diff options
Diffstat (limited to 'auth.h')
-rw-r--r-- | auth.h | 19 |
1 files changed, 2 insertions, 17 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth.h,v 1.88 2016/05/04 14:04:40 markus Exp $ */ | 1 | /* $OpenBSD: auth.h,v 1.89 2016/08/13 17:47:41 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
@@ -112,20 +112,11 @@ struct KbdintDevice | |||
112 | void (*free_ctx)(void *ctx); | 112 | void (*free_ctx)(void *ctx); |
113 | }; | 113 | }; |
114 | 114 | ||
115 | int auth_rhosts(struct passwd *, const char *); | ||
116 | int | 115 | int |
117 | auth_rhosts2(struct passwd *, const char *, const char *, const char *); | 116 | auth_rhosts2(struct passwd *, const char *, const char *, const char *); |
118 | 117 | ||
119 | int auth_rhosts_rsa(Authctxt *, char *, Key *); | ||
120 | int auth_password(Authctxt *, const char *); | 118 | int auth_password(Authctxt *, const char *); |
121 | int auth_rsa(Authctxt *, BIGNUM *); | 119 | |
122 | int auth_rsa_challenge_dialog(Key *); | ||
123 | BIGNUM *auth_rsa_generate_challenge(Key *); | ||
124 | int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]); | ||
125 | int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); | ||
126 | |||
127 | int auth_rhosts_rsa_key_allowed(struct passwd *, const char *, | ||
128 | const char *, Key *); | ||
129 | int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); | 120 | int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); |
130 | int user_key_allowed(struct passwd *, Key *, int); | 121 | int user_key_allowed(struct passwd *, Key *, int); |
131 | void pubkey_auth_info(Authctxt *, const Key *, const char *, ...) | 122 | void pubkey_auth_info(Authctxt *, const Key *, const char *, ...) |
@@ -156,7 +147,6 @@ void remove_kbdint_device(const char *); | |||
156 | 147 | ||
157 | void disable_forwarding(void); | 148 | void disable_forwarding(void); |
158 | 149 | ||
159 | void do_authentication(Authctxt *); | ||
160 | void do_authentication2(Authctxt *); | 150 | void do_authentication2(Authctxt *); |
161 | 151 | ||
162 | void auth_info(Authctxt *authctxt, const char *, ...) | 152 | void auth_info(Authctxt *authctxt, const char *, ...) |
@@ -187,10 +177,6 @@ int skey_respond(void *, u_int, char **); | |||
187 | int allowed_user(struct passwd *); | 177 | int allowed_user(struct passwd *); |
188 | struct passwd * getpwnamallow(const char *user); | 178 | struct passwd * getpwnamallow(const char *user); |
189 | 179 | ||
190 | char *get_challenge(Authctxt *); | ||
191 | int verify_response(Authctxt *, const char *); | ||
192 | void abandon_challenge_response(Authctxt *); | ||
193 | |||
194 | char *expand_authorized_keys(const char *, struct passwd *pw); | 180 | char *expand_authorized_keys(const char *, struct passwd *pw); |
195 | char *authorized_principals_file(struct passwd *); | 181 | char *authorized_principals_file(struct passwd *); |
196 | 182 | ||
@@ -210,7 +196,6 @@ Key *get_hostkey_public_by_index(int, struct ssh *); | |||
210 | Key *get_hostkey_public_by_type(int, int, struct ssh *); | 196 | Key *get_hostkey_public_by_type(int, int, struct ssh *); |
211 | Key *get_hostkey_private_by_type(int, int, struct ssh *); | 197 | Key *get_hostkey_private_by_type(int, int, struct ssh *); |
212 | int get_hostkey_index(Key *, int, struct ssh *); | 198 | int get_hostkey_index(Key *, int, struct ssh *); |
213 | int ssh1_session_key(BIGNUM *); | ||
214 | int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *, | 199 | int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *, |
215 | const u_char *, size_t, const char *, u_int); | 200 | const u_char *, size_t, const char *, u_int); |
216 | 201 | ||