summaryrefslogtreecommitdiff
path: root/authfd.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>1999-11-16 13:37:16 +1100
committerDamien Miller <djm@mindrot.org>1999-11-16 13:37:16 +1100
commit7e8e820153a620ab1dcd81857a7de0969c41d043 (patch)
tree226cc4185feae97f4069ad60b4c18d259aa5df2f /authfd.h
parent4874c79a3a05fc18678d7a85d7091f5139630fac (diff)
- Merged OpenBSD CVS changes:
- [auth-rh-rsa.c auth-rsa.c authfd.c authfd.h hostfile.c mpaux.c] [mpaux.h ssh-add.c ssh-agent.c ssh.h ssh.c sshd.c] the keysize of rsa-parameter 'n' is passed implizit, a few more checks and warnings about 'pretended' keysizes. - [cipher.c cipher.h packet.c packet.h sshd.c] remove support for cipher RC4 - [ssh.c] a note for legay systems about secuity issues with permanently_set_uid(), the private hostkey and ptrace() - [sshconnect.c] more detailed messages about adding and checking hostkeys
Diffstat (limited to 'authfd.h')
-rw-r--r--authfd.h8
1 files changed, 4 insertions, 4 deletions
diff --git a/authfd.h b/authfd.h
index 1def920e3..df589b1c4 100644
--- a/authfd.h
+++ b/authfd.h
@@ -13,7 +13,7 @@ Functions to interface with the SSH_AUTHENTICATION_FD socket.
13 13
14*/ 14*/
15 15
16/* RCSID("$Id: authfd.h,v 1.1 1999/10/27 03:42:43 damien Exp $"); */ 16/* RCSID("$Id: authfd.h,v 1.2 1999/11/16 02:37:16 damien Exp $"); */
17 17
18#ifndef AUTHFD_H 18#ifndef AUTHFD_H
19#define AUTHFD_H 19#define AUTHFD_H
@@ -62,19 +62,19 @@ void ssh_close_authentication_connection(AuthenticationConnection *ac);
62 The caller must initialize the integers before the call, and free the 62 The caller must initialize the integers before the call, and free the
63 comment after a successful call (before calling ssh_get_next_identity). */ 63 comment after a successful call (before calling ssh_get_next_identity). */
64int ssh_get_first_identity(AuthenticationConnection *connection, 64int ssh_get_first_identity(AuthenticationConnection *connection,
65 int *bitsp, BIGNUM *e, BIGNUM *n, char **comment); 65 BIGNUM *e, BIGNUM *n, char **comment);
66 66
67/* Returns the next authentication identity for the agent. Other functions 67/* Returns the next authentication identity for the agent. Other functions
68 can be called between this and ssh_get_first_identity or two calls of this 68 can be called between this and ssh_get_first_identity or two calls of this
69 function. This returns 0 if there are no more identities. The caller 69 function. This returns 0 if there are no more identities. The caller
70 must free comment after a successful return. */ 70 must free comment after a successful return. */
71int ssh_get_next_identity(AuthenticationConnection *connection, 71int ssh_get_next_identity(AuthenticationConnection *connection,
72 int *bitsp, BIGNUM *e, BIGNUM *n, char **comment); 72 BIGNUM *e, BIGNUM *n, char **comment);
73 73
74/* Requests the agent to decrypt the given challenge. Returns true if 74/* Requests the agent to decrypt the given challenge. Returns true if
75 the agent claims it was able to decrypt it. */ 75 the agent claims it was able to decrypt it. */
76int ssh_decrypt_challenge(AuthenticationConnection *auth, 76int ssh_decrypt_challenge(AuthenticationConnection *auth,
77 int bits, BIGNUM *e, BIGNUM *n, BIGNUM *challenge, 77 BIGNUM *e, BIGNUM *n, BIGNUM *challenge,
78 unsigned char session_id[16], 78 unsigned char session_id[16],
79 unsigned int response_type, 79 unsigned int response_type,
80 unsigned char response[16]); 80 unsigned char response[16]);