summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
authormarkus@openbsd.org <markus@openbsd.org>2016-08-13 17:47:40 +0000
committerDamien Miller <djm@mindrot.org>2016-08-14 11:19:14 +1000
commit6cb6dcffe1a2204ba9006de20f73255c268fcb6b (patch)
tree235267a1264f9363c39c4c0b11b59384e9acbdcf /auth.h
parent42d47adc5ad1187f22c726cbc52e71d6b1767ca2 (diff)
upstream commit
remove ssh1 server code; ok djm@ Upstream-ID: c24c0c32c49b91740d5a94ae914fb1898ea5f534
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h19
1 files changed, 2 insertions, 17 deletions
diff --git a/auth.h b/auth.h
index 55170af50..338a62da7 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.88 2016/05/04 14:04:40 markus Exp $ */ 1/* $OpenBSD: auth.h,v 1.89 2016/08/13 17:47:41 markus Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -112,20 +112,11 @@ struct KbdintDevice
112 void (*free_ctx)(void *ctx); 112 void (*free_ctx)(void *ctx);
113}; 113};
114 114
115int auth_rhosts(struct passwd *, const char *);
116int 115int
117auth_rhosts2(struct passwd *, const char *, const char *, const char *); 116auth_rhosts2(struct passwd *, const char *, const char *, const char *);
118 117
119int auth_rhosts_rsa(Authctxt *, char *, Key *);
120int auth_password(Authctxt *, const char *); 118int auth_password(Authctxt *, const char *);
121int auth_rsa(Authctxt *, BIGNUM *); 119
122int auth_rsa_challenge_dialog(Key *);
123BIGNUM *auth_rsa_generate_challenge(Key *);
124int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]);
125int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
126
127int auth_rhosts_rsa_key_allowed(struct passwd *, const char *,
128 const char *, Key *);
129int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 120int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
130int user_key_allowed(struct passwd *, Key *, int); 121int user_key_allowed(struct passwd *, Key *, int);
131void pubkey_auth_info(Authctxt *, const Key *, const char *, ...) 122void pubkey_auth_info(Authctxt *, const Key *, const char *, ...)
@@ -156,7 +147,6 @@ void remove_kbdint_device(const char *);
156 147
157void disable_forwarding(void); 148void disable_forwarding(void);
158 149
159void do_authentication(Authctxt *);
160void do_authentication2(Authctxt *); 150void do_authentication2(Authctxt *);
161 151
162void auth_info(Authctxt *authctxt, const char *, ...) 152void auth_info(Authctxt *authctxt, const char *, ...)
@@ -187,10 +177,6 @@ int skey_respond(void *, u_int, char **);
187int allowed_user(struct passwd *); 177int allowed_user(struct passwd *);
188struct passwd * getpwnamallow(const char *user); 178struct passwd * getpwnamallow(const char *user);
189 179
190char *get_challenge(Authctxt *);
191int verify_response(Authctxt *, const char *);
192void abandon_challenge_response(Authctxt *);
193
194char *expand_authorized_keys(const char *, struct passwd *pw); 180char *expand_authorized_keys(const char *, struct passwd *pw);
195char *authorized_principals_file(struct passwd *); 181char *authorized_principals_file(struct passwd *);
196 182
@@ -210,7 +196,6 @@ Key *get_hostkey_public_by_index(int, struct ssh *);
210Key *get_hostkey_public_by_type(int, int, struct ssh *); 196Key *get_hostkey_public_by_type(int, int, struct ssh *);
211Key *get_hostkey_private_by_type(int, int, struct ssh *); 197Key *get_hostkey_private_by_type(int, int, struct ssh *);
212int get_hostkey_index(Key *, int, struct ssh *); 198int get_hostkey_index(Key *, int, struct ssh *);
213int ssh1_session_key(BIGNUM *);
214int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *, 199int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *,
215 const u_char *, size_t, const char *, u_int); 200 const u_char *, size_t, const char *, u_int);
216 201