1d059297112922cabb0c674840589be8db821fd9aAdam Langley/* $OpenBSD: sshconnect.h,v 1.28 2013/10/16 02:31:47 djm Exp $ */ 2bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 3bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 4bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Copyright (c) 2000 Markus Friedl. All rights reserved. 5bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 6bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Redistribution and use in source and binary forms, with or without 7bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * modification, are permitted provided that the following conditions 8bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * are met: 9bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 1. Redistributions of source code must retain the above copyright 10bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * notice, this list of conditions and the following disclaimer. 11bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 2. Redistributions in binary form must reproduce the above copyright 12bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * notice, this list of conditions and the following disclaimer in the 13bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * documentation and/or other materials provided with the distribution. 14bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 15bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 16bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 17bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 18bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 19bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 20bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 24bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 26bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 27bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmantypedef struct Sensitive Sensitive; 28bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstruct Sensitive { 29bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman Key **keys; 30bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int nkeys; 31bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int external_keysign; 32bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}; 33bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 34d059297112922cabb0c674840589be8db821fd9aAdam Langleystruct addrinfo; 35d059297112922cabb0c674840589be8db821fd9aAdam Langleyint ssh_connect(const char *, struct addrinfo *, struct sockaddr_storage *, 36d059297112922cabb0c674840589be8db821fd9aAdam Langley u_short, int, int, int *, int, int); 37bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kill_proxy_command(void); 38bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 39bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_login(Sensitive *, const char *, struct sockaddr *, u_short, 40bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman struct passwd *, int); 41bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 42bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_exchange_identification(int); 43bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 44bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint verify_host_key(char *, struct sockaddr *, Key *); 45bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 46bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short, 47bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman char **, char **); 48bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 49bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kex(char *, struct sockaddr *); 50bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kex2(char *, struct sockaddr *, u_short); 51bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 52bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_userauth1(const char *, const char *, char *, Sensitive *); 53bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_userauth2(const char *, const char *, char *, Sensitive *); 54bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 55bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_put_password(char *); 56bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint ssh_local_cmd(const char *); 57bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 58bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 59bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Macros to raise/lower permissions. 60bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 61bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_START do { \ 62bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int save_errno = errno; \ 63bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (seteuid(original_effective_uid) != 0) \ 64bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman fatal("PRIV_START: seteuid: %s", \ 65bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman strerror(errno)); \ 66bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman errno = save_errno; \ 67bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0) 68bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 69bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_END do { \ 70bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int save_errno = errno; \ 71bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (seteuid(original_real_uid) != 0) \ 72bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman fatal("PRIV_END: seteuid: %s", \ 73bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman strerror(errno)); \ 74bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman errno = save_errno; \ 75bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0) 76