summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2019-01-19 21:41:18 +0000
committerDamien Miller <djm@mindrot.org>2019-01-20 09:45:17 +1100
commit3a00a921590d4c4b7e96df11bb10e6f9253ad45e (patch)
tree24186d71a6a77de7e303af919a4be64f2c7461bf /auth.h
parent7ec5cb4d15ed2f2c5c9f5d00e6b361d136fc1e2d (diff)
upstream: convert auth.c to new packet API
with & ok markus@ OpenBSD-Commit-ID: 7e10359f614ff522b52a3f05eec576257794e8e4
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h12
1 files changed, 6 insertions, 6 deletions
diff --git a/auth.h b/auth.h
index 68104e50b..71c372e97 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.97 2019/01/19 21:38:24 djm Exp $ */ 1/* $OpenBSD: auth.h,v 1.98 2019/01/19 21:41:18 djm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -168,8 +168,8 @@ void remove_kbdint_device(const char *);
168 168
169void do_authentication2(struct ssh *); 169void do_authentication2(struct ssh *);
170 170
171void auth_log(Authctxt *, int, int, const char *, const char *); 171void auth_log(struct ssh *, int, int, const char *, const char *);
172void auth_maxtries_exceeded(Authctxt *) __attribute__((noreturn)); 172void auth_maxtries_exceeded(struct ssh *) __attribute__((noreturn));
173void userauth_finish(struct ssh *, int, const char *, const char *); 173void userauth_finish(struct ssh *, int, const char *, const char *);
174int auth_root_allowed(struct ssh *, const char *); 174int auth_root_allowed(struct ssh *, const char *);
175 175
@@ -186,8 +186,8 @@ void auth2_challenge_stop(struct ssh *);
186int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); 186int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
187int bsdauth_respond(void *, u_int, char **); 187int bsdauth_respond(void *, u_int, char **);
188 188
189int allowed_user(struct passwd *); 189int allowed_user(struct ssh *, struct passwd *);
190struct passwd * getpwnamallow(const char *user); 190struct passwd * getpwnamallow(struct ssh *, const char *user);
191 191
192char *expand_authorized_keys(const char *, struct passwd *pw); 192char *expand_authorized_keys(const char *, struct passwd *pw);
193char *authorized_principals_file(struct passwd *); 193char *authorized_principals_file(struct passwd *);
@@ -222,7 +222,7 @@ void auth_log_authopts(const char *, const struct sshauthopt *, int);
222/* debug messages during authentication */ 222/* debug messages during authentication */
223void auth_debug_add(const char *fmt,...) 223void auth_debug_add(const char *fmt,...)
224 __attribute__((format(printf, 1, 2))); 224 __attribute__((format(printf, 1, 2)));
225void auth_debug_send(void); 225void auth_debug_send(struct ssh *);
226void auth_debug_reset(void); 226void auth_debug_reset(void);
227 227
228struct passwd *fakepw(void); 228struct passwd *fakepw(void);