| /* $OpenBSD: sshconnect.h,v 1.29 2015/11/15 22:26:49 jcs Exp $ */ |
| |
| /* |
| * Copyright (c) 2000 Markus Friedl. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| typedef struct ssh_sensitive_data Sensitive; |
| struct ssh_sensitive_data { |
| Key **host_keys; |
| int host_key_count; |
| int external_keysign; |
| Key **auth_keys; |
| int auth_key_count; |
| }; |
| |
| struct addrinfo; |
| int ssh_connect(struct ssh **, const char *, struct addrinfo *, struct sockaddr_storage *, |
| u_short, int, int, int *, int, int); |
| void ssh_kill_proxy_command(void); |
| |
| int ssh_login(struct ssh *, Sensitive *, const char *, struct sockaddr *, u_short, |
| struct passwd *, int); |
| |
| int ssh_exchange_identification(struct ssh *, int); |
| |
| int verify_host_key(struct ssh *, char *, struct sockaddr *, Key *); |
| |
| void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short, |
| char **, char **); |
| |
| int ssh_kex(struct ssh *, char *, struct sockaddr *); |
| int ssh_kex2(struct ssh *, char *, struct sockaddr *, u_short); |
| |
| int ssh_userauth1(struct ssh *, const char *, const char *, char *, Sensitive *); |
| int ssh_userauth2(struct ssh *, const char *, const char *, char *, Sensitive *); |
| |
| void ssh_put_password(char *); |
| int ssh_local_cmd(const char *); |
| |
| void maybe_add_key_to_agent(char *, Key *, char *, char *); |
| |
| /* |
| * Macros to raise/lower permissions. |
| */ |
| #define PRIV_START do { \ |
| int save_errno = errno; \ |
| if (seteuid(original_effective_uid) != 0) \ |
| fatal("PRIV_START: seteuid: %s", \ |
| strerror(errno)); \ |
| errno = save_errno; \ |
| } while (0) |
| |
| #define PRIV_END do { \ |
| int save_errno = errno; \ |
| if (seteuid(original_real_uid) != 0) \ |
| fatal("PRIV_END: seteuid: %s", \ |
| strerror(errno)); \ |
| errno = save_errno; \ |
| } while (0) |