summaryrefslogtreecommitdiff
path: root/ssh.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
committerDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
commit4af51306d9a51459a5bef922df1037f876ae51fe (patch)
tree09ecfc215fce82345a3259f8a0f384b9a67906f0 /ssh.h
parent5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff)
- OpenBSD CVS updates.
[ssh.1 ssh.c] - ssh -2 [auth.c channels.c clientloop.c packet.c packet.h serverloop.c] [session.c sshconnect.c] - check payload for (illegal) extra data [ALL] - whitespace cleanup
Diffstat (limited to 'ssh.h')
-rw-r--r--ssh.h30
1 files changed, 15 insertions, 15 deletions
diff --git a/ssh.h b/ssh.h
index ea2dc032c..57fcf57b9 100644
--- a/ssh.h
+++ b/ssh.h
@@ -1,19 +1,19 @@
1/* 1/*
2 * 2 *
3 * ssh.h 3 * ssh.h
4 * 4 *
5 * Author: Tatu Ylonen <ylo@cs.hut.fi> 5 * Author: Tatu Ylonen <ylo@cs.hut.fi>
6 * 6 *
7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 * All rights reserved 8 * All rights reserved
9 * 9 *
10 * Created: Fri Mar 17 17:09:37 1995 ylo 10 * Created: Fri Mar 17 17:09:37 1995 ylo
11 * 11 *
12 * Generic header file for ssh. 12 * Generic header file for ssh.
13 * 13 *
14 */ 14 */
15 15
16/* RCSID("$Id: ssh.h,v 1.31 2000/04/12 10:17:41 damien Exp $"); */ 16/* RCSID("$Id: ssh.h,v 1.32 2000/04/16 01:18:47 damien Exp $"); */
17 17
18#ifndef SSH_H 18#ifndef SSH_H
19#define SSH_H 19#define SSH_H
@@ -279,7 +279,7 @@
279 * information is not available. This must be called before record_login. 279 * information is not available. This must be called before record_login.
280 * The host from which the user logged in is stored in buf. 280 * The host from which the user logged in is stored in buf.
281 */ 281 */
282unsigned long 282unsigned long
283get_last_login_time(uid_t uid, const char *logname, 283get_last_login_time(uid_t uid, const char *logname,
284 char *buf, unsigned int bufsize); 284 char *buf, unsigned int bufsize);
285 285
@@ -287,7 +287,7 @@ get_last_login_time(uid_t uid, const char *logname,
287 * Records that the user has logged in. This does many things normally done 287 * Records that the user has logged in. This does many things normally done
288 * by login(1). 288 * by login(1).
289 */ 289 */
290void 290void
291record_login(int pid, const char *ttyname, const char *user, uid_t uid, 291record_login(int pid, const char *ttyname, const char *user, uid_t uid,
292 const char *host, struct sockaddr *addr); 292 const char *host, struct sockaddr *addr);
293 293
@@ -308,7 +308,7 @@ void record_logout(int pid, const char *ttyname);
308 * and zero on failure. If the connection is successful, this calls 308 * and zero on failure. If the connection is successful, this calls
309 * packet_set_connection for the connection. 309 * packet_set_connection for the connection.
310 */ 310 */
311int 311int
312ssh_connect(const char *host, struct sockaddr_storage * hostaddr, 312ssh_connect(const char *host, struct sockaddr_storage * hostaddr,
313 u_short port, int connection_attempts, 313 u_short port, int connection_attempts,
314 int anonymous, uid_t original_real_uid, 314 int anonymous, uid_t original_real_uid,
@@ -323,7 +323,7 @@ ssh_connect(const char *host, struct sockaddr_storage * hostaddr,
323 * references from the packet module). 323 * references from the packet module).
324 */ 324 */
325 325
326void 326void
327ssh_login(int host_key_valid, RSA * host_key, const char *host, 327ssh_login(int host_key_valid, RSA * host_key, const char *host,
328 struct sockaddr * hostaddr, uid_t original_real_uid); 328 struct sockaddr * hostaddr, uid_t original_real_uid);
329 329
@@ -340,7 +340,7 @@ int auth_rhosts(struct passwd * pw, const char *client_user);
340 * Tries to authenticate the user using the .rhosts file and the host using 340 * Tries to authenticate the user using the .rhosts file and the host using
341 * its host key. Returns true if authentication succeeds. 341 * its host key. Returns true if authentication succeeds.
342 */ 342 */
343int 343int
344auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key); 344auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key);
345 345
346/* 346/*
@@ -409,7 +409,7 @@ char *read_passphrase(const char *prompt, int from_stdin);
409 * precede the key to provide identification of the key without needing a 409 * precede the key to provide identification of the key without needing a
410 * passphrase. 410 * passphrase.
411 */ 411 */
412int 412int
413save_private_key(const char *filename, const char *passphrase, 413save_private_key(const char *filename, const char *passphrase,
414 RSA * private_key, const char *comment); 414 RSA * private_key, const char *comment);
415 415
@@ -419,7 +419,7 @@ save_private_key(const char *filename, const char *passphrase,
419 * comment of the key is returned in comment_return if it is non-NULL; the 419 * comment of the key is returned in comment_return if it is non-NULL; the
420 * caller must free the value with xfree. 420 * caller must free the value with xfree.
421 */ 421 */
422int 422int
423load_public_key(const char *filename, RSA * pub, 423load_public_key(const char *filename, RSA * pub,
424 char **comment_return); 424 char **comment_return);
425 425
@@ -430,7 +430,7 @@ load_public_key(const char *filename, RSA * pub,
430 * comment_return if it is non-NULL; the caller must free the value with 430 * comment_return if it is non-NULL; the caller must free the value with
431 * xfree. 431 * xfree.
432 */ 432 */
433int 433int
434load_private_key(const char *filename, const char *passphrase, 434load_private_key(const char *filename, const char *passphrase,
435 RSA * private_key, char **comment_return); 435 RSA * private_key, char **comment_return);
436 436