]> andersk Git - openssh.git/blame - ssh.h
Initial revision
[openssh.git] / ssh.h
CommitLineData
8efc0c15 1/*
2
3ssh.h
4
5Author: Tatu Ylonen <ylo@cs.hut.fi>
6
7Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 All rights reserved
9
10Created: Fri Mar 17 17:09:37 1995 ylo
11
12Generic header file for ssh.
13
14*/
15
16/* RCSID("$Id$"); */
17
18#ifndef SSH_H
19#define SSH_H
20
21#include "rsa.h"
22#include "cipher.h"
23
24/* The default cipher used if IDEA is not supported by the remote host.
25 It is recommended that this be one of the mandatory ciphers (DES, 3DES),
26 though that is not required. */
27#define SSH_FALLBACK_CIPHER SSH_CIPHER_3DES
28
29/* Cipher used for encrypting authentication files. */
30#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
31
32/* Default port number. */
33#define SSH_DEFAULT_PORT 22
34
35/* Maximum number of TCP/IP ports forwarded per direction. */
36#define SSH_MAX_FORWARDS_PER_DIRECTION 100
37
38/* Maximum number of RSA authentication identity files that can be specified
39 in configuration files or on the command line. */
40#define SSH_MAX_IDENTITY_FILES 100
41
42/* Major protocol version. Different version indicates major incompatiblity
43 that prevents communication. */
44#define PROTOCOL_MAJOR 1
45
46/* Minor protocol version. Different version indicates minor incompatibility
47 that does not prevent interoperation. */
48#define PROTOCOL_MINOR 5
49
50/* Name for the service. The port named by this service overrides the default
51 port if present. */
52#define SSH_SERVICE_NAME "ssh"
53
54#ifndef ETCDIR
55#define ETCDIR "/etc"
56#endif /* ETCDIR */
57
58#define PIDDIR "/var/run"
59
60/* System-wide file containing host keys of known hosts. This file should be
61 world-readable. */
62#define SSH_SYSTEM_HOSTFILE ETCDIR "/ssh_known_hosts"
63
64/* HOST_KEY_FILE /etc/ssh_host_key,
65 SERVER_CONFIG_FILE /etc/sshd_config,
66and HOST_CONFIG_FILE /etc/ssh_config
67are all defined in Makefile.in. Of these, ssh_host_key should be readable
68only by root, whereas ssh_config should be world-readable. */
69
70#define HOST_KEY_FILE ETCDIR "/ssh_host_key"
71#define SERVER_CONFIG_FILE ETCDIR "/sshd_config"
72#define HOST_CONFIG_FILE ETCDIR "/ssh_config"
73
74#define SSH_PROGRAM "/usr/bin/ssh"
75
76/* The process id of the daemon listening for connections is saved
77 here to make it easier to kill the correct daemon when necessary. */
78#define SSH_DAEMON_PID_FILE PIDDIR "/sshd.pid"
79
80/* The directory in user\'s home directory in which the files reside.
81 The directory should be world-readable (though not all files are). */
82#define SSH_USER_DIR ".ssh"
83
84/* Per-user file containing host keys of known hosts. This file need
85 not be readable by anyone except the user him/herself, though this does
86 not contain anything particularly secret. */
87#define SSH_USER_HOSTFILE "~/.ssh/known_hosts"
88
89/* Name of the default file containing client-side authentication key.
