1d059297112922cabb0c674840589be8db821fd9aAdam Langley/* $OpenBSD: sshconnect.h,v 1.28 2013/10/16 02:31:47 djm Exp $ */
2bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
3bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/*
4bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Copyright (c) 2000 Markus Friedl.  All rights reserved.
5bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *
6bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Redistribution and use in source and binary forms, with or without
7bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * modification, are permitted provided that the following conditions
8bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * are met:
9bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 1. Redistributions of source code must retain the above copyright
10bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *    notice, this list of conditions and the following disclaimer.
11bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 2. Redistributions in binary form must reproduce the above copyright
12bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *    notice, this list of conditions and the following disclaimer in the
13bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *    documentation and/or other materials provided with the distribution.
14bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *
15bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */
26bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
27bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmantypedef struct Sensitive Sensitive;
28bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstruct Sensitive {
29bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	Key	**keys;
30bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	int	nkeys;
31bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	int	external_keysign;
32bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman};
33bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
34d059297112922cabb0c674840589be8db821fd9aAdam Langleystruct addrinfo;
35d059297112922cabb0c674840589be8db821fd9aAdam Langleyint	 ssh_connect(const char *, struct addrinfo *, struct sockaddr_storage *,
36d059297112922cabb0c674840589be8db821fd9aAdam Langley    u_short, int, int, int *, int, int);
37bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_kill_proxy_command(void);
38bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
39bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_login(Sensitive *, const char *, struct sockaddr *, u_short,
40bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman    struct passwd *, int);
41bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
42bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_exchange_identification(int);
43bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
44bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint	 verify_host_key(char *, struct sockaddr *, Key *);
45bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
46bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
47bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman    char **, char **);
48bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
49bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_kex(char *, struct sockaddr *);
50bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_kex2(char *, struct sockaddr *, u_short);
51bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
52bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_userauth1(const char *, const char *, char *, Sensitive *);
53bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_userauth2(const char *, const char *, char *, Sensitive *);
54bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
55bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid	 ssh_put_password(char *);
56bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint	 ssh_local_cmd(const char *);
57bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
58bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/*
59bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Macros to raise/lower permissions.
60bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */
61bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_START do {					\
62bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	int save_errno = errno;				\
63bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	if (seteuid(original_effective_uid) != 0)	\
64bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		fatal("PRIV_START: seteuid: %s",	\
65bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		    strerror(errno));			\
66bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	errno = save_errno;				\
67bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0)
68bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
69bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_END do {					\
70bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	int save_errno = errno;				\
71bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	if (seteuid(original_real_uid) != 0)		\
72bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		fatal("PRIV_END: seteuid: %s",		\
73bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		    strerror(errno));			\
74bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	errno = save_errno;				\
75bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0)
76