]>
Commit | Line | Data |
---|---|---|
5d4d25cd | 1 | /* $OpenBSD: sshconnect.h,v 1.25 2009/05/27 06:38:16 andreas Exp $ */ |
23c2a7a5 | 2 | |
bcbf86ec | 3 | /* |
4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | |
5 | * | |
6 | * Redistribution and use in source and binary forms, with or without | |
7 | * modification, are permitted provided that the following conditions | |
8 | * are met: | |
9 | * 1. Redistributions of source code must retain the above copyright | |
10 | * notice, this list of conditions and the following disclaimer. | |
11 | * 2. Redistributions in binary form must reproduce the above copyright | |
12 | * notice, this list of conditions and the following disclaimer in the | |
13 | * documentation and/or other materials provided with the distribution. | |
14 | * | |
15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | |
17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | |
18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | |
19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | |
24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
25 | */ | |
b1842393 | 26 | |
39c00dc2 | 27 | typedef struct Sensitive Sensitive; |
28 | struct Sensitive { | |
7203d6bb | 29 | Key **keys; |
30 | int nkeys; | |
31 | int external_keysign; | |
39c00dc2 | 32 | }; |
33 | ||
42f11eb2 | 34 | int |
dab89049 | 35 | ssh_connect(const char *, struct sockaddr_storage *, u_short, int, int, |
71300a43 | 36 | int *, int, int, const char *); |
42f11eb2 | 37 | |
42f11eb2 | 38 | void |
71300a43 | 39 | ssh_login(Sensitive *, const char *, struct sockaddr *, struct passwd *, int); |
a306f2dd | 40 | |
5d4d25cd | 41 | void ssh_exchange_identification(int); |
42 | ||
255cabd9 | 43 | int verify_host_key(char *, struct sockaddr *, Key *); |
a306f2dd | 44 | |
255cabd9 | 45 | void ssh_kex(char *, struct sockaddr *); |
46 | void ssh_kex2(char *, struct sockaddr *); | |
8002af61 | 47 | |
39c00dc2 | 48 | void ssh_userauth1(const char *, const char *, char *, Sensitive *); |
49 | void ssh_userauth2(const char *, const char *, char *, Sensitive *); | |
a306f2dd | 50 | |
255cabd9 | 51 | void ssh_put_password(char *); |
d20f3c9e | 52 | int ssh_local_cmd(const char *); |
3fb156df | 53 | |
54 | /* | |
55 | * Macros to raise/lower permissions. | |
56 | */ | |
82aeee5d | 57 | #define PRIV_START do { \ |
58 | int save_errno = errno; \ | |
59 | if (seteuid(original_effective_uid) != 0) \ | |
60 | fatal("PRIV_START: seteuid: %s", \ | |
61 | strerror(errno)); \ | |
62 | errno = save_errno; \ | |
3fb156df | 63 | } while (0) |
64 | ||
82aeee5d | 65 | #define PRIV_END do { \ |
66 | int save_errno = errno; \ | |
67 | if (seteuid(original_real_uid) != 0) \ | |
68 | fatal("PRIV_END: seteuid: %s", \ | |
69 | strerror(errno)); \ | |
70 | errno = save_errno; \ | |
3fb156df | 71 | } while (0) |