90 This file should only be readable by the user him/herself. */
91#define SSH_CLIENT_IDENTITY ".ssh/identity"
92
93/* Configuration file in user\'s home directory. This file need not be
94 readable by anyone but the user him/herself, but does not contain
95 anything particularly secret. If the user\'s home directory resides
96 on an NFS volume where root is mapped to nobody, this may need to be
97 world-readable. */
98#define SSH_USER_CONFFILE ".ssh/config"
99
100/* File containing a list of those rsa keys that permit logging in as
101 this user. This file need not be
102 readable by anyone but the user him/herself, but does not contain
103 anything particularly secret. If the user\'s home directory resides
104 on an NFS volume where root is mapped to nobody, this may need to be
105 world-readable. (This file is read by the daemon which is running as
106 root.) */
107#define SSH_USER_PERMITTED_KEYS ".ssh/authorized_keys"
108
109/* Per-user and system-wide ssh "rc" files. These files are executed with
110 /bin/sh before starting the shell or command if they exist. They
111 will be passed "proto cookie" as arguments if X11 forwarding with
112 spoofing is in use. xauth will be run if neither of these exists. */
113#define SSH_USER_RC ".ssh/rc"
114#define SSH_SYSTEM_RC ETCDIR "/sshrc"
115
116/* Ssh-only version of /etc/hosts.equiv. */
117#define SSH_HOSTS_EQUIV ETCDIR "/shosts.equiv"
118
119/* Additionally, the daemon may use ~/.rhosts and /etc/hosts.equiv if
120 rhosts authentication is enabled. */
121
122/* Name of the environment variable containing the pathname of the
123 authentication socket. */
124#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
125
126/* Force host key length and server key length to differ by at least this
127 many bits. This is to make double encryption with rsaref work. */
128#define SSH_KEY_BITS_RESERVED 128
129
130/* Length of the session key in bytes. (Specified as 256 bits in the
131 protocol.) */
132#define SSH_SESSION_KEY_LENGTH 32
133
134/* Name of Kerberos service for SSH to use. */
135#define KRB4_SERVICE_NAME "rcmd"
136
137/* Authentication methods. New types can be added, but old types should not
138 be removed for compatibility. The maximum allowed value is 31. */
139#define SSH_AUTH_RHOSTS 1
140#define SSH_AUTH_RSA 2
141#define SSH_AUTH_PASSWORD 3
142#define SSH_AUTH_RHOSTS_RSA 4
143 /* 5 is TIS */
144#define SSH_AUTH_KERBEROS 6
145#define SSH_PASS_KERBEROS_TGT 7
146 /* 8 to 15 are reserved */
147#define SSH_PASS_AFS_TOKEN 21
148
149/* Protocol flags. These are bit masks. */
150#define SSH_PROTOFLAG_SCREEN_NUMBER 1 /* X11 forwarding includes screen */
151#define SSH_PROTOFLAG_HOST_IN_FWD_OPEN 2 /* forwarding opens contain host */
152
153/* Definition of message types. New values can be added, but old values
154 should not be removed or without careful consideration of the consequences
155 for compatibility. The maximum value is 254; value 255 is reserved
156 for future extension. */
157/* Message name */ /* msg code */ /* arguments */
158#define SSH_MSG_NONE 0 /* no message */
159#define SSH_MSG_DISCONNECT 1 /* cause (string) */
160#define SSH_SMSG_PUBLIC_KEY 2 /* ck,msk,srvk,hostk */
161#define SSH_CMSG_SESSION_KEY 3 /* key (BIGNUM) */
162#define SSH_CMSG_USER 4 /* user (string) */
163#define SSH_CMSG_AUTH_RHOSTS 5 /* user (string) */
164#define SSH_CMSG_AUTH_RSA 6 /* modulus (BIGNUM) */
165#define SSH_SMSG_AUTH_RSA_CHALLENGE 7 /* int (BIGNUM) */
166#define SSH_CMSG_AUTH_RSA_RESPONSE 8 /* int (BIGNUM) */
167#define SSH_CMSG_AUTH_PASSWORD 9 /* pass (string) */
168#define SSH_CMSG_REQUEST_PTY 10 /* TERM, tty modes */
169#define SSH_CMSG_WINDOW_SIZE 11 /* row,col,xpix,ypix */
170#define SSH_CMSG_EXEC_SHELL 12 /* */
171#define SSH_CMSG_EXEC_CMD 13 /* cmd (string) */
172#define SSH_SMSG_SUCCESS 14 /* */
173#define SSH_SMSG_FAILURE 15 /* */
174#define SSH_CMSG_STDIN_DATA 16 /* data (string) */
175#define SSH_SMSG_STDOUT_DATA 17 /* data (string) */
176#define SSH_SMSG_STDERR_DATA 18 /* data (string) */
