]>
Commit | Line | Data |
---|---|---|
31652869 | 1 | /* $OpenBSD: sshconnect.h,v 1.23 2006/08/03 03:34:42 deraadt Exp $ */ |
23c2a7a5 | 2 | |
bcbf86ec | 3 | /* |
4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | |
5 | * | |
6 | * Redistribution and use in source and binary forms, with or without | |
7 | * modification, are permitted provided that the following conditions | |
8 | * are met: | |
9 | * 1. Redistributions of source code must retain the above copyright | |
10 | * notice, this list of conditions and the following disclaimer. | |
11 | * 2. Redistributions in binary form must reproduce the above copyright | |
12 | * notice, this list of conditions and the following disclaimer in the | |
13 | * documentation and/or other materials provided with the distribution. | |
14 | * | |
15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | |
17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | |
18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | |
19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | |
24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
25 | */ | |
b1842393 | 26 | |
39c00dc2 | 27 | typedef struct Sensitive Sensitive; |
28 | struct Sensitive { | |
7203d6bb | 29 | Key **keys; |
30 | int nkeys; | |
31 | int external_keysign; | |
39c00dc2 | 32 | }; |
33 | ||
42f11eb2 | 34 | int |
dab89049 | 35 | ssh_connect(const char *, struct sockaddr_storage *, u_short, int, int, |
3fb156df | 36 | int, const char *); |
42f11eb2 | 37 | |
42f11eb2 | 38 | void |
39c00dc2 | 39 | ssh_login(Sensitive *, const char *, struct sockaddr *, struct passwd *); |
a306f2dd | 40 | |
255cabd9 | 41 | int verify_host_key(char *, struct sockaddr *, Key *); |
a306f2dd | 42 | |
255cabd9 | 43 | void ssh_kex(char *, struct sockaddr *); |
44 | void ssh_kex2(char *, struct sockaddr *); | |
8002af61 | 45 | |
39c00dc2 | 46 | void ssh_userauth1(const char *, const char *, char *, Sensitive *); |
47 | void ssh_userauth2(const char *, const char *, char *, Sensitive *); | |
a306f2dd | 48 | |
255cabd9 | 49 | void ssh_put_password(char *); |
d20f3c9e | 50 | int ssh_local_cmd(const char *); |
3fb156df | 51 | |
52 | /* | |
53 | * Macros to raise/lower permissions. | |
54 | */ | |
82aeee5d | 55 | #define PRIV_START do { \ |
56 | int save_errno = errno; \ | |
57 | if (seteuid(original_effective_uid) != 0) \ | |
58 | fatal("PRIV_START: seteuid: %s", \ | |
59 | strerror(errno)); \ | |
60 | errno = save_errno; \ | |
3fb156df | 61 | } while (0) |
62 | ||
82aeee5d | 63 | #define PRIV_END do { \ |
64 | int save_errno = errno; \ | |
65 | if (seteuid(original_real_uid) != 0) \ | |
66 | fatal("PRIV_END: seteuid: %s", \ | |
67 | strerror(errno)); \ | |
68 | errno = save_errno; \ | |
3fb156df | 69 | } while (0) |