summaryrefslogtreecommitdiff
path: root/auth.h
diff options
context:
space:
mode:
Diffstat (limited to 'auth.h')
-rw-r--r--auth.h19
1 files changed, 2 insertions, 17 deletions
diff --git a/auth.h b/auth.h
index 50baeaadb..8c658d16e 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth.h,v 1.88 2016/05/04 14:04:40 markus Exp $ */ 1/* $OpenBSD: auth.h,v 1.89 2016/08/13 17:47:41 markus Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -113,20 +113,11 @@ struct KbdintDevice
113 void (*free_ctx)(void *ctx); 113 void (*free_ctx)(void *ctx);
114}; 114};
115 115
116int auth_rhosts(struct passwd *, const char *);
117int 116int
118auth_rhosts2(struct passwd *, const char *, const char *, const char *); 117auth_rhosts2(struct passwd *, const char *, const char *, const char *);
119 118
120int auth_rhosts_rsa(Authctxt *, char *, Key *);
121int auth_password(Authctxt *, const char *); 119int auth_password(Authctxt *, const char *);
122int auth_rsa(Authctxt *, BIGNUM *); 120
123int auth_rsa_challenge_dialog(Key *);
124BIGNUM *auth_rsa_generate_challenge(Key *);
125int auth_rsa_verify_response(Key *, BIGNUM *, u_char[]);
126int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
127
128int auth_rhosts_rsa_key_allowed(struct passwd *, const char *,
129 const char *, Key *);
130int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 121int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
131int user_key_allowed(struct passwd *, Key *, int); 122int user_key_allowed(struct passwd *, Key *, int);
132void pubkey_auth_info(Authctxt *, const Key *, const char *, ...) 123void pubkey_auth_info(Authctxt *, const Key *, const char *, ...)
@@ -157,7 +148,6 @@ void remove_kbdint_device(const char *);
157 148
158void disable_forwarding(void); 149void disable_forwarding(void);
159 150
160void do_authentication(Authctxt *);
161void do_authentication2(Authctxt *); 151void do_authentication2(Authctxt *);
162 152
163void auth_info(Authctxt *authctxt, const char *, ...) 153void auth_info(Authctxt *authctxt, const char *, ...)
@@ -188,10 +178,6 @@ int skey_respond(void *, u_int, char **);
188int allowed_user(struct passwd *); 178int allowed_user(struct passwd *);
189struct passwd * getpwnamallow(const char *user); 179struct passwd * getpwnamallow(const char *user);
190 180
191char *get_challenge(Authctxt *);
192int verify_response(Authctxt *, const char *);
193void abandon_challenge_response(Authctxt *);
194
195char *expand_authorized_keys(const char *, struct passwd *pw); 181char *expand_authorized_keys(const char *, struct passwd *pw);
196char *authorized_principals_file(struct passwd *); 182char *authorized_principals_file(struct passwd *);
197 183
@@ -211,7 +197,6 @@ Key *get_hostkey_public_by_index(int, struct ssh *);
211Key *get_hostkey_public_by_type(int, int, struct ssh *); 197Key *get_hostkey_public_by_type(int, int, struct ssh *);
212Key *get_hostkey_private_by_type(int, int, struct ssh *); 198Key *get_hostkey_private_by_type(int, int, struct ssh *);
213int get_hostkey_index(Key *, int, struct ssh *); 199int get_hostkey_index(Key *, int, struct ssh *);
214int ssh1_session_key(BIGNUM *);
215int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *, 200int sshd_hostkey_sign(Key *, Key *, u_char **, size_t *,
216 const u_char *, size_t, const char *, u_int); 201 const u_char *, size_t, const char *, u_int);
217 202