diff options
Diffstat (limited to 'auth.h')
-rw-r--r-- | auth.h | 21 |
1 files changed, 19 insertions, 2 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth.h,v 1.34 2002/03/18 17:50:31 provos Exp $ */ | 1 | /* $OpenBSD: auth.h,v 1.35 2002/03/19 10:35:39 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
@@ -88,7 +88,7 @@ struct KbdintDevice | |||
88 | void (*free_ctx)(void *ctx); | 88 | void (*free_ctx)(void *ctx); |
89 | }; | 89 | }; |
90 | 90 | ||
91 | int auth_rhosts(struct passwd *, const char *); | 91 | int auth_rhosts(struct passwd *, const char *); |
92 | int | 92 | int |
93 | auth_rhosts2(struct passwd *, const char *, const char *, const char *); | 93 | auth_rhosts2(struct passwd *, const char *, const char *, const char *); |
94 | 94 | ||
@@ -96,6 +96,13 @@ int auth_rhosts_rsa(struct passwd *, char *, Key *); | |||
96 | int auth_password(Authctxt *, const char *); | 96 | int auth_password(Authctxt *, const char *); |
97 | int auth_rsa(struct passwd *, BIGNUM *); | 97 | int auth_rsa(struct passwd *, BIGNUM *); |
98 | int auth_rsa_challenge_dialog(Key *); | 98 | int auth_rsa_challenge_dialog(Key *); |
99 | BIGNUM *auth_rsa_generate_challenge(Key *); | ||
100 | int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]); | ||
101 | int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); | ||
102 | |||
103 | int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); | ||
104 | int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); | ||
105 | int user_key_allowed(struct passwd *, Key *); | ||
99 | 106 | ||
100 | #ifdef KRB4 | 107 | #ifdef KRB4 |
101 | #include <krb.h> | 108 | #include <krb.h> |
@@ -133,6 +140,10 @@ void privsep_challenge_enable(void); | |||
133 | 140 | ||
134 | int auth2_challenge(Authctxt *, char *); | 141 | int auth2_challenge(Authctxt *, char *); |
135 | void auth2_challenge_stop(Authctxt *); | 142 | void auth2_challenge_stop(Authctxt *); |
143 | int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); | ||
144 | int bsdauth_respond(void *, u_int, char **); | ||
145 | int skey_query(void *, char **, char **, u_int *, char ***, u_int **); | ||
146 | int skey_respond(void *, u_int, char **); | ||
136 | 147 | ||
137 | int allowed_user(struct passwd *); | 148 | int allowed_user(struct passwd *); |
138 | struct passwd * getpwnamallow(const char *user); | 149 | struct passwd * getpwnamallow(const char *user); |
@@ -153,6 +164,12 @@ HostStatus | |||
153 | check_key_in_hostfiles(struct passwd *, Key *, const char *, | 164 | check_key_in_hostfiles(struct passwd *, Key *, const char *, |
154 | const char *, const char *); | 165 | const char *, const char *); |
155 | 166 | ||
167 | /* hostkey handling */ | ||
168 | Key *get_hostkey_by_index(int); | ||
169 | Key *get_hostkey_by_type(int); | ||
170 | int get_hostkey_index(Key *); | ||
171 | int ssh1_session_key(BIGNUM *); | ||
172 | |||
156 | #define AUTH_FAIL_MAX 6 | 173 | #define AUTH_FAIL_MAX 6 |
157 | #define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2) | 174 | #define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2) |
158 | #define AUTH_FAIL_MSG "Too many authentication failures for %.100s" | 175 | #define AUTH_FAIL_MSG "Too many authentication failures for %.100s" |