19768ca48f57aaf035f508a473421d210b5145e99Greg Hartman/* $OpenBSD: sshconnect.h,v 1.29 2015/11/15 22:26:49 jcs Exp $ */ 2bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 3bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 4bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Copyright (c) 2000 Markus Friedl. All rights reserved. 5bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 6bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Redistribution and use in source and binary forms, with or without 7bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * modification, are permitted provided that the following conditions 8bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * are met: 9bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 1. Redistributions of source code must retain the above copyright 10bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * notice, this list of conditions and the following disclaimer. 11bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 2. Redistributions in binary form must reproduce the above copyright 12bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * notice, this list of conditions and the following disclaimer in the 13bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * documentation and/or other materials provided with the distribution. 14bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 15bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 16bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 17bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 18bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 19bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 20bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 24bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 26bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 27bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmantypedef struct Sensitive Sensitive; 28bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstruct Sensitive { 29bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman Key **keys; 30bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int nkeys; 31bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int external_keysign; 32bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}; 33bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 34d059297112922cabb0c674840589be8db821fd9aAdam Langleystruct addrinfo; 35d059297112922cabb0c674840589be8db821fd9aAdam Langleyint ssh_connect(const char *, struct addrinfo *, struct sockaddr_storage *, 36d059297112922cabb0c674840589be8db821fd9aAdam Langley u_short, int, int, int *, int, int); 37bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kill_proxy_command(void); 38bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 39bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_login(Sensitive *, const char *, struct sockaddr *, u_short, 40bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman struct passwd *, int); 41bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 42bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_exchange_identification(int); 43bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 44bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint verify_host_key(char *, struct sockaddr *, Key *); 45bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 46bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short, 47bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman char **, char **); 48bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 49bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kex(char *, struct sockaddr *); 50bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_kex2(char *, struct sockaddr *, u_short); 51bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 52bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_userauth1(const char *, const char *, char *, Sensitive *); 53bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_userauth2(const char *, const char *, char *, Sensitive *); 54bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 55bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanvoid ssh_put_password(char *); 56bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanint ssh_local_cmd(const char *); 57bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 589768ca48f57aaf035f508a473421d210b5145e99Greg Hartmanvoid maybe_add_key_to_agent(char *, Key *, char *, char *); 599768ca48f57aaf035f508a473421d210b5145e99Greg Hartman 60bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 61bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Macros to raise/lower permissions. 62bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 63bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_START do { \ 64bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int save_errno = errno; \ 65bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (seteuid(original_effective_uid) != 0) \ 66bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman fatal("PRIV_START: seteuid: %s", \ 67bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman strerror(errno)); \ 68bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman errno = save_errno; \ 69bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0) 70bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 71bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#define PRIV_END do { \ 72bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int save_errno = errno; \ 73bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (seteuid(original_real_uid) != 0) \ 74bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman fatal("PRIV_END: seteuid: %s", \ 75bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman strerror(errno)); \ 76bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman errno = save_errno; \ 77bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} while (0) 78