summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h21
1 files changed, 19 insertions, 2 deletions
diff --git a/auth.h b/auth.h
index 3e4a55010..a336926fc 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.34 2002/03/18 17:50:31 provos Exp $ */ 1/* $OpenBSD: auth.h,v 1.35 2002/03/19 10:35:39 markus Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -88,7 +88,7 @@ struct KbdintDevice
88 void (*free_ctx)(void *ctx); 88 void (*free_ctx)(void *ctx);
89}; 89};
90 90
91int auth_rhosts(struct passwd *, const char *); 91int auth_rhosts(struct passwd *, const char *);
92int 92int
93auth_rhosts2(struct passwd *, const char *, const char *, const char *); 93auth_rhosts2(struct passwd *, const char *, const char *, const char *);
94 94
@@ -96,6 +96,13 @@ int auth_rhosts_rsa(struct passwd *, char *, Key *);
96int auth_password(Authctxt *, const char *); 96int auth_password(Authctxt *, const char *);
97int auth_rsa(struct passwd *, BIGNUM *); 97int auth_rsa(struct passwd *, BIGNUM *);
98int auth_rsa_challenge_dialog(Key *); 98int auth_rsa_challenge_dialog(Key *);
99BIGNUM *auth_rsa_generate_challenge(Key *);
100int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]);
101int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
102
103int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
104int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
105int user_key_allowed(struct passwd *, Key *);
99 106
100#ifdef KRB4 107#ifdef KRB4
101#include <krb.h> 108#include <krb.h>
@@ -133,6 +140,10 @@ void privsep_challenge_enable(void);
133 140
134int auth2_challenge(Authctxt *, char *); 141int auth2_challenge(Authctxt *, char *);
135void auth2_challenge_stop(Authctxt *); 142void auth2_challenge_stop(Authctxt *);
143int bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
144int bsdauth_respond(void *, u_int, char **);
145int skey_query(void *, char **, char **, u_int *, char ***, u_int **);
146int skey_respond(void *, u_int, char **);
136 147
137int allowed_user(struct passwd *); 148int allowed_user(struct passwd *);
138struct passwd * getpwnamallow(const char *user); 149struct passwd * getpwnamallow(const char *user);
@@ -153,6 +164,12 @@ HostStatus
153check_key_in_hostfiles(struct passwd *, Key *, const char *, 164check_key_in_hostfiles(struct passwd *, Key *, const char *,
154 const char *, const char *); 165 const char *, const char *);
155 166
167/* hostkey handling */
168Key *get_hostkey_by_index(int);
169Key *get_hostkey_by_type(int);
170int get_hostkey_index(Key *);
171int ssh1_session_key(BIGNUM *);
172
156#define AUTH_FAIL_MAX 6 173#define AUTH_FAIL_MAX 6
157#define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2) 174#define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2)
158#define AUTH_FAIL_MSG "Too many authentication failures for %.100s" 175#define AUTH_FAIL_MSG "Too many authentication failures for %.100s"