[BACK]Return to auth.h CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/auth.h between version 1.9 and 1.10

version 1.9, 2001/01/18 16:59:59 version 1.10, 2001/01/21 19:05:43
Line 26 
Line 26 
 #ifndef AUTH_H  #ifndef AUTH_H
 #define AUTH_H  #define AUTH_H
   
   #include <openssl/rsa.h>
   
 typedef struct Authctxt Authctxt;  typedef struct Authctxt Authctxt;
 struct Authctxt {  struct Authctxt {
         int success;          int success;
Line 38 
Line 40 
         struct passwd *pw;          struct passwd *pw;
         char *style;          char *style;
 };  };
   
   /*
    * Tries to authenticate the user using the .rhosts file.  Returns true if
    * authentication succeeds.  If ignore_rhosts is non-zero, this will not
    * consider .rhosts and .shosts (/etc/hosts.equiv will still be used).
    */
   int     auth_rhosts(struct passwd * pw, const char *client_user);
   
   /*
    * Tries to authenticate the user using the .rhosts file and the host using
    * its host key.  Returns true if authentication succeeds.
    */
   int
   auth_rhosts_rsa(struct passwd * pw, const char *client_user, RSA* client_host_key);
   
   /*
    * Tries to authenticate the user using password.  Returns true if
    * authentication succeeds.
    */
   int     auth_password(struct passwd * pw, const char *password);
   
   /*
    * Performs the RSA authentication dialog with the client.  This returns 0 if
    * the client could not be authenticated, and 1 if authentication was
    * successful.  This may exit if there is a serious protocol violation.
    */
   int     auth_rsa(struct passwd * pw, BIGNUM * client_n);
   
   /*
    * Parses an RSA key (number of bits, e, n) from a string.  Moves the pointer
    * over the key.  Skips any whitespace at the beginning and at end.
    */
   int     auth_rsa_read_key(char **cpp, u_int *bitsp, BIGNUM * e, BIGNUM * n);
   
   /*
    * Performs the RSA authentication challenge-response dialog with the client,
    * and returns true (non-zero) if the client gave the correct answer to our
    * challenge; returns zero if the client gives a wrong answer.
    */
   int     auth_rsa_challenge_dialog(RSA *pk);
   
   #ifdef KRB4
   #include <krb.h>
   /*
    * Performs Kerberos v4 mutual authentication with the client. This returns 0
    * if the client could not be authenticated, and 1 if authentication was
    * successful.  This may exit if there is a serious protocol violation.
    */
   int     auth_krb4(const char *server_user, KTEXT auth, char **client);
   int     krb4_init(uid_t uid);
   void    krb4_cleanup_proc(void *ignore);
   int     auth_krb4_password(struct passwd * pw, const char *password);
   
   #ifdef AFS
   #include <kafs.h>
   
   /* Accept passed Kerberos v4 ticket-granting ticket and AFS tokens. */
   int     auth_kerberos_tgt(struct passwd * pw, const char *string);
   int     auth_afs_token(struct passwd * pw, const char *token_string);
   #endif                          /* AFS */
   
   #endif                          /* KRB4 */
   
 void    do_authentication(void);  void    do_authentication(void);
 void    do_authentication2(void);  void    do_authentication2(void);

Legend:
Removed from v.1.9  
changed lines
  Added in v.1.10