Annotation of src/usr.bin/ssh/sshconnect.h, Revision 1.30
1.30 ! markus 1: /* $OpenBSD: sshconnect.h,v 1.29 2015/11/15 22:26:49 jcs Exp $ */
1.5 niklas 2:
1.2 deraadt 3: /*
4: * Copyright (c) 2000 Markus Friedl. All rights reserved.
5: *
6: * Redistribution and use in source and binary forms, with or without
7: * modification, are permitted provided that the following conditions
8: * are met:
9: * 1. Redistributions of source code must retain the above copyright
10: * notice, this list of conditions and the following disclaimer.
11: * 2. Redistributions in binary form must reproduce the above copyright
12: * notice, this list of conditions and the following disclaimer in the
13: * documentation and/or other materials provided with the distribution.
14: *
15: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25: */
1.9 markus 26:
1.14 markus 27: typedef struct Sensitive Sensitive;
28: struct Sensitive {
1.30 ! markus 29: struct sshkey **keys;
! 30: int nkeys;
! 31: int external_keysign;
1.14 markus 32: };
33:
1.28 djm 34: struct addrinfo;
35: int ssh_connect(const char *, struct addrinfo *, struct sockaddr_storage *,
36: u_short, int, int, int *, int, int);
1.26 djm 37: void ssh_kill_proxy_command(void);
1.4 markus 38:
1.27 djm 39: void ssh_login(Sensitive *, const char *, struct sockaddr *, u_short,
40: struct passwd *, int);
1.25 andreas 41:
42: void ssh_exchange_identification(int);
1.1 markus 43:
1.30 ! markus 44: int verify_host_key(char *, struct sockaddr *, struct sshkey *);
1.1 markus 45:
1.27 djm 46: void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
47: char **, char **);
48:
1.12 markus 49: void ssh_kex(char *, struct sockaddr *);
1.27 djm 50: void ssh_kex2(char *, struct sockaddr *, u_short);
1.9 markus 51:
1.14 markus 52: void ssh_userauth1(const char *, const char *, char *, Sensitive *);
53: void ssh_userauth2(const char *, const char *, char *, Sensitive *);
1.6 markus 54:
1.12 markus 55: void ssh_put_password(char *);
1.18 reyk 56: int ssh_local_cmd(const char *);
1.29 jcs 57:
1.30 ! markus 58: void maybe_add_key_to_agent(char *, struct sshkey *, char *, char *);
1.16 markus 59:
60: /*
61: * Macros to raise/lower permissions.
62: */
1.20 markus 63: #define PRIV_START do { \
64: int save_errno = errno; \
65: if (seteuid(original_effective_uid) != 0) \
66: fatal("PRIV_START: seteuid: %s", \
67: strerror(errno)); \
68: errno = save_errno; \
1.16 markus 69: } while (0)
70:
1.20 markus 71: #define PRIV_END do { \
72: int save_errno = errno; \
73: if (seteuid(original_real_uid) != 0) \
74: fatal("PRIV_END: seteuid: %s", \
75: strerror(errno)); \
76: errno = save_errno; \
1.16 markus 77: } while (0)