diff options
author | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
commit | 4af51306d9a51459a5bef922df1037f876ae51fe (patch) | |
tree | 09ecfc215fce82345a3259f8a0f384b9a67906f0 /authfd.h | |
parent | 5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff) |
- OpenBSD CVS updates.
[ssh.1 ssh.c]
- ssh -2
[auth.c channels.c clientloop.c packet.c packet.h serverloop.c]
[session.c sshconnect.c]
- check payload for (illegal) extra data
[ALL]
- whitespace cleanup
Diffstat (limited to 'authfd.h')
-rw-r--r-- | authfd.h | 22 |
1 files changed, 11 insertions, 11 deletions
@@ -1,19 +1,19 @@ | |||
1 | /* | 1 | /* |
2 | * | 2 | * |
3 | * authfd.h | 3 | * authfd.h |
4 | * | 4 | * |
5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
6 | * | 6 | * |
7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
8 | * All rights reserved | 8 | * All rights reserved |
9 | * | 9 | * |
10 | * Created: Wed Mar 29 01:17:41 1995 ylo | 10 | * Created: Wed Mar 29 01:17:41 1995 ylo |
11 | * | 11 | * |
12 | * Functions to interface with the SSH_AUTHENTICATION_FD socket. | 12 | * Functions to interface with the SSH_AUTHENTICATION_FD socket. |
13 | * | 13 | * |
14 | */ | 14 | */ |
15 | 15 | ||
16 | /* RCSID("$Id: authfd.h,v 1.4 1999/11/25 00:54:58 damien Exp $"); */ | 16 | /* RCSID("$Id: authfd.h,v 1.5 2000/04/16 01:18:40 damien Exp $"); */ |
17 | 17 | ||
18 | #ifndef AUTHFD_H | 18 | #ifndef AUTHFD_H |
19 | #define AUTHFD_H | 19 | #define AUTHFD_H |
@@ -67,7 +67,7 @@ void ssh_close_authentication_connection(AuthenticationConnection * ac); | |||
67 | * integers before the call, and free the comment after a successful call | 67 | * integers before the call, and free the comment after a successful call |
68 | * (before calling ssh_get_next_identity). | 68 | * (before calling ssh_get_next_identity). |
69 | */ | 69 | */ |
70 | int | 70 | int |
71 | ssh_get_first_identity(AuthenticationConnection * connection, | 71 | ssh_get_first_identity(AuthenticationConnection * connection, |
72 | BIGNUM * e, BIGNUM * n, char **comment); | 72 | BIGNUM * e, BIGNUM * n, char **comment); |
73 | 73 | ||
@@ -77,13 +77,13 @@ ssh_get_first_identity(AuthenticationConnection * connection, | |||
77 | * function. This returns 0 if there are no more identities. The caller | 77 | * function. This returns 0 if there are no more identities. The caller |
78 | * must free comment after a successful return. | 78 | * must free comment after a successful return. |
79 | */ | 79 | */ |
80 | int | 80 | int |
81 | ssh_get_next_identity(AuthenticationConnection * connection, | 81 | ssh_get_next_identity(AuthenticationConnection * connection, |
82 | BIGNUM * e, BIGNUM * n, char **comment); | 82 | BIGNUM * e, BIGNUM * n, char **comment); |
83 | 83 | ||
84 | /* Requests the agent to decrypt the given challenge. Returns true if | 84 | /* Requests the agent to decrypt the given challenge. Returns true if |
85 | the agent claims it was able to decrypt it. */ | 85 | the agent claims it was able to decrypt it. */ |
86 | int | 86 | int |
87 | ssh_decrypt_challenge(AuthenticationConnection * auth, | 87 | ssh_decrypt_challenge(AuthenticationConnection * auth, |
88 | BIGNUM * e, BIGNUM * n, BIGNUM * challenge, | 88 | BIGNUM * e, BIGNUM * n, BIGNUM * challenge, |
89 | unsigned char session_id[16], | 89 | unsigned char session_id[16], |
@@ -95,7 +95,7 @@ ssh_decrypt_challenge(AuthenticationConnection * auth, | |||
95 | * be used by normal applications. This returns true if the identity was | 95 | * be used by normal applications. This returns true if the identity was |
96 | * successfully added. | 96 | * successfully added. |
97 | */ | 97 | */ |
98 | int | 98 | int |
99 | ssh_add_identity(AuthenticationConnection * connection, RSA * key, | 99 | ssh_add_identity(AuthenticationConnection * connection, RSA * key, |
100 | const char *comment); | 100 | const char *comment); |
101 | 101 | ||