xref: /dflybsd-src/crypto/openssh/monitor.h (revision ba1276acd1c8c22d225b1bcf370a14c878644f44)
1*ba1276acSMatthew Dillon /* $OpenBSD: monitor.h,v 1.24 2024/05/17 00:30:24 djm Exp $ */
218de8d7fSPeter Avalos 
318de8d7fSPeter Avalos /*
418de8d7fSPeter Avalos  * Copyright 2002 Niels Provos <provos@citi.umich.edu>
518de8d7fSPeter Avalos  * All rights reserved.
618de8d7fSPeter Avalos  *
718de8d7fSPeter Avalos  * Redistribution and use in source and binary forms, with or without
818de8d7fSPeter Avalos  * modification, are permitted provided that the following conditions
918de8d7fSPeter Avalos  * are met:
1018de8d7fSPeter Avalos  * 1. Redistributions of source code must retain the above copyright
1118de8d7fSPeter Avalos  *    notice, this list of conditions and the following disclaimer.
1218de8d7fSPeter Avalos  * 2. Redistributions in binary form must reproduce the above copyright
1318de8d7fSPeter Avalos  *    notice, this list of conditions and the following disclaimer in the
1418de8d7fSPeter Avalos  *    documentation and/or other materials provided with the distribution.
1518de8d7fSPeter Avalos  *
1618de8d7fSPeter Avalos  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
1718de8d7fSPeter Avalos  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
1818de8d7fSPeter Avalos  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
1918de8d7fSPeter Avalos  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
2018de8d7fSPeter Avalos  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
2118de8d7fSPeter Avalos  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
2218de8d7fSPeter Avalos  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
2318de8d7fSPeter Avalos  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2418de8d7fSPeter Avalos  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
2518de8d7fSPeter Avalos  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2618de8d7fSPeter Avalos  */
2718de8d7fSPeter Avalos 
2818de8d7fSPeter Avalos #ifndef _MONITOR_H_
2918de8d7fSPeter Avalos #define _MONITOR_H_
3018de8d7fSPeter Avalos 
3136e94dc5SPeter Avalos /* Please keep *_REQ_* values on even numbers and *_ANS_* on odd numbers */
3218de8d7fSPeter Avalos enum monitor_reqtype {
3336e94dc5SPeter Avalos 	MONITOR_REQ_MODULI = 0, MONITOR_ANS_MODULI = 1,
3436e94dc5SPeter Avalos 	MONITOR_REQ_FREE = 2,
3536e94dc5SPeter Avalos 	MONITOR_REQ_AUTHSERV = 4,
3636e94dc5SPeter Avalos 	MONITOR_REQ_SIGN = 6, MONITOR_ANS_SIGN = 7,
3736e94dc5SPeter Avalos 	MONITOR_REQ_PWNAM = 8, MONITOR_ANS_PWNAM = 9,
3836e94dc5SPeter Avalos 	MONITOR_REQ_AUTH2_READ_BANNER = 10, MONITOR_ANS_AUTH2_READ_BANNER = 11,
3936e94dc5SPeter Avalos 	MONITOR_REQ_AUTHPASSWORD = 12, MONITOR_ANS_AUTHPASSWORD = 13,
4036e94dc5SPeter Avalos 	MONITOR_REQ_BSDAUTHQUERY = 14, MONITOR_ANS_BSDAUTHQUERY = 15,
4136e94dc5SPeter Avalos 	MONITOR_REQ_BSDAUTHRESPOND = 16, MONITOR_ANS_BSDAUTHRESPOND = 17,
4236e94dc5SPeter Avalos 	MONITOR_REQ_KEYALLOWED = 22, MONITOR_ANS_KEYALLOWED = 23,
4336e94dc5SPeter Avalos 	MONITOR_REQ_KEYVERIFY = 24, MONITOR_ANS_KEYVERIFY = 25,
4436e94dc5SPeter Avalos 	MONITOR_REQ_KEYEXPORT = 26,
4536e94dc5SPeter Avalos 	MONITOR_REQ_PTY = 28, MONITOR_ANS_PTY = 29,
