summaryrefslogtreecommitdiff
path: root/authfd.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
committerDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
commit4af51306d9a51459a5bef922df1037f876ae51fe (patch)
tree09ecfc215fce82345a3259f8a0f384b9a67906f0 /authfd.h
parent5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff)
- OpenBSD CVS updates.
[ssh.1 ssh.c] - ssh -2 [auth.c channels.c clientloop.c packet.c packet.h serverloop.c] [session.c sshconnect.c] - check payload for (illegal) extra data [ALL] - whitespace cleanup
Diffstat (limited to 'authfd.h')
-rw-r--r--authfd.h22
1 files changed, 11 insertions, 11 deletions
diff --git a/authfd.h b/authfd.h
index 01cfd93a5..420f592bb 100644
--- a/authfd.h
+++ b/authfd.h
@@ -1,19 +1,19 @@
1/* 1/*
2 * 2 *
3 * authfd.h 3 * authfd.h
4 * 4 *
5 * Author: Tatu Ylonen <ylo@cs.hut.fi> 5 * Author: Tatu Ylonen <ylo@cs.hut.fi>
6 * 6 *
7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 * All rights reserved 8 * All rights reserved
9 * 9 *
10 * Created: Wed Mar 29 01:17:41 1995 ylo 10 * Created: Wed Mar 29 01:17:41 1995 ylo
11 * 11 *
12 * Functions to interface with the SSH_AUTHENTICATION_FD socket. 12 * Functions to interface with the SSH_AUTHENTICATION_FD socket.
13 * 13 *
14 */ 14 */
15 15
16/* RCSID("$Id: authfd.h,v 1.4 1999/11/25 00:54:58 damien Exp $"); */ 16/* RCSID("$Id: authfd.h,v 1.5 2000/04/16 01:18:40 damien Exp $"); */
17 17
18#ifndef AUTHFD_H 18#ifndef AUTHFD_H
19#define AUTHFD_H 19#define AUTHFD_H
@@ -67,7 +67,7 @@ void ssh_close_authentication_connection(AuthenticationConnection * ac);
67 * integers before the call, and free the comment after a successful call 67 * integers before the call, and free the comment after a successful call
68 * (before calling ssh_get_next_identity). 68 * (before calling ssh_get_next_identity).
69 */ 69 */
70int 70int
71ssh_get_first_identity(AuthenticationConnection * connection, 71ssh_get_first_identity(AuthenticationConnection * connection,
72 BIGNUM * e, BIGNUM * n, char **comment); 72 BIGNUM * e, BIGNUM * n, char **comment);
73 73
@@ -77,13 +77,13 @@ ssh_get_first_identity(AuthenticationConnection * connection,
77 * function. This returns 0 if there are no more identities. The caller 77 * function. This returns 0 if there are no more identities. The caller
78 * must free comment after a successful return. 78 * must free comment after a successful return.
79 */ 79 */
80int 80int
81ssh_get_next_identity(AuthenticationConnection * connection, 81ssh_get_next_identity(AuthenticationConnection * connection,
82 BIGNUM * e, BIGNUM * n, char **comment); 82 BIGNUM * e, BIGNUM * n, char **comment);
83 83
84/* Requests the agent to decrypt the given challenge. Returns true if 84/* Requests the agent to decrypt the given challenge. Returns true if
85 the agent claims it was able to decrypt it. */ 85 the agent claims it was able to decrypt it. */
86int 86int
87ssh_decrypt_challenge(AuthenticationConnection * auth, 87ssh_decrypt_challenge(AuthenticationConnection * auth,
88 BIGNUM * e, BIGNUM * n, BIGNUM * challenge, 88 BIGNUM * e, BIGNUM * n, BIGNUM * challenge,
89 unsigned char session_id[16], 89 unsigned char session_id[16],
@@ -95,7 +95,7 @@ ssh_decrypt_challenge(AuthenticationConnection * auth,
95 * be used by normal applications. This returns true if the identity was 95 * be used by normal applications. This returns true if the identity was
96 * successfully added. 96 * successfully added.
97 */ 97 */
98int 98int
99ssh_add_identity(AuthenticationConnection * connection, RSA * key, 99ssh_add_identity(AuthenticationConnection * connection, RSA * key,
100 const char *comment); 100 const char *comment);
101 101