diff options
author | Colin Watson <cjwatson@debian.org> | 2019-06-05 06:41:44 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2019-06-05 06:41:44 +0100 |
commit | 102062f825fb26a74295a1c089c00c4c4c76b68a (patch) | |
tree | 3db66bc8c8483cce66516dff36f6ef56065143d9 /monitor_wrap.h | |
parent | 3d246f10429fc9a37b98eabef94fe8dc7c61002b (diff) | |
parent | fd0fa130ecf06d7d092932adcd5d77f1549bfc8d (diff) |
Import openssh_8.0p1.orig.tar.gz
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r-- | monitor_wrap.h | 20 |
1 files changed, 9 insertions, 11 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h index 644da081d..fdebb3aa4 100644 --- a/monitor_wrap.h +++ b/monitor_wrap.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor_wrap.h,v 1.38 2018/07/11 18:53:29 markus Exp $ */ | 1 | /* $OpenBSD: monitor_wrap.h,v 1.41 2019/01/19 21:43:56 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
@@ -33,6 +33,7 @@ extern int use_privsep; | |||
33 | 33 | ||
34 | enum mm_keytype { MM_NOKEY, MM_HOSTKEY, MM_USERKEY }; | 34 | enum mm_keytype { MM_NOKEY, MM_HOSTKEY, MM_USERKEY }; |
35 | 35 | ||
36 | struct ssh; | ||
36 | struct monitor; | 37 | struct monitor; |
37 | struct Authctxt; | 38 | struct Authctxt; |
38 | struct sshkey; | 39 | struct sshkey; |
@@ -41,17 +42,17 @@ struct sshauthopt; | |||
41 | void mm_log_handler(LogLevel, const char *, void *); | 42 | void mm_log_handler(LogLevel, const char *, void *); |
42 | int mm_is_monitor(void); | 43 | int mm_is_monitor(void); |
43 | DH *mm_choose_dh(int, int, int); | 44 | DH *mm_choose_dh(int, int, int); |
44 | int mm_sshkey_sign(struct sshkey *, u_char **, size_t *, const u_char *, size_t, | 45 | int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *, |
45 | const char *, u_int compat); | 46 | const u_char *, size_t, const char *, u_int compat); |
46 | void mm_inform_authserv(char *, char *); | 47 | void mm_inform_authserv(char *, char *); |
47 | struct passwd *mm_getpwnamallow(const char *); | 48 | struct passwd *mm_getpwnamallow(struct ssh *, const char *); |
48 | char *mm_auth2_read_banner(void); | 49 | char *mm_auth2_read_banner(void); |
49 | int mm_auth_password(struct ssh *, char *); | 50 | int mm_auth_password(struct ssh *, char *); |
50 | int mm_key_allowed(enum mm_keytype, const char *, const char *, struct sshkey *, | 51 | int mm_key_allowed(enum mm_keytype, const char *, const char *, struct sshkey *, |
51 | int, struct sshauthopt **); | 52 | int, struct sshauthopt **); |
52 | int mm_user_key_allowed(struct ssh *, struct passwd *, struct sshkey *, int, | 53 | int mm_user_key_allowed(struct ssh *, struct passwd *, struct sshkey *, int, |
53 | struct sshauthopt **); | 54 | struct sshauthopt **); |
54 | int mm_hostbased_key_allowed(struct passwd *, const char *, | 55 | int mm_hostbased_key_allowed(struct ssh *, struct passwd *, const char *, |
55 | const char *, struct sshkey *); | 56 | const char *, struct sshkey *); |
56 | int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, | 57 | int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, |
57 | const u_char *, size_t, const char *, u_int); | 58 | const u_char *, size_t, const char *, u_int); |
@@ -65,7 +66,7 @@ OM_uint32 mm_ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t); | |||
65 | #endif | 66 | #endif |
66 | 67 | ||
67 | #ifdef USE_PAM | 68 | #ifdef USE_PAM |
68 | void mm_start_pam(struct Authctxt *); | 69 | void mm_start_pam(struct ssh *ssh); |
69 | u_int mm_do_pam_account(void); | 70 | u_int mm_do_pam_account(void); |
70 | void *mm_sshpam_init_ctx(struct Authctxt *); | 71 | void *mm_sshpam_init_ctx(struct Authctxt *); |
71 | int mm_sshpam_query(void *, char **, char **, u_int *, char ***, u_int **); | 72 | int mm_sshpam_query(void *, char **, char **, u_int *, char ***, u_int **); |
@@ -75,7 +76,7 @@ void mm_sshpam_free_ctx(void *); | |||
75 | 76 | ||
76 | #ifdef SSH_AUDIT_EVENTS | 77 | #ifdef SSH_AUDIT_EVENTS |
77 | #include "audit.h" | 78 | #include "audit.h" |
78 | void mm_audit_event(ssh_audit_event_t); | 79 | void mm_audit_event(struct ssh *, ssh_audit_event_t); |
79 | void mm_audit_run_command(const char *); | 80 | void mm_audit_run_command(const char *); |
80 | #endif | 81 | #endif |
81 | 82 | ||
@@ -88,10 +89,7 @@ void mm_session_pty_cleanup2(struct Session *); | |||
88 | struct newkeys *mm_newkeys_from_blob(u_char *, int); | 89 | struct newkeys *mm_newkeys_from_blob(u_char *, int); |
89 | int mm_newkeys_to_blob(int, u_char **, u_int *); | 90 | int mm_newkeys_to_blob(int, u_char **, u_int *); |
90 | 91 | ||
91 | void monitor_clear_keystate(struct monitor *); | 92 | void mm_send_keystate(struct ssh *, struct monitor*); |
92 | void monitor_apply_keystate(struct monitor *); | ||
93 | void mm_get_keystate(struct monitor *); | ||
94 | void mm_send_keystate(struct monitor*); | ||
95 | 93 | ||
96 | /* bsdauth */ | 94 | /* bsdauth */ |
97 | int mm_bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); | 95 | int mm_bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); |