4636e94dc5SPeter Avalos 	MONITOR_REQ_PTYCLEANUP = 30,
4736e94dc5SPeter Avalos 	MONITOR_REQ_SESSKEY = 32, MONITOR_ANS_SESSKEY = 33,
4836e94dc5SPeter Avalos 	MONITOR_REQ_SESSID = 34,
4936e94dc5SPeter Avalos 	MONITOR_REQ_RSAKEYALLOWED = 36, MONITOR_ANS_RSAKEYALLOWED = 37,
5036e94dc5SPeter Avalos 	MONITOR_REQ_RSACHALLENGE = 38, MONITOR_ANS_RSACHALLENGE = 39,
5136e94dc5SPeter Avalos 	MONITOR_REQ_RSARESPONSE = 40, MONITOR_ANS_RSARESPONSE = 41,
5236e94dc5SPeter Avalos 	MONITOR_REQ_GSSSETUP = 42, MONITOR_ANS_GSSSETUP = 43,
5336e94dc5SPeter Avalos 	MONITOR_REQ_GSSSTEP = 44, MONITOR_ANS_GSSSTEP = 45,
5436e94dc5SPeter Avalos 	MONITOR_REQ_GSSUSEROK = 46, MONITOR_ANS_GSSUSEROK = 47,
5536e94dc5SPeter Avalos 	MONITOR_REQ_GSSCHECKMIC = 48, MONITOR_ANS_GSSCHECKMIC = 49,
5636e94dc5SPeter Avalos 	MONITOR_REQ_TERM = 50,
5736e94dc5SPeter Avalos 
5836e94dc5SPeter Avalos 	MONITOR_REQ_PAM_START = 100,
5936e94dc5SPeter Avalos 	MONITOR_REQ_PAM_ACCOUNT = 102, MONITOR_ANS_PAM_ACCOUNT = 103,
6036e94dc5SPeter Avalos 	MONITOR_REQ_PAM_INIT_CTX = 104, MONITOR_ANS_PAM_INIT_CTX = 105,
6136e94dc5SPeter Avalos 	MONITOR_REQ_PAM_QUERY = 106, MONITOR_ANS_PAM_QUERY = 107,
6236e94dc5SPeter Avalos 	MONITOR_REQ_PAM_RESPOND = 108, MONITOR_ANS_PAM_RESPOND = 109,
6336e94dc5SPeter Avalos 	MONITOR_REQ_PAM_FREE_CTX = 110, MONITOR_ANS_PAM_FREE_CTX = 111,
6436e94dc5SPeter Avalos 	MONITOR_REQ_AUDIT_EVENT = 112, MONITOR_REQ_AUDIT_COMMAND = 113,
6536e94dc5SPeter Avalos 
6618de8d7fSPeter Avalos };
6718de8d7fSPeter Avalos 
68664f4763Szrj struct ssh;
69*ba1276acSMatthew Dillon struct sshbuf;
70664f4763Szrj 
7118de8d7fSPeter Avalos struct monitor {
7218de8d7fSPeter Avalos 	int			 m_recvfd;
7318de8d7fSPeter Avalos 	int			 m_sendfd;
741c188a7fSPeter Avalos 	int			 m_log_recvfd;
751c188a7fSPeter Avalos 	int			 m_log_sendfd;
76e9778795SPeter Avalos 	struct kex		**m_pkex;
7718de8d7fSPeter Avalos 	pid_t			 m_pid;
7818de8d7fSPeter Avalos };
7918de8d7fSPeter Avalos 
8018de8d7fSPeter Avalos struct monitor *monitor_init(void);
8118de8d7fSPeter Avalos void monitor_reinit(struct monitor *);
8218de8d7fSPeter Avalos 
8318de8d7fSPeter Avalos struct Authctxt;
84664f4763Szrj void monitor_child_preauth(struct ssh *, struct monitor *);
85664f4763Szrj void monitor_child_postauth(struct ssh *, struct monitor *);
8618de8d7fSPeter Avalos 
87664f4763Szrj void monitor_clear_keystate(struct ssh *, struct monitor *);
88664f4763Szrj void monitor_apply_keystate(struct ssh *, struct monitor *);
8918de8d7fSPeter Avalos 
9018de8d7fSPeter Avalos /* Prototypes for request sending and receiving */
91664f4763Szrj void mm_request_send(int, enum monitor_reqtype, struct sshbuf *);
92664f4763Szrj void mm_request_receive(int, struct sshbuf *);
93664f4763Szrj void mm_request_receive_expect(int, enum monitor_reqtype, struct sshbuf *);
94664f4763Szrj void mm_get_keystate(struct ssh *, struct monitor *);
9518de8d7fSPeter Avalos 
96*ba1276acSMatthew Dillon /* XXX: should be returned via a monitor call rather than config_fd */
97*ba1276acSMatthew Dillon void mm_encode_server_options(struct sshbuf *);
98*ba1276acSMatthew Dillon 
9918de8d7fSPeter Avalos #endif /* _MONITOR_H_ */
100