version 1.49, 2022/06/15 16:08:25 |
version 1.50, 2024/05/17 00:30:24 |
|
|
#ifndef _MM_WRAP_H_ |
#ifndef _MM_WRAP_H_ |
#define _MM_WRAP_H_ |
#define _MM_WRAP_H_ |
|
|
extern int use_privsep; |
|
#define PRIVSEP(x) (use_privsep ? mm_##x : x) |
|
|
|
enum mm_keytype { MM_NOKEY, MM_HOSTKEY, MM_USERKEY }; |
enum mm_keytype { MM_NOKEY, MM_HOSTKEY, MM_USERKEY }; |
|
|
struct ssh; |
struct ssh; |
|
|
int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, |
int mm_sshkey_verify(const struct sshkey *, const u_char *, size_t, |
const u_char *, size_t, const char *, u_int, struct sshkey_sig_details **); |
const u_char *, size_t, const char *, u_int, struct sshkey_sig_details **); |
|
|
|
void mm_decode_activate_server_options(struct ssh *ssh, struct sshbuf *m); |
|
|
#ifdef GSSAPI |
#ifdef GSSAPI |
OM_uint32 mm_ssh_gssapi_server_ctx(Gssctxt **, gss_OID); |
OM_uint32 mm_ssh_gssapi_server_ctx(Gssctxt **, gss_OID); |
OM_uint32 mm_ssh_gssapi_accept_ctx(Gssctxt *, |
OM_uint32 mm_ssh_gssapi_accept_ctx(Gssctxt *, |
|
|
/* bsdauth */ |
/* bsdauth */ |
int mm_bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); |
int mm_bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **); |
int mm_bsdauth_respond(void *, u_int, char **); |
int mm_bsdauth_respond(void *, u_int, char **); |
|
|
|
/* config / channels glue */ |
|
void server_process_permitopen(struct ssh *); |
|
void server_process_channel_timeouts(struct ssh *ssh); |
|
struct connection_info * |
|
server_get_connection_info(struct ssh *, int, int); |
|
|
#endif /* _MM_WRAP_H_ */ |
#endif /* _MM_WRAP_H_ */ |