jcs@openbsd.org | f361df4 | 2015-11-15 22:26:49 +0000 | [diff] [blame] | 1 | /* $OpenBSD: sshconnect.h,v 1.29 2015/11/15 22:26:49 jcs Exp $ */ |
Ben Lindstrom | 36579d3 | 2001-01-29 07:39:26 +0000 | [diff] [blame] | 2 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 3 | /* |
| 4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
| 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
| 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 25 | */ |
Damien Miller | 9f2abc4 | 2006-07-10 20:53:08 +1000 | [diff] [blame] | 26 | |
Ben Lindstrom | 1bad256 | 2002-06-06 19:57:33 +0000 | [diff] [blame] | 27 | typedef struct Sensitive Sensitive; |
| 28 | struct Sensitive { |
Ben Lindstrom | cb72e4f | 2002-06-21 00:41:51 +0000 | [diff] [blame] | 29 | Key **keys; |
| 30 | int nkeys; |
| 31 | int external_keysign; |
Ben Lindstrom | 1bad256 | 2002-06-06 19:57:33 +0000 | [diff] [blame] | 32 | }; |
| 33 | |
Damien Miller | 0faf747 | 2013-10-17 11:47:23 +1100 | [diff] [blame] | 34 | struct addrinfo; |
| 35 | int ssh_connect(const char *, struct addrinfo *, struct sockaddr_storage *, |
| 36 | u_short, int, int, int *, int, int); |
Damien Miller | a41ccca | 2010-10-07 22:07:32 +1100 | [diff] [blame] | 37 | void ssh_kill_proxy_command(void); |
Ben Lindstrom | 226cfa0 | 2001-01-22 05:34:40 +0000 | [diff] [blame] | 38 | |
Damien Miller | d925dcd | 2010-12-01 12:21:51 +1100 | [diff] [blame] | 39 | void ssh_login(Sensitive *, const char *, struct sockaddr *, u_short, |
| 40 | struct passwd *, int); |
Damien Miller | eba71ba | 2000-04-29 23:57:08 +1000 | [diff] [blame] | 41 | |
Darren Tucker | 1cc55d7 | 2009-06-21 18:17:19 +1000 | [diff] [blame] | 42 | void ssh_exchange_identification(int); |
| 43 | |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 44 | int verify_host_key(char *, struct sockaddr *, Key *); |
Damien Miller | eba71ba | 2000-04-29 23:57:08 +1000 | [diff] [blame] | 45 | |
Damien Miller | d925dcd | 2010-12-01 12:21:51 +1100 | [diff] [blame] | 46 | void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short, |
| 47 | char **, char **); |
| 48 | |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 49 | void ssh_kex(char *, struct sockaddr *); |
Damien Miller | d925dcd | 2010-12-01 12:21:51 +1100 | [diff] [blame] | 50 | void ssh_kex2(char *, struct sockaddr *, u_short); |
Ben Lindstrom | 5eabda3 | 2001-04-12 23:34:34 +0000 | [diff] [blame] | 51 | |
Ben Lindstrom | 1bad256 | 2002-06-06 19:57:33 +0000 | [diff] [blame] | 52 | void ssh_userauth1(const char *, const char *, char *, Sensitive *); |
| 53 | void ssh_userauth2(const char *, const char *, char *, Sensitive *); |
Damien Miller | eba71ba | 2000-04-29 23:57:08 +1000 | [diff] [blame] | 54 | |
Ben Lindstrom | 4cc240d | 2001-07-04 04:46:56 +0000 | [diff] [blame] | 55 | void ssh_put_password(char *); |
Damien Miller | d27b947 | 2005-12-13 19:29:02 +1100 | [diff] [blame] | 56 | int ssh_local_cmd(const char *); |
Ben Lindstrom | f9c4884 | 2002-06-11 16:37:51 +0000 | [diff] [blame] | 57 | |
jcs@openbsd.org | f361df4 | 2015-11-15 22:26:49 +0000 | [diff] [blame] | 58 | void maybe_add_key_to_agent(char *, Key *, char *, char *); |
| 59 | |
Ben Lindstrom | f9c4884 | 2002-06-11 16:37:51 +0000 | [diff] [blame] | 60 | /* |
| 61 | * Macros to raise/lower permissions. |
| 62 | */ |
Damien Miller | 6b4069a | 2006-06-13 13:05:15 +1000 | [diff] [blame] | 63 | #define PRIV_START do { \ |
| 64 | int save_errno = errno; \ |
| 65 | if (seteuid(original_effective_uid) != 0) \ |
| 66 | fatal("PRIV_START: seteuid: %s", \ |
| 67 | strerror(errno)); \ |
| 68 | errno = save_errno; \ |
Ben Lindstrom | f9c4884 | 2002-06-11 16:37:51 +0000 | [diff] [blame] | 69 | } while (0) |
| 70 | |
Damien Miller | 6b4069a | 2006-06-13 13:05:15 +1000 | [diff] [blame] | 71 | #define PRIV_END do { \ |
| 72 | int save_errno = errno; \ |
| 73 | if (seteuid(original_real_uid) != 0) \ |
| 74 | fatal("PRIV_END: seteuid: %s", \ |
| 75 | strerror(errno)); \ |
| 76 | errno = save_errno; \ |
Ben Lindstrom | f9c4884 | 2002-06-11 16:37:51 +0000 | [diff] [blame] | 77 | } while (0) |