summaryrefslogtreecommitdiff
path: root/sshconnect.h
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2011-01-24 12:43:25 +0000
committerColin Watson <cjwatson@debian.org>2011-01-24 12:43:25 +0000
commit626f1d986ff72aa514da63e34744e1de9cf21b9a (patch)
treed215a5280bc2e57251e4a9e08bfd3674ad824a94 /sshconnect.h
parent6ed622cb6fe8f71bbe0d998cdd12280410bfb420 (diff)
parent0970072c89b079b022538e3c366fbfa2c53fc821 (diff)
* New upstream release (http://www.openssh.org/txt/release-5.7):
- Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. - sftp(1)/sftp-server(8): add a protocol extension to support a hard link operation. It is available through the "ln" command in the client. The old "ln" behaviour of creating a symlink is available using its "-s" option or through the preexisting "symlink" command. - scp(1): Add a new -3 option to scp: Copies between two remote hosts are transferred through the local host (closes: #508613). - ssh(1): "atomically" create the listening mux socket by binding it on a temporary name and then linking it into position after listen() has succeeded. This allows the mux clients to determine that the server socket is either ready or stale without races (closes: #454784). Stale server sockets are now automatically removed (closes: #523250). - ssh(1): install a SIGCHLD handler to reap expired child process (closes: #594687). - ssh(1)/ssh-agent(1): honour $TMPDIR for client xauth and ssh-agent temporary directories (closes: #357469, although only if you arrange for ssh-agent to actually see $TMPDIR since the setgid bit will cause it to be stripped off).
Diffstat (limited to 'sshconnect.h')
-rw-r--r--sshconnect.h12
1 files changed, 8 insertions, 4 deletions
diff --git a/sshconnect.h b/sshconnect.h
index c59a097f4..fd7f7f7c6 100644
--- a/sshconnect.h
+++ b/sshconnect.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshconnect.h,v 1.25 2009/05/27 06:38:16 andreas Exp $ */ 1/* $OpenBSD: sshconnect.h,v 1.27 2010/11/29 23:45:51 djm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -34,16 +34,20 @@ struct Sensitive {
34int 34int
35ssh_connect(const char *, struct sockaddr_storage *, u_short, int, int, 35ssh_connect(const char *, struct sockaddr_storage *, u_short, int, int,
36 int *, int, int, const char *); 36 int *, int, int, const char *);
37void ssh_kill_proxy_command(void);
37 38
38void 39void ssh_login(Sensitive *, const char *, struct sockaddr *, u_short,
39ssh_login(Sensitive *, const char *, struct sockaddr *, struct passwd *, int); 40 struct passwd *, int);
40 41
41void ssh_exchange_identification(int); 42void ssh_exchange_identification(int);
42 43
43int verify_host_key(char *, struct sockaddr *, Key *); 44int verify_host_key(char *, struct sockaddr *, Key *);
44 45
46void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
47 char **, char **);
48
45void ssh_kex(char *, struct sockaddr *); 49void ssh_kex(char *, struct sockaddr *);
46void ssh_kex2(char *, struct sockaddr *); 50void ssh_kex2(char *, struct sockaddr *, u_short);
47 51
48void ssh_userauth1(const char *, const char *, char *, Sensitive *); 52void ssh_userauth1(const char *, const char *, char *, Sensitive *);
49void ssh_userauth2(const char *, const char *, char *, Sensitive *); 53void ssh_userauth2(const char *, const char *, char *, Sensitive *);