diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-11-25 00:51:37 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-11-25 12:23:33 +1100 |
commit | b7e74ea072919b31391bc0f5ff653f80b9f5e84f (patch) | |
tree | adb2a736c1b9f6346d342600877818631f9dbb3d /monitor_wrap.h | |
parent | d2b0f88178ec9e3f11b606bf1004ac2fe541a2c3 (diff) |
upstream: Add new structure for signature options
This is populated during signature verification with additional fields
that are present in and covered by the signature. At the moment, it is
only used to record security key-specific options, especially the flags
field.
with and ok markus@
OpenBSD-Commit-ID: 338a1f0e04904008836130bedb9ece4faafd4e49
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r-- | monitor_wrap.h | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h index 76330fc60..23ab096aa 100644 --- a/monitor_wrap.h +++ b/monitor_wrap.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor_wrap.h,v 1.43 2019/10/31 21:23:19 djm Exp $ */ | 1 | /* $OpenBSD: monitor_wrap.h,v 1.44 2019/11/25 00:51:37 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
@@ -38,6 +38,7 @@ struct monitor; | |||
38 | struct Authctxt; | 38 | struct Authctxt; |
39 | struct sshkey; | 39 | struct sshkey; |
40 | struct sshauthopt; | 40 | struct sshauthopt; |
41 | struct sshkey_sig_details; | ||
41 | 42 | ||
42 | void mm_log_handler(LogLevel, const char *, void *); | 43 | void mm_log_handler(LogLevel, const char *, void *); |
43 | int mm_is_monitor(void); | 44 | int mm_is_monitor(void); |
@@ -57,7 +58,7 @@ int mm_user_key_allowed(struct ssh *, struct passwd *, struct sshkey *, int, | |||
57 | int mm_hostbased_key_allowed(struct ssh *, struct passwd *, const char *, | 58 | int mm_hostbased_key_allowed(struct ssh *, struct passwd *, const char *, |
58 | const char *, struct sshkey *); | 59 | const char *, struct sshkey *); |
59 | int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, | 60 | int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, |
60 | const u_char *, size_t, const char *, u_int); | 61 | const u_char *, size_t, const char *, u_int, struct sshkey_sig_details **); |
61 | 62 | ||
62 | #ifdef GSSAPI | 63 | #ifdef GSSAPI |
63 | OM_uint32 mm_ssh_gssapi_server_ctx(Gssctxt **, gss_OID); | 64 | OM_uint32 mm_ssh_gssapi_server_ctx(Gssctxt **, gss_OID); |