Deleted Added
sdiff udiff text old ( 147005 ) new ( 162856 )
full compact
1/* $OpenBSD: monitor_wrap.h,v 1.20 2006/08/03 03:34:42 deraadt Exp $ */
2/* $FreeBSD: head/crypto/openssh/monitor_wrap.h 162856 2006-09-30 13:38:06Z des $ */
3
4/*
5 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:

--- 12 unchanged lines hidden (view full) ---

23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29#ifndef _MM_WRAP_H_
30#define _MM_WRAP_H_
31
32extern int use_privsep;
33#define PRIVSEP(x) (use_privsep ? mm_##x : x)
34
35enum mm_keytype {MM_NOKEY, MM_HOSTKEY, MM_USERKEY, MM_RSAHOSTKEY, MM_RSAUSERKEY};
36
37struct monitor;
38struct mm_master;
39struct Authctxt;
40
41int mm_is_monitor(void);
42DH *mm_choose_dh(int, int, int);
43int mm_key_sign(Key *, u_char **, u_int *, u_char *, u_int);
44void mm_inform_authserv(char *, char *);
45struct passwd *mm_getpwnamallow(const char *);
46char *mm_auth2_read_banner(void);
47int mm_auth_password(struct Authctxt *, char *);
48int mm_key_allowed(enum mm_keytype, char *, char *, Key *);
49int mm_user_key_allowed(struct passwd *, Key *);
50int mm_hostbased_key_allowed(struct passwd *, char *, char *, Key *);
51int mm_auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
52int mm_key_verify(Key *, u_char *, u_int, u_char *, u_int);
53int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
54int mm_auth_rsa_verify_response(Key *, BIGNUM *, u_char *);
55BIGNUM *mm_auth_rsa_generate_challenge(Key *);
56
57#ifdef GSSAPI
58OM_uint32 mm_ssh_gssapi_server_ctx(Gssctxt **, gss_OID);
59OM_uint32 mm_ssh_gssapi_accept_ctx(Gssctxt *,
60 gss_buffer_desc *, gss_buffer_desc *, OM_uint32 *);
61int mm_ssh_gssapi_userok(char *user);
62OM_uint32 mm_ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t);
63#endif
64
65#ifdef USE_PAM

--- 8 unchanged lines hidden (view full) ---

74#ifdef SSH_AUDIT_EVENTS
75#include "audit.h"
76void mm_audit_event(ssh_audit_event_t);
77void mm_audit_run_command(const char *);
78#endif
79
80struct Session;
81void mm_terminate(void);
82int mm_pty_allocate(int *, int *, char *, size_t);
83void mm_session_pty_cleanup2(struct Session *);
84
85/* SSHv1 interfaces */
86void mm_ssh1_session_id(u_char *);
87int mm_ssh1_session_key(BIGNUM *);
88
89/* Key export functions */
90struct Newkeys *mm_newkeys_from_blob(u_char *, int);

--- 12 unchanged lines hidden (view full) ---

103int mm_skey_respond(void *, u_int, char **);
104
105/* zlib allocation hooks */
106
107void *mm_zalloc(struct mm_master *, u_int, u_int);
108void mm_zfree(struct mm_master *, void *);
109void mm_init_compression(struct mm_master *);
110
111#endif /* _MM_WRAP_H_ */