2024-05-17 00:30:23 +00:00
|
|
|
/* $OpenBSD: monitor.h,v 1.24 2024/05/17 00:30:24 djm Exp $ */
|
2002-03-26 03:42:20 +00:00
|
|
|
|
2002-03-22 02:30:41 +00:00
|
|
|
/*
|
|
|
|
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _MONITOR_H_
|
|
|
|
#define _MONITOR_H_
|
|
|
|
|
2012-12-02 22:53:20 +00:00
|
|
|
/* Please keep *_REQ_* values on even numbers and *_ANS_* on odd numbers */
|
2002-03-22 02:30:41 +00:00
|
|
|
enum monitor_reqtype {
|
2012-12-02 22:53:20 +00:00
|
|
|
MONITOR_REQ_MODULI = 0, MONITOR_ANS_MODULI = 1,
|
|
|
|
MONITOR_REQ_FREE = 2,
|
|
|
|
MONITOR_REQ_AUTHSERV = 4,
|
|
|
|
MONITOR_REQ_SIGN = 6, MONITOR_ANS_SIGN = 7,
|
|
|
|
MONITOR_REQ_PWNAM = 8, MONITOR_ANS_PWNAM = 9,
|
|
|
|
MONITOR_REQ_AUTH2_READ_BANNER = 10, MONITOR_ANS_AUTH2_READ_BANNER = 11,
|
|
|
|
MONITOR_REQ_AUTHPASSWORD = 12, MONITOR_ANS_AUTHPASSWORD = 13,
|
|
|
|
MONITOR_REQ_BSDAUTHQUERY = 14, MONITOR_ANS_BSDAUTHQUERY = 15,
|
|
|
|
MONITOR_REQ_BSDAUTHRESPOND = 16, MONITOR_ANS_BSDAUTHRESPOND = 17,
|
|
|
|
MONITOR_REQ_KEYALLOWED = 22, MONITOR_ANS_KEYALLOWED = 23,
|
|
|
|
MONITOR_REQ_KEYVERIFY = 24, MONITOR_ANS_KEYVERIFY = 25,
|
|
|
|
MONITOR_REQ_KEYEXPORT = 26,
|
|
|
|
MONITOR_REQ_PTY = 28, MONITOR_ANS_PTY = 29,
|
|
|
|
MONITOR_REQ_PTYCLEANUP = 30,
|
|
|
|
MONITOR_REQ_SESSKEY = 32, MONITOR_ANS_SESSKEY = 33,
|
|
|
|
MONITOR_REQ_SESSID = 34,
|
|
|
|
MONITOR_REQ_RSAKEYALLOWED = 36, MONITOR_ANS_RSAKEYALLOWED = 37,
|
|
|
|
MONITOR_REQ_RSACHALLENGE = 38, MONITOR_ANS_RSACHALLENGE = 39,
|
|
|
|
MONITOR_REQ_RSARESPONSE = 40, MONITOR_ANS_RSARESPONSE = 41,
|
|
|
|
MONITOR_REQ_GSSSETUP = 42, MONITOR_ANS_GSSSETUP = 43,
|
|
|
|
MONITOR_REQ_GSSSTEP = 44, MONITOR_ANS_GSSSTEP = 45,
|
|
|
|
MONITOR_REQ_GSSUSEROK = 46, MONITOR_ANS_GSSUSEROK = 47,
|
|
|
|
MONITOR_REQ_GSSCHECKMIC = 48, MONITOR_ANS_GSSCHECKMIC = 49,
|
|
|
|
MONITOR_REQ_TERM = 50,
|
2024-10-14 01:57:50 +00:00
|
|
|
MONITOR_REQ_STATE = 51, MONITOR_ANS_STATE = 52,
|
2012-12-02 22:53:20 +00:00
|
|
|
|
|
|
|
MONITOR_REQ_PAM_START = 100,
|
|
|
|
MONITOR_REQ_PAM_ACCOUNT = 102, MONITOR_ANS_PAM_ACCOUNT = 103,
|
|
|
|
MONITOR_REQ_PAM_INIT_CTX = 104, MONITOR_ANS_PAM_INIT_CTX = 105,
|
|
|
|
MONITOR_REQ_PAM_QUERY = 106, MONITOR_ANS_PAM_QUERY = 107,
|
|
|
|
MONITOR_REQ_PAM_RESPOND = 108, MONITOR_ANS_PAM_RESPOND = 109,
|
|
|
|
MONITOR_REQ_PAM_FREE_CTX = 110, MONITOR_ANS_PAM_FREE_CTX = 111,
|
|
|
|
MONITOR_REQ_AUDIT_EVENT = 112, MONITOR_REQ_AUDIT_COMMAND = 113,
|
|
|
|
|
2002-03-22 02:30:41 +00:00
|
|
|
};
|
|
|
|
|
2019-01-19 21:43:07 +00:00
|
|
|
struct ssh;
|
2024-05-17 00:30:23 +00:00
|
|
|
struct sshbuf;
|
2019-01-19 21:43:07 +00:00
|
|
|
|
2002-03-22 02:30:41 +00:00
|
|
|
struct monitor {
|
|
|
|
int m_recvfd;
|
|
|
|
int m_sendfd;
|
2011-06-20 04:42:23 +00:00
|
|
|
int m_log_recvfd;
|
|
|
|
int m_log_sendfd;
|
2015-01-19 19:52:16 +00:00
|
|
|
struct kex **m_pkex;
|
2002-06-11 16:42:49 +00:00
|
|
|
pid_t m_pid;
|
2002-03-22 02:30:41 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct monitor *monitor_init(void);
|
|
|
|
void monitor_reinit(struct monitor *);
|
|
|
|
|
|
|
|
struct Authctxt;
|
2019-01-19 21:43:07 +00:00
|
|
|
void monitor_child_preauth(struct ssh *, struct monitor *);
|
|
|
|
void monitor_child_postauth(struct ssh *, struct monitor *);
|
2002-03-22 02:30:41 +00:00
|
|
|
|
2019-01-19 21:43:07 +00:00
|
|
|
void monitor_clear_keystate(struct ssh *, struct monitor *);
|
|
|
|
void monitor_apply_keystate(struct ssh *, struct monitor *);
|
2002-03-22 02:30:41 +00:00
|
|
|
|
|
|
|
/* Prototypes for request sending and receiving */
|
2018-07-09 21:53:45 +00:00
|
|
|
void mm_request_send(int, enum monitor_reqtype, struct sshbuf *);
|
|
|
|
void mm_request_receive(int, struct sshbuf *);
|
|
|
|
void mm_request_receive_expect(int, enum monitor_reqtype, struct sshbuf *);
|
2019-01-19 21:43:56 +00:00
|
|
|
void mm_get_keystate(struct ssh *, struct monitor *);
|
2002-03-22 02:30:41 +00:00
|
|
|
|
2024-05-17 00:30:23 +00:00
|
|
|
/* XXX: should be returned via a monitor call rather than config_fd */
|
|
|
|
void mm_encode_server_options(struct sshbuf *);
|
|
|
|
|
2024-10-14 01:57:50 +00:00
|
|
|
struct sshbuf *pack_hostkeys(void);
|
|
|
|
|
2002-03-22 02:30:41 +00:00
|
|
|
#endif /* _MONITOR_H_ */
|