177#define SSH_CMSG_EOF 19 /* */
178#define SSH_SMSG_EXITSTATUS 20 /* status (int) */
179#define SSH_MSG_CHANNEL_OPEN_CONFIRMATION 21 /* channel (int) */
180#define SSH_MSG_CHANNEL_OPEN_FAILURE 22 /* channel (int) */
181#define SSH_MSG_CHANNEL_DATA 23 /* ch,data (int,str) */
182#define SSH_MSG_CHANNEL_CLOSE 24 /* channel (int) */
183#define SSH_MSG_CHANNEL_CLOSE_CONFIRMATION 25 /* channel (int) */
184/* SSH_CMSG_X11_REQUEST_FORWARDING 26 OBSOLETE */
185#define SSH_SMSG_X11_OPEN 27 /* channel (int) */
186#define SSH_CMSG_PORT_FORWARD_REQUEST 28 /* p,host,hp (i,s,i) */
187#define SSH_MSG_PORT_OPEN 29 /* ch,h,p (i,s,i) */
188#define SSH_CMSG_AGENT_REQUEST_FORWARDING 30 /* */
189#define SSH_SMSG_AGENT_OPEN 31 /* port (int) */
190#define SSH_MSG_IGNORE 32 /* string */
191#define SSH_CMSG_EXIT_CONFIRMATION 33 /* */
192#define SSH_CMSG_X11_REQUEST_FORWARDING 34 /* proto,data (s,s) */
193#define SSH_CMSG_AUTH_RHOSTS_RSA 35 /* user,mod (s,mpi) */
194#define SSH_MSG_DEBUG 36 /* string */
195#define SSH_CMSG_REQUEST_COMPRESSION 37 /* level 1-9 (int) */
196#define SSH_CMSG_MAX_PACKET_SIZE 38 /* size 4k-1024k (int) */
197#define SSH_CMSG_AUTH_TIS 39 /* this is proto-1.5, but we ignore TIS */
198#define SSH_SMSG_AUTH_TIS_CHALLENGE 40
199#define SSH_CMSG_AUTH_TIS_RESPONSE 41
200
201#define SSH_CMSG_AUTH_KERBEROS 42 /* (KTEXT) */
202#define SSH_SMSG_AUTH_KERBEROS_RESPONSE 43 /* (KTEXT) */
203#define SSH_CMSG_HAVE_KERBEROS_TGT 44 /* credentials (s) */
204#define SSH_CMSG_HAVE_AFS_TOKEN 65 /* token (s) */
205
206
207/* Includes that need definitions above. */
208
209#include "readconf.h"
210
211/*------------ definitions for login.c -------------*/
212
213/* Returns the time when the user last logged in. Returns 0 if the
214 information is not available. This must be called before record_login.
215 The host from which the user logged in is stored in buf. */
216unsigned long get_last_login_time(uid_t uid, const char *logname,
217 char *buf, unsigned int bufsize);
218
219/* Records that the user has logged in. This does many things normally
220 done by login(1). */
221void record_login(int pid, const char *ttyname, const char *user, uid_t uid,
222 const char *host, struct sockaddr_in *addr);
223
224/* Records that the user has logged out. This does many thigs normally
225 done by login(1) or init. */
226void record_logout(int pid, const char *ttyname);
227
228/*------------ definitions for sshconnect.c ----------*/
229
230/* Opens a TCP/IP connection to the remote server on the given host. If
231 port is 0, the default port will be used. If anonymous is zero,
232 a privileged port will be allocated to make the connection.
233 This requires super-user privileges if anonymous is false.
234 Connection_attempts specifies the maximum number of tries, one per
235 second. This returns true on success, and zero on failure. If the
236 connection is successful, this calls packet_set_connection for the
237 connection. */
238int ssh_connect(const char *host, struct sockaddr_in *hostaddr,
239 int port, int connection_attempts,
240 int anonymous, uid_t original_real_uid,
241 const char *proxy_command);
242
243/* Starts a dialog with the server, and authenticates the current user on the
244 server. This does not need any extra privileges. The basic connection
245 to the server must already have been established before this is called.
246 If login fails, this function prints an error and never returns.
247 This initializes the random state, and leaves it initialized (it will also
248 have references from the packet module). */
249void ssh_login(int host_key_valid, RSA *host_key, const char *host,
250 struct sockaddr_in *hostaddr, Options *options,
251 uid_t original_real_uid);
252
253/*------------ Definitions for various authentication methods. -------*/
254
255/* Tries to authenticate the user using the .rhosts file. Returns true if
256 authentication succeeds. If ignore_rhosts is non-zero, this will not
257 consider .rhosts and .shosts (/etc/hosts.equiv will still be used).
