summaryrefslogtreecommitdiff
path: root/monitor_wrap.h
diff options
context:
space:
mode:
authorManoj Srivastava <srivasta@debian.org>2014-02-09 16:09:49 +0000
committerColin Watson <cjwatson@debian.org>2020-10-18 12:07:12 +0100
commitc574865182e2c5dfa183b577f49ac602d16df5c0 (patch)
treec7fd6cf87fe77b768b44a907a0e94efa1482a98e /monitor_wrap.h
parent6806b85f30244d186206004386a9faddc16b8738 (diff)
Handle SELinux authorisation roles
Rejected upstream due to discomfort with magic usernames; a better approach will need an SSH protocol change. In the meantime, this came from Debian's SELinux maintainer, so we'll keep it until we have something better. Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1641 Bug-Debian: http://bugs.debian.org/394795 Last-Update: 2020-10-18 Patch-Name: selinux-role.patch
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r--monitor_wrap.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h
index 75aef1c74..c39e5dd8b 100644
--- a/monitor_wrap.h
+++ b/monitor_wrap.h
@@ -48,7 +48,8 @@ DH *mm_choose_dh(int, int, int);
48int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *, 48int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *,
49 const u_char *, size_t, const char *, const char *, 49 const u_char *, size_t, const char *, const char *,
50 const char *, u_int compat); 50 const char *, u_int compat);
51void mm_inform_authserv(char *, char *); 51void mm_inform_authserv(char *, char *, char *);
52void mm_inform_authrole(char *);
52struct passwd *mm_getpwnamallow(struct ssh *, const char *); 53struct passwd *mm_getpwnamallow(struct ssh *, const char *);
53char *mm_auth2_read_banner(void); 54char *mm_auth2_read_banner(void);
54int mm_auth_password(struct ssh *, char *); 55int mm_auth_password(struct ssh *, char *);