blob: 683e5e07163e18828fe9285f383ca63080d7b41e [file] [log] [blame]
djm@openbsd.org04c091f2019-01-19 21:43:56 +00001/* $OpenBSD: monitor.h,v 1.23 2019/01/19 21:43:56 djm Exp $ */
Ben Lindstrom28364ec2002-03-26 03:42:20 +00002
Ben Lindstrom7a2073c2002-03-22 02:30:41 +00003/*
4 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28#ifndef _MONITOR_H_
29#define _MONITOR_H_
30
Damien Miller15b05cf2012-12-03 09:53:20 +110031/* Please keep *_REQ_* values on even numbers and *_ANS_* on odd numbers */
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000032enum monitor_reqtype {
Damien Miller15b05cf2012-12-03 09:53:20 +110033 MONITOR_REQ_MODULI = 0, MONITOR_ANS_MODULI = 1,
34 MONITOR_REQ_FREE = 2,
35 MONITOR_REQ_AUTHSERV = 4,
36 MONITOR_REQ_SIGN = 6, MONITOR_ANS_SIGN = 7,
37 MONITOR_REQ_PWNAM = 8, MONITOR_ANS_PWNAM = 9,
38 MONITOR_REQ_AUTH2_READ_BANNER = 10, MONITOR_ANS_AUTH2_READ_BANNER = 11,
39 MONITOR_REQ_AUTHPASSWORD = 12, MONITOR_ANS_AUTHPASSWORD = 13,
40 MONITOR_REQ_BSDAUTHQUERY = 14, MONITOR_ANS_BSDAUTHQUERY = 15,
41 MONITOR_REQ_BSDAUTHRESPOND = 16, MONITOR_ANS_BSDAUTHRESPOND = 17,
Damien Miller15b05cf2012-12-03 09:53:20 +110042 MONITOR_REQ_KEYALLOWED = 22, MONITOR_ANS_KEYALLOWED = 23,
43 MONITOR_REQ_KEYVERIFY = 24, MONITOR_ANS_KEYVERIFY = 25,
44 MONITOR_REQ_KEYEXPORT = 26,
45 MONITOR_REQ_PTY = 28, MONITOR_ANS_PTY = 29,
46 MONITOR_REQ_PTYCLEANUP = 30,
47 MONITOR_REQ_SESSKEY = 32, MONITOR_ANS_SESSKEY = 33,
48 MONITOR_REQ_SESSID = 34,
49 MONITOR_REQ_RSAKEYALLOWED = 36, MONITOR_ANS_RSAKEYALLOWED = 37,
50 MONITOR_REQ_RSACHALLENGE = 38, MONITOR_ANS_RSACHALLENGE = 39,
51 MONITOR_REQ_RSARESPONSE = 40, MONITOR_ANS_RSARESPONSE = 41,
52 MONITOR_REQ_GSSSETUP = 42, MONITOR_ANS_GSSSETUP = 43,
53 MONITOR_REQ_GSSSTEP = 44, MONITOR_ANS_GSSSTEP = 45,
54 MONITOR_REQ_GSSUSEROK = 46, MONITOR_ANS_GSSUSEROK = 47,
55 MONITOR_REQ_GSSCHECKMIC = 48, MONITOR_ANS_GSSCHECKMIC = 49,
56 MONITOR_REQ_TERM = 50,
Damien Miller15b05cf2012-12-03 09:53:20 +110057
58 MONITOR_REQ_PAM_START = 100,
59 MONITOR_REQ_PAM_ACCOUNT = 102, MONITOR_ANS_PAM_ACCOUNT = 103,
60 MONITOR_REQ_PAM_INIT_CTX = 104, MONITOR_ANS_PAM_INIT_CTX = 105,
61 MONITOR_REQ_PAM_QUERY = 106, MONITOR_ANS_PAM_QUERY = 107,
62 MONITOR_REQ_PAM_RESPOND = 108, MONITOR_ANS_PAM_RESPOND = 109,
63 MONITOR_REQ_PAM_FREE_CTX = 110, MONITOR_ANS_PAM_FREE_CTX = 111,
64 MONITOR_REQ_AUDIT_EVENT = 112, MONITOR_REQ_AUDIT_COMMAND = 113,
65
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000066};
67
djm@openbsd.orgec00f912019-01-19 21:43:07 +000068struct ssh;
69
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000070struct monitor {
71 int m_recvfd;
72 int m_sendfd;
Damien Miller8f0bf232011-06-20 14:42:23 +100073 int m_log_recvfd;
74 int m_log_sendfd;
markus@openbsd.org091c3022015-01-19 19:52:16 +000075 struct kex **m_pkex;
Ben Lindstromce0f6342002-06-11 16:42:49 +000076 pid_t m_pid;
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000077};
78
79struct monitor *monitor_init(void);
80void monitor_reinit(struct monitor *);
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000081
82struct Authctxt;
djm@openbsd.orgec00f912019-01-19 21:43:07 +000083void monitor_child_preauth(struct ssh *, struct monitor *);
84void monitor_child_postauth(struct ssh *, struct monitor *);
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000085
djm@openbsd.orgec00f912019-01-19 21:43:07 +000086void monitor_clear_keystate(struct ssh *, struct monitor *);
87void monitor_apply_keystate(struct ssh *, struct monitor *);
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000088
89/* Prototypes for request sending and receiving */
markus@openbsd.org235c7c42018-07-09 21:53:45 +000090void mm_request_send(int, enum monitor_reqtype, struct sshbuf *);
91void mm_request_receive(int, struct sshbuf *);
92void mm_request_receive_expect(int, enum monitor_reqtype, struct sshbuf *);
djm@openbsd.org04c091f2019-01-19 21:43:56 +000093void mm_get_keystate(struct ssh *, struct monitor *);
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000094
95#endif /* _MONITOR_H_ */