Annotation of src/usr.bin/ssh/monitor_wrap.h, Revision 1.2
1.1 provos 1: /*
2: * Copyright 2002 Niels Provos <provos@citi.umich.edu>
3: * All rights reserved.
4: *
5: * Redistribution and use in source and binary forms, with or without
6: * modification, are permitted provided that the following conditions
7: * are met:
8: * 1. Redistributions of source code must retain the above copyright
9: * notice, this list of conditions and the following disclaimer.
10: * 2. Redistributions in binary form must reproduce the above copyright
11: * notice, this list of conditions and the following disclaimer in the
12: * documentation and/or other materials provided with the distribution.
13: *
14: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24: */
25:
26: #ifndef _MM_WRAP_H_
27: #define _MM_WRAP_H_
28: #include "key.h"
29: #include "buffer.h"
30:
31: extern int use_privsep;
32: #define PRIVSEP(x) (use_privsep ? mm_##x : x)
33:
34: enum mm_keytype {MM_NOKEY, MM_HOSTKEY, MM_USERKEY, MM_RSAHOSTKEY, MM_RSAUSERKEY};
35:
36: struct monitor;
37: struct mm_master;
38: struct passwd;
39: struct Authctxt;
1.2 ! markus 40:
1.1 provos 41: DH *mm_choose_dh(int, int, int);
42: int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int);
43: void mm_inform_authserv(char *, char *);
44: struct passwd *mm_getpwnamallow(const char *);
45: int mm_auth_password(struct Authctxt *, char *);
46: int mm_key_allowed(enum mm_keytype, char *, char *, Key *);
47: int mm_user_key_allowed(struct passwd *, Key *);
48: int mm_hostbased_key_allowed(struct passwd *, char *, char *, Key *);
49: int mm_auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
50: int mm_key_verify(Key *, u_char *, u_int, u_char *, u_int);
51: int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
52: int mm_auth_rsa_verify_response(Key *, BIGNUM *, u_char *);
53: BIGNUM *mm_auth_rsa_generate_challenge(Key *);
54:
55: void mm_terminate(void);
56: int mm_pty_allocate(int *, int *, char *, int);
57: void mm_session_pty_cleanup2(void *);
58:
59: /* SSHv1 interfaces */
60: void mm_ssh1_session_id(u_char *);
61: int mm_ssh1_session_key(BIGNUM *);
62:
63: /* Key export functions */
64: struct Newkeys *mm_newkeys_from_blob(u_char *, int);
65: int mm_newkeys_to_blob(int, u_char **, u_int *);
66:
67: void monitor_apply_keystate(struct monitor *);
68: void mm_get_keystate(struct monitor *);
69: void mm_send_keystate(struct monitor*);
70:
71: /* bsdauth */
72: int mm_bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
73: int mm_bsdauth_respond(void *, u_int, char **);
74:
75: /* skey */
76: int mm_skey_query(void *, char **, char **, u_int *, char ***, u_int **);
77: int mm_skey_respond(void *, u_int, char **);
78:
79: /* zlib allocation hooks */
80:
81: void *mm_zalloc(struct mm_master *, u_int, u_int);
82: void mm_zfree(struct mm_master *, void *);
83: void mm_init_compression(struct mm_master *);
84:
85: /* Utility functions */
86:
87: void pwfree(struct passwd *);
88: #endif /* _MM_H_ */