]> andersk Git - gssapi-openssh.git/blobdiff - openssh/authfd.h
The man2html from jbasney on pkilab2 works whereas the standard one doesn't.
[gssapi-openssh.git] / openssh / authfd.h
index 38ee49e88523fa67b688002de056b6200c24ef48..8075a7ebddf18b9269f889152b56382d6035f98f 100644 (file)
@@ -1,5 +1,3 @@
-/*     $OpenBSD: authfd.h,v 1.31 2002/09/11 18:27:25 stevesk Exp $     */
-
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -13,6 +11,8 @@
  * called by a name other than "ssh" or "Secure Shell".
  */
 
+/* RCSID("$OpenBSD: authfd.h,v 1.21 2001/08/07 10:37:46 markus Exp $"); */
+
 #ifndef AUTHFD_H
 #define AUTHFD_H
 
 
 /* smartcard */
 #define SSH_AGENTC_ADD_SMARTCARD_KEY           20
-#define SSH_AGENTC_REMOVE_SMARTCARD_KEY                21
-
-/* lock/unlock the agent */
-#define SSH_AGENTC_LOCK                                22
-#define SSH_AGENTC_UNLOCK                      23
-
-/* add key with constraints */
-#define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED      24
-#define SSH2_AGENTC_ADD_ID_CONSTRAINED         25
-
-#define        SSH_AGENT_CONSTRAIN_LIFETIME            1
+#define SSH_AGENTC_REMOVE_SMARTCARD_KEY                21
 
 /* extended failure messages */
 #define SSH2_AGENT_FAILURE                     30
 
 /* additional error code for ssh.com's ssh-agent2 */
-#define SSH_COM_AGENT2_FAILURE                 102
+#define SSH_COM_AGENT2_FAILURE                  102
 
 #define        SSH_AGENT_OLD_SIGNATURE                 0x01
 
 typedef struct {
-       int     fd;
-       Buffer  identities;
-       int     howmany;
-}      AuthenticationConnection;
+       int     fd;
+       Buffer  identities;
+       int     howmany;
+}       AuthenticationConnection;
 
-int    ssh_agent_present(void);
-int    ssh_get_authentication_socket(void);
-void   ssh_close_authentication_socket(int);
+int      ssh_get_authentication_socket(void);
+void     ssh_close_authentication_socket(int);
 
 AuthenticationConnection *ssh_get_authentication_connection(void);
-void   ssh_close_authentication_connection(AuthenticationConnection *);
+void     ssh_close_authentication_connection(AuthenticationConnection *);
 int     ssh_get_num_identities(AuthenticationConnection *, int);
 Key    *ssh_get_first_identity(AuthenticationConnection *, char **, int);
 Key    *ssh_get_next_identity(AuthenticationConnection *, char **, int);
 int     ssh_add_identity(AuthenticationConnection *, Key *, const char *);
-int     ssh_add_identity_constrained(AuthenticationConnection *, Key *, const char *, u_int);
 int     ssh_remove_identity(AuthenticationConnection *, Key *);
 int     ssh_remove_all_identities(AuthenticationConnection *, int);
-int     ssh_lock_agent(AuthenticationConnection *, int, const char *);
-int     ssh_update_card(AuthenticationConnection *, int, const char *, const char *);
+int     ssh_update_card(AuthenticationConnection *, int, const char *);
 
 int
 ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
     u_int, u_char[16]);
 
 int
-ssh_agent_sign(AuthenticationConnection *, Key *, u_char **, u_int *, u_char *,
-    u_int);
+ssh_agent_sign(AuthenticationConnection *, Key *, u_char **, int *, u_char *,
+    int);
 
 #endif                         /* AUTHFD_H */
This page took 0.244412 seconds and 4 git commands to generate.