summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h23
1 files changed, 14 insertions, 9 deletions
diff --git a/auth.h b/auth.h
index beaacb8bc..de2222aaa 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.46 2003/08/28 12:54:34 markus Exp $ */ 1/* $OpenBSD: auth.h,v 1.49 2004/01/30 09:48:57 markus Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -52,6 +52,7 @@ struct Authctxt {
52 int valid; /* user exists and is allowed to login */ 52 int valid; /* user exists and is allowed to login */
53 int attempt; 53 int attempt;
54 int failures; 54 int failures;
55 int force_pwchange;
55 char *user; /* username sent by the client */ 56 char *user; /* username sent by the client */
56 char *service; 57 char *service;
57 struct passwd *pw; /* set if 'valid' */ 58 struct passwd *pw; /* set if 'valid' */
@@ -102,9 +103,9 @@ int auth_rhosts(struct passwd *, const char *);
102int 103int
103auth_rhosts2(struct passwd *, const char *, const char *, const char *); 104auth_rhosts2(struct passwd *, const char *, const char *, const char *);
104 105
105int auth_rhosts_rsa(struct passwd *, char *, Key *); 106int auth_rhosts_rsa(Authctxt *, char *, Key *);
106int auth_password(Authctxt *, const char *); 107int auth_password(Authctxt *, const char *);
107int auth_rsa(struct passwd *, BIGNUM *); 108int auth_rsa(Authctxt *, BIGNUM *);
108int auth_rsa_challenge_dialog(Key *); 109int auth_rsa_challenge_dialog(Key *);
109BIGNUM *auth_rsa_generate_challenge(Key *); 110BIGNUM *auth_rsa_generate_challenge(Key *);
110int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]); 111int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]);
@@ -118,15 +119,21 @@ int user_key_allowed(struct passwd *, Key *);
118int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 119int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
119int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt); 120int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
120int auth_krb5_password(Authctxt *authctxt, const char *password); 121int auth_krb5_password(Authctxt *authctxt, const char *password);
121void krb5_cleanup_proc(void *authctxt); 122void krb5_cleanup_proc(Authctxt *authctxt);
122#endif /* KRB5 */ 123#endif /* KRB5 */
123 124
125#if defined(USE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
126#include <shadow.h>
127int auth_shadow_acctexpired(struct spwd *);
128int auth_shadow_pwexpired(Authctxt *);
129#endif
130
124#include "auth-pam.h" 131#include "auth-pam.h"
132void disable_forwarding(void);
125 133
126Authctxt *do_authentication(void); 134void do_authentication(Authctxt *);
127Authctxt *do_authentication2(void); 135void do_authentication2(Authctxt *);
128 136
129Authctxt *authctxt_new(void);
130void auth_log(Authctxt *, int, char *, char *); 137void auth_log(Authctxt *, int, char *, char *);
131void userauth_finish(Authctxt *, int, char *); 138void userauth_finish(Authctxt *, int, char *);
132int auth_root_allowed(char *); 139int auth_root_allowed(char *);
@@ -149,8 +156,6 @@ char *get_challenge(Authctxt *);
149int verify_response(Authctxt *, const char *); 156int verify_response(Authctxt *, const char *);
150void abandon_challenge_response(Authctxt *); 157void abandon_challenge_response(Authctxt *);
151 158
152struct passwd * auth_get_user(void);
153
154char *expand_filename(const char *, struct passwd *); 159char *expand_filename(const char *, struct passwd *);
155char *authorized_keys_file(struct passwd *); 160char *authorized_keys_file(struct passwd *);
156char *authorized_keys_file2(struct passwd *); 161char *authorized_keys_file2(struct passwd *);