summaryrefslogtreecommitdiff
path: root/authfd.h
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-07-04 04:02:36 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-07-04 04:02:36 +0000
commit16ae3d0dba5f81e5602798b915105284033dea75 (patch)
treece0c2bf0d7e961b1015d43d1a07269d81e7a9ce9 /authfd.h
parent90279d80f57c79ac6566051172a94a2cca9674b1 (diff)
- itojun@cvs.openbsd.org 2001/06/26 06:32:58
[atomicio.h authfd.h authfile.h auth.h auth-options.h bufaux.h buffer.h canohost.h channels.h cipher.h clientloop.h compat.h compress.h crc32.h deattack.h dh.h dispatch.h groupaccess.h hostfile.h kex.h key.h log.h mac.h match.h misc.h mpaux.h packet.h radix.h readconf.h readpass.h rsa.h] prototype pedant. not very creative... - () -> (void) - no variable names
Diffstat (limited to 'authfd.h')
-rw-r--r--authfd.h34
1 files changed, 14 insertions, 20 deletions
diff --git a/authfd.h b/authfd.h
index 04439fd07..4fe35aff8 100644
--- a/authfd.h
+++ b/authfd.h
@@ -11,7 +11,7 @@
11 * called by a name other than "ssh" or "Secure Shell". 11 * called by a name other than "ssh" or "Secure Shell".
12 */ 12 */
13 13
14/* RCSID("$OpenBSD: authfd.h,v 1.17 2001/06/26 04:59:59 markus Exp $"); */ 14/* RCSID("$OpenBSD: authfd.h,v 1.18 2001/06/26 06:32:47 itojun Exp $"); */
15 15
16#ifndef AUTHFD_H 16#ifndef AUTHFD_H
17#define AUTHFD_H 17#define AUTHFD_H
@@ -62,7 +62,7 @@ int ssh_get_authentication_socket(void);
62 * ssh_get_authentication_socket(). Depending on the way the descriptor was 62 * ssh_get_authentication_socket(). Depending on the way the descriptor was
63 * obtained, this may close the descriptor. 63 * obtained, this may close the descriptor.
64 */ 64 */
65void ssh_close_authentication_socket(int authfd); 65void ssh_close_authentication_socket(int);
66 66
67/* 67/*
68 * Opens and connects a private socket for communication with the 68 * Opens and connects a private socket for communication with the
@@ -76,19 +76,19 @@ AuthenticationConnection *ssh_get_authentication_connection(void);
76 * Closes the connection to the authentication agent and frees any associated 76 * Closes the connection to the authentication agent and frees any associated
77 * memory. 77 * memory.
78 */ 78 */
79void ssh_close_authentication_connection(AuthenticationConnection *auth); 79void ssh_close_authentication_connection(AuthenticationConnection *);
80 80
81/* 81/*
82 * Returns the number authentication identity held by the agent. 82 * Returns the number authentication identity held by the agent.
83 */ 83 */
84int ssh_get_num_identities(AuthenticationConnection *auth, int version); 84int ssh_get_num_identities(AuthenticationConnection *, int);
85 85
86/* 86/*
87 * Returns the first authentication identity held by the agent or NULL if 87 * Returns the first authentication identity held by the agent or NULL if
88 * no identies are available. Caller must free comment and key. 88 * no identies are available. Caller must free comment and key.
89 * Note that you cannot mix calls with different versions. 89 * Note that you cannot mix calls with different versions.
90 */ 90 */
91Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version); 91Key *ssh_get_first_identity(AuthenticationConnection *, char **, int);
92 92
93/* 93/*
94 * Returns the next authentication identity for the agent. Other functions 94 * Returns the next authentication identity for the agent. Other functions
@@ -96,25 +96,20 @@ Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int
96 * function. This returns NULL if there are no more identities. The caller 96 * function. This returns NULL if there are no more identities. The caller
97 * must free key and comment after a successful return. 97 * must free key and comment after a successful return.
98 */ 98 */
99Key *ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version); 99Key *ssh_get_next_identity(AuthenticationConnection *, char **, int);
100 100
101/* 101/*
102 * Requests the agent to decrypt the given challenge. Returns true if the 102 * Requests the agent to decrypt the given challenge. Returns true if the
103 * agent claims it was able to decrypt it. 103 * agent claims it was able to decrypt it.
104 */ 104 */
105int 105int
106ssh_decrypt_challenge(AuthenticationConnection *auth, 106ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
107 Key *key, BIGNUM * challenge, 107 u_int, u_char[16]);
108 u_char session_id[16],
109 u_int response_type,
110 u_char response[16]);
111 108
112/* Requests the agent to sign data using key */ 109/* Requests the agent to sign data using key */
113int 110int
114ssh_agent_sign(AuthenticationConnection *auth, 111ssh_agent_sign(AuthenticationConnection *, Key *, u_char **, int *,
115 Key *key, 112 u_char *, int);
116 u_char **sigp, int *lenp,
117 u_char *data, int datalen);
118 113
119/* 114/*
120 * Adds an identity to the authentication server. This call is not meant to 115 * Adds an identity to the authentication server. This call is not meant to
@@ -122,23 +117,22 @@ ssh_agent_sign(AuthenticationConnection *auth,
122 * successfully added. 117 * successfully added.
123 */ 118 */
124int 119int
125ssh_add_identity(AuthenticationConnection *auth, Key *key, 120ssh_add_identity(AuthenticationConnection *, Key *, const char *);
126 const char *comment);
127 121
128/* 122/*
129 * Removes the identity from the authentication server. This call is not 123 * Removes the identity from the authentication server. This call is not
130 * meant to be used by normal applications. This returns true if the 124 * meant to be used by normal applications. This returns true if the
131 * identity was successfully added. 125 * identity was successfully added.
132 */ 126 */
133int ssh_remove_identity(AuthenticationConnection *auth, Key *key); 127int ssh_remove_identity(AuthenticationConnection *, Key *);
134 128
135/* 129/*
136 * Removes all identities from the authentication agent. This call is not 130 * Removes all identities from the authentication agent. This call is not
137 * meant to be used by normal applications. This returns true if the 131 * meant to be used by normal applications. This returns true if the
138 * operation was successful. 132 * operation was successful.
139 */ 133 */
140int ssh_remove_all_identities(AuthenticationConnection *auth, int version); 134int ssh_remove_all_identities(AuthenticationConnection *, int);
141 135
142int ssh_update_card(AuthenticationConnection *auth, int add, int reader_id); 136int ssh_update_card(AuthenticationConnection *, int, int);
143 137
144#endif /* AUTHFD_H */ 138#endif /* AUTHFD_H */