]>
Commit | Line | Data |
---|---|---|
897fecd3 | 1 | /* $OpenBSD: ssh.h,v 1.68 2002/05/08 21:06:34 deraadt Exp $ */ |
93c3b6de | 2 | |
8efc0c15 | 3 | /* |
5260325f | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
5260325f | 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
6 | * All rights reserved | |
6ae2364d | 7 | * |
bcbf86ec | 8 | * As far as I am concerned, the code I have written for this software |
9 | * can be used freely for any purpose. Any derived versions of this | |
10 | * software must be clearly marked as such, and if the derived work is | |
11 | * incompatible with the protocol description in the RFC file, it must be | |
12 | * called by a name other than "ssh" or "Secure Shell". | |
5260325f | 13 | */ |
8efc0c15 | 14 | |
8efc0c15 | 15 | #ifndef SSH_H |
16 | #define SSH_H | |
17 | ||
4cca272e | 18 | #include <netinet/in.h> /* For struct sockaddr_in */ |
19 | #include <pwd.h> /* For struct pw */ | |
6a17f9c2 | 20 | #include <stdarg.h> /* For va_list */ |
57ce3f00 | 21 | #include <syslog.h> /* For LOG_AUTH and friends */ |
48e671d5 | 22 | #include <sys/socket.h> /* For struct sockaddr_storage */ |
84ceda19 | 23 | #include "openbsd-compat/fake-socket.h" /* For struct sockaddr_storage */ |
eef6f7e9 | 24 | #ifdef HAVE_SYS_SELECT_H |
25 | # include <sys/select.h> | |
26 | #endif | |
42f11eb2 | 27 | |
8efc0c15 | 28 | /* Cipher used for encrypting authentication files. */ |
29 | #define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES | |
30 | ||
31 | /* Default port number. */ | |
32 | #define SSH_DEFAULT_PORT 22 | |
33 | ||
34 | /* Maximum number of TCP/IP ports forwarded per direction. */ | |
35 | #define SSH_MAX_FORWARDS_PER_DIRECTION 100 | |
36 | ||
aa3378df | 37 | /* |
38 | * Maximum number of RSA authentication identity files that can be specified | |
39 | * in configuration files or on the command line. | |
40 | */ | |
8efc0c15 | 41 | #define SSH_MAX_IDENTITY_FILES 100 |
42 | ||
aa3378df | 43 | /* |
44 | * Major protocol version. Different version indicates major incompatiblity | |
45 | * that prevents communication. | |
a8be9f80 | 46 | * |
aa3378df | 47 | * Minor protocol version. Different version indicates minor incompatibility |
48 | * that does not prevent interoperation. | |
49 | */ | |
a8be9f80 | 50 | #define PROTOCOL_MAJOR_1 1 |
51 | #define PROTOCOL_MINOR_1 5 | |
52 | ||
53 | /* We support both SSH1 and SSH2 */ | |
54 | #define PROTOCOL_MAJOR_2 2 | |
55 | #define PROTOCOL_MINOR_2 0 | |
8efc0c15 | 56 | |
aa3378df | 57 | /* |
58 | * Name for the service. The port named by this service overrides the | |
59 | * default port if present. | |
60 | */ | |
8efc0c15 | 61 | #define SSH_SERVICE_NAME "ssh" |
62 | ||
4e577b89 | 63 | #if defined(USE_PAM) && !defined(SSHD_PAM_SERVICE) |
1ddee76b | 64 | # define SSHD_PAM_SERVICE __progname |
4e577b89 | 65 | #endif |
66 | ||
aa3378df | 67 | /* |
68 | * Name of the environment variable containing the pathname of the | |
69 | * authentication socket. | |
70 | */ | |
b705bea0 | 71 | #define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID" |
8efc0c15 | 72 | |
aa3378df | 73 | /* |
74 | * Name of the environment variable containing the pathname of the | |
75 | * authentication socket. | |
76 | */ | |
42f11eb2 | 77 | #define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK" |
50da1126 | 78 | |
57112b5a | 79 | /* |
42f11eb2 | 80 | * Environment variable for overwriting the default location of askpass |
57112b5a | 81 | */ |
57112b5a | 82 | #define SSH_ASKPASS_ENV "SSH_ASKPASS" |
83 | ||
aa3378df | 84 | /* |
85 | * Force host key length and server key length to differ by at least this | |
86 | * many bits. This is to make double encryption with rsaref work. | |
87 | */ | |
8efc0c15 | 88 | #define SSH_KEY_BITS_RESERVED 128 |
89 | ||
aa3378df | 90 | /* |
91 | * Length of the session key in bytes. (Specified as 256 bits in the | |
92 | * protocol.) | |
93 | */ | |
8efc0c15 | 94 | #define SSH_SESSION_KEY_LENGTH 32 |
95 | ||
96 | /* Name of Kerberos service for SSH to use. */ | |
97 | #define KRB4_SERVICE_NAME "rcmd" | |
98 | ||
4bf9c10e | 99 | /* Used to identify ``EscapeChar none'' */ |
100 | #define SSH_ESCAPECHAR_NONE -2 | |
101 | ||
2ea6de2b | 102 | /* |
103 | * unprivileged user when UsePrivilegeSeparation=yes; | |
104 | * sshd will change its pivileges to this user and its | |
105 | * primary group. | |
106 | */ | |
9a0fbcb3 | 107 | #ifndef SSH_PRIVSEP_USER |
897fecd3 | 108 | #define SSH_PRIVSEP_USER "sshd" |
9a0fbcb3 | 109 | #endif |
2ea6de2b | 110 | |
82b00264 | 111 | /* Minimum modulus size (n) for RSA keys. */ |
112 | #define SSH_RSA_MINIMUM_MODULUS_SIZE 768 | |
113 | ||
5260325f | 114 | #endif /* SSH_H */ |