remote_name);
425
426/* Free the channel and close its socket. */
427void channel_free(int channel);
428
429/* Add any bits relevant to channels in select bitmasks. */
430void channel_prepare_select(fd_set *readset, fd_set *writeset);
431
432/* After select, perform any appropriate operations for channels which
433 have events pending. */
434void channel_after_select(fd_set *readset, fd_set *writeset);
435
436/* If there is data to send to the connection, send some of it now. */
437void channel_output_poll(void);
438
439/* This is called when a packet of type CHANNEL_DATA has just been received.
440 The message type has already been consumed, but channel number and data
441 is still there. */
442void channel_input_data(int payload_len);
443
444/* Returns true if no channel has too much buffered data. */
445int channel_not_very_much_buffered_data(void);
446
447/* This is called after receiving CHANNEL_CLOSE. */
448void channel_input_close(void);
449
450/* This is called after receiving CHANNEL_CLOSE_CONFIRMATION. */
451void channel_input_close_confirmation(void);
452
453/* This is called after receiving CHANNEL_OPEN_CONFIRMATION. */
454void channel_input_open_confirmation(void);
455
456/* This is called after receiving CHANNEL_OPEN_FAILURE from the other side. */
457void channel_input_open_failure(void);
458
459/* This closes any sockets that are listening for connections; this removes
460 any unix domain sockets. */
461void channel_stop_listening(void);
462
463/* Closes the sockets of all channels. This is used to close extra file
464 descriptors after a fork. */
465void channel_close_all(void);
466
467/* Returns the maximum file descriptor number used by the channels. */
468int channel_max_fd(void);
469
470/* Returns true if there is still an open channel over the connection. */
471int channel_still_open(void);
472
473/* Returns a string containing a list of all open channels. The list is
474 suitable for displaying to the user. It uses crlf instead of newlines.
475 The caller should free the string with xfree. */
476char *channel_open_message(void);
477
478/* Initiate forwarding of connections to local port "port" through the secure
479 channel to host:port from remote side. This never returns if there
480 was an error. */
481void channel_request_local_forwarding(int port, const char *host,
482 int remote_port);
483
484/* Initiate forwarding of connections to port "port" on remote host through
485 the secure channel to host:port from local side. This never returns
486 if there was an error. This registers that open requests for that
487 port are permitted. */
488void channel_request_remote_forwarding(int port, const char *host,
489 int remote_port);
490
491/* Permits opening to any host/port in SSH_MSG_PORT_OPEN. This is usually
492 called by the server, because the user could connect to any port anyway,
493 and the server has no way to know but to trust the client anyway. */
494void channel_permit_all_opens(void);
495
496/* This is called after receiving CHANNEL_FORWARDING_REQUEST. This initates
497 listening for the port, and sends back a success reply (or disconnect
498 message if there was an error). This never returns if there was an
499 error. */
500void channel_input_port_forward_request(int is_root);
501
502/* This is called after receiving PORT_OPEN message. This attempts to connect
503 to the given host:port, and sends back CHANNEL_OPEN_CONFIRMATION or
504 CHANNEL_OPEN_FAILURE. */
505void channel_input_port_open(int payload_len);
506
507/* Creates a port for X11 connections, and starts listening for it.
508 Returns the display name, or NULL if an error was encountered. */
509char *x11_create_display(int screen);
510
511/* Creates an internet domain socket for listening for X11 connections.
512 Returns a suitable value for the DISPLAY variable, or NULL if an error
513 occurs. */
514char *x11_create_display_inet(int screen);
515
516/* This is called when SSH_SMSG_X11_OPEN is received. The packet contains
517 the remote channel number. We should do whatever we want, and respond
518 with either SSH_MSG_OPEN_CONFIRMATION or SSH_MSG_OPEN_FAILURE. */
519void x11_input_open(int payload_len);
520
521/* Requests forwarding of X11 connections. This should be called on the
522 client only. */
523void x11_request_forwarding(void);
524
525/* Requests forwarding for X11 connections, with authentication spoofing.
526 This should be called in the client only. */
527void x11_request_forwarding_with_spoofing(const char *proto, const char *data);
528
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000529/* Sends a message to the server to request authentication fd forwarding. */
530void auth_request_forwarding(void);
531
532/* Returns the name of the forwarded authentication socket. Returns NULL
533 if there is no forwarded authentication socket. The returned value points
534 to a static buffer. */
535char *auth_get_socket_name(void);
536
537/* This if called to process SSH_CMSG_AGENT_REQUEST_FORWARDING on the server.
538 This starts forwarding authentication requests. */
539void auth_input_request_forwarding(struct passwd *pw);
540
541/* This is called to process an SSH_SMSG_AGENT_OPEN message. */
542void auth_input_open_request(void);
543
544/* Returns true if the given string matches the pattern (which may contain
545 ? and * as wildcards), and zero if it does not match. */
546int match_pattern(const char *s, const char *pattern);
547
548/* Expands tildes in the file name. Returns data allocated by xmalloc.
549 Warning: this calls getpw*. */
550char *tilde_expand_filename(const char *filename, uid_t my_uid);
551
552/* Performs the interactive session. This handles data transmission between
553 the client and the program. Note that the notion of stdin, stdout, and
554 stderr in this function is sort of reversed: this function writes to
555 stdin (of the child program), and reads from stdout and stderr (of the
556 child program). */
557void server_loop(int pid, int fdin, int fdout, int fderr);
558
559/* Client side main loop for the interactive session. */
560int client_loop(int have_pty, int escape_char);
561
562/* Linked list of custom environment strings (see auth-rsa.c). */
563struct envstring {
564 struct envstring *next;
565 char *s;
566};
567
568#ifdef KRB4
569#include <krb.h>
570
571/* Performs Kerberos v4 mutual authentication with the client. This returns
572 0 if the client could not be authenticated, and 1 if authentication was
573 successful. This may exit if there is a serious protocol violation. */
574int auth_krb4(const char *server_user, KTEXT auth, char **client);
Damien Miller5ce662a1999-11-11 17:57:39 +1100575int krb4_init(uid_t uid);
576void krb4_cleanup_proc(void *ignore);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000577
578#ifdef AFS
579#include <kafs.h>
580
581/* Accept passed Kerberos v4 ticket-granting ticket and AFS tokens. */
582int auth_kerberos_tgt(struct passwd *pw, const char *string);
Damien Millerfd7c9111999-11-08 16:15:55 +1100583int auth_afs_token(struct passwd *pw, const char *token_string);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000584
585int creds_to_radix(CREDENTIALS *creds, unsigned char *buf);
586int radix_to_creds(const char *buf, CREDENTIALS *creds);
587#endif /* AFS */
588
589#endif /* KRB4 */
590
591#ifdef SKEY
592#include <skey.h>
593char *skey_fake_keyinfo(char *username);
594#endif /* SKEY */
595
596#endif /* SSH_H */