diff options
author | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
commit | 4af51306d9a51459a5bef922df1037f876ae51fe (patch) | |
tree | 09ecfc215fce82345a3259f8a0f384b9a67906f0 /ssh.h | |
parent | 5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff) |
- OpenBSD CVS updates.
[ssh.1 ssh.c]
- ssh -2
[auth.c channels.c clientloop.c packet.c packet.h serverloop.c]
[session.c sshconnect.c]
- check payload for (illegal) extra data
[ALL]
- whitespace cleanup
Diffstat (limited to 'ssh.h')
-rw-r--r-- | ssh.h | 30 |
1 files changed, 15 insertions, 15 deletions
@@ -1,19 +1,19 @@ | |||
1 | /* | 1 | /* |
2 | * | 2 | * |
3 | * ssh.h | 3 | * ssh.h |
4 | * | 4 | * |
5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
6 | * | 6 | * |
7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
8 | * All rights reserved | 8 | * All rights reserved |
9 | * | 9 | * |
10 | * Created: Fri Mar 17 17:09:37 1995 ylo | 10 | * Created: Fri Mar 17 17:09:37 1995 ylo |
11 | * | 11 | * |
12 | * Generic header file for ssh. | 12 | * Generic header file for ssh. |
13 | * | 13 | * |
14 | */ | 14 | */ |
15 | 15 | ||
16 | /* RCSID("$Id: ssh.h,v 1.31 2000/04/12 10:17:41 damien Exp $"); */ | 16 | /* RCSID("$Id: ssh.h,v 1.32 2000/04/16 01:18:47 damien Exp $"); */ |
17 | 17 | ||
18 | #ifndef SSH_H | 18 | #ifndef SSH_H |
19 | #define SSH_H | 19 | #define SSH_H |
@@ -279,7 +279,7 @@ | |||
279 | * information is not available. This must be called before record_login. | 279 | * information is not available. This must be called before record_login. |
280 | * The host from which the user logged in is stored in buf. | 280 | * The host from which the user logged in is stored in buf. |
281 | */ | 281 | */ |
282 | unsigned long | 282 | unsigned long |
283 | get_last_login_time(uid_t uid, const char *logname, | 283 | get_last_login_time(uid_t uid, const char *logname, |
284 | char *buf, unsigned int bufsize); | 284 | char *buf, unsigned int bufsize); |
285 | 285 | ||
@@ -287,7 +287,7 @@ get_last_login_time(uid_t uid, const char *logname, | |||
287 | * Records that the user has logged in. This does many things normally done | 287 | * Records that the user has logged in. This does many things normally done |
288 | * by login(1). | 288 | * by login(1). |
289 | */ | 289 | */ |
290 | void | 290 | void |
291 | record_login(int pid, const char *ttyname, const char *user, uid_t uid, | 291 | record_login(int pid, const char *ttyname, const char *user, uid_t uid, |
292 | const char *host, struct sockaddr *addr); | 292 | const char *host, struct sockaddr *addr); |
293 | 293 | ||
@@ -308,7 +308,7 @@ void record_logout(int pid, const char *ttyname); | |||
308 | * and zero on failure. If the connection is successful, this calls | 308 | * and zero on failure. If the connection is successful, this calls |
309 | * packet_set_connection for the connection. | 309 | * packet_set_connection for the connection. |
310 | */ | 310 | */ |
311 | int | 311 | int |
312 | ssh_connect(const char *host, struct sockaddr_storage * hostaddr, | 312 | ssh_connect(const char *host, struct sockaddr_storage * hostaddr, |
313 | u_short port, int connection_attempts, | 313 | u_short port, int connection_attempts, |
314 | int anonymous, uid_t original_real_uid, | 314 | int anonymous, uid_t original_real_uid, |
@@ -323,7 +323,7 @@ ssh_connect(const char *host, struct sockaddr_storage * hostaddr, | |||
323 | * references from the packet module). | 323 | * references from the packet module). |
324 | */ | 324 | */ |
325 | 325 | ||
326 | void | 326 | void |
327 | ssh_login(int host_key_valid, RSA * host_key, const char *host, | 327 | ssh_login(int host_key_valid, RSA * host_key, const char *host, |
328 | struct sockaddr * hostaddr, uid_t original_real_uid); | 328 | struct sockaddr * hostaddr, uid_t original_real_uid); |
329 | 329 | ||
@@ -340,7 +340,7 @@ int auth_rhosts(struct passwd * pw, const char *client_user); | |||
340 | * Tries to authenticate the user using the .rhosts file and the host using | 340 | * Tries to authenticate the user using the .rhosts file and the host using |
341 | * its host key. Returns true if authentication succeeds. | 341 | * its host key. Returns true if authentication succeeds. |
342 | */ | 342 | */ |
343 | int | 343 | int |
344 | auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key); | 344 | auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key); |
345 | 345 | ||
346 | /* | 346 | /* |
@@ -409,7 +409,7 @@ char *read_passphrase(const char *prompt, int from_stdin); | |||
409 | * precede the key to provide identification of the key without needing a | 409 | * precede the key to provide identification of the key without needing a |
410 | * passphrase. | 410 | * passphrase. |
411 | */ | 411 | */ |
412 | int | 412 | int |
413 | save_private_key(const char *filename, const char *passphrase, | 413 | save_private_key(const char *filename, const char *passphrase, |
414 | RSA * private_key, const char *comment); | 414 | RSA * private_key, const char *comment); |
415 | 415 | ||
@@ -419,7 +419,7 @@ save_private_key(const char *filename, const char *passphrase, | |||
419 | * comment of the key is returned in comment_return if it is non-NULL; the | 419 | * comment of the key is returned in comment_return if it is non-NULL; the |
420 | * caller must free the value with xfree. | 420 | * caller must free the value with xfree. |
421 | */ | 421 | */ |
422 | int | 422 | int |
423 | load_public_key(const char *filename, RSA * pub, | 423 | load_public_key(const char *filename, RSA * pub, |
424 | char **comment_return); | 424 | char **comment_return); |
425 | 425 | ||
@@ -430,7 +430,7 @@ load_public_key(const char *filename, RSA * pub, | |||
430 | * comment_return if it is non-NULL; the caller must free the value with | 430 | * comment_return if it is non-NULL; the caller must free the value with |
431 | * xfree. | 431 | * xfree. |
432 | */ | 432 | */ |
433 | int | 433 | int |
434 | load_private_key(const char *filename, const char *passphrase, | 434 | load_private_key(const char *filename, const char *passphrase, |
435 | RSA * private_key, char **comment_return); | 435 | RSA * private_key, char **comment_return); |
436 | 436 | ||