258 If strict_modes is true, checks ownership and modes of .rhosts/.shosts. */
259int auth_rhosts(struct passwd *pw, const char *client_user,
260 int ignore_rhosts, int strict_modes);
261
262/* Tries to authenticate the user using the .rhosts file and the host using
263 its host key. Returns true if authentication succeeds. */
264int auth_rhosts_rsa(struct passwd *pw, const char *client_user,
265 unsigned int bits, BIGNUM *client_host_key_e,
266 BIGNUM *client_host_key_n, int ignore_rhosts,
267 int strict_modes);
268
269/* Tries to authenticate the user using password. Returns true if
270 authentication succeeds. */
271int auth_password(struct passwd *pw, const char *password);
272
273/* Performs the RSA authentication dialog with the client. This returns
274 0 if the client could not be authenticated, and 1 if authentication was
275 successful. This may exit if there is a serious protocol violation. */
276int auth_rsa(struct passwd *pw, BIGNUM *client_n, int strict_modes);
277
278/* Parses an RSA key (number of bits, e, n) from a string. Moves the pointer
279 over the key. Skips any whitespace at the beginning and at end. */
280int auth_rsa_read_key(char **cpp, unsigned int *bitsp, BIGNUM *e, BIGNUM *n);
281
282/* Returns the name of the machine at the other end of the socket. The
283 returned string should be freed by the caller. */
284char *get_remote_hostname(int socket);
285
286/* Return the canonical name of the host in the other side of the current
287 connection (as returned by packet_get_connection). The host name is
288 cached, so it is efficient to call this several times. */
289const char *get_canonical_hostname(void);
290
291/* Returns the remote IP address as an ascii string. The value need not be
292 freed by the caller. */
293const char *get_remote_ipaddr(void);
294
295/* Returns the port number of the peer of the socket. */
296int get_peer_port(int sock);
297
298/* Returns the port number of the remote host. */
299int get_remote_port(void);
300
301/* Tries to match the host name (which must be in all lowercase) against the
302 comma-separated sequence of subpatterns (each possibly preceded by ! to
303 indicate negation). Returns true if there is a positive match; zero
304 otherwise. */
305int match_hostname(const char *host, const char *pattern, unsigned int len);
306
307/* Checks whether the given host is already in the list of our known hosts.
308 Returns HOST_OK if the host is known and has the specified key,
309 HOST_NEW if the host is not known, and HOST_CHANGED if the host is known
310 but used to have a different host key. The host must be in all lowercase. */
311typedef enum { HOST_OK, HOST_NEW, HOST_CHANGED } HostStatus;
312HostStatus check_host_in_hostfile(const char *filename,
313 const char *host, unsigned int bits,
314 BIGNUM *e, BIGNUM *n,
315 BIGNUM *ke, BIGNUM *kn);
316
317/* Appends an entry to the host file. Returns false if the entry
318 could not be appended. */
319int add_host_to_hostfile(const char *filename, const char *host,
320 unsigned int bits, BIGNUM *e, BIGNUM *n);
321
322/* Performs the RSA authentication challenge-response dialog with the client,
323 and returns true (non-zero) if the client gave the correct answer to
324 our challenge; returns zero if the client gives a wrong answer. */
325int auth_rsa_challenge_dialog(unsigned int bits, BIGNUM *e, BIGNUM *n);
326
327/* Reads a passphrase from /dev/tty with echo turned off. Returns the
328 passphrase (allocated with xmalloc). Exits if EOF is encountered.
329 If from_stdin is true, the passphrase will be read from stdin instead. */
330char *read_passphrase(const char *prompt, int from_stdin);
331
332/* Saves the authentication (private) key in a file, encrypting it with
333 passphrase. The identification of the file (lowest 64 bits of n)
334 will precede the key to provide identification of the key without
335 needing a passphrase. */
336int save_private_key(const char *filename, const char *passphrase,
337 RSA *private_key, const char *comment);
338
339/* Loads the public part of the key file (public key and comment).
340 Returns 0 if an error occurred; zero if the public key was successfully
341 read. The comment of the key is returned in comment_return if it is
342 non-NULL; the caller must free the value with xfree. */
343int load_public_key(const char *filename, RSA *pub,
344 char **comment_return);
345
346/* Loads the private key from the file. Returns 0 if an error is encountered
347 (file does not exist or is not readable, or passphrase is bad).
348 This initializes the private key. The comment of the key is returned
349 in comment_return if it is non-NULL; the caller must free the value
350 with xfree. */
351int load_private_key(const char *filename, const char *passphrase,
352 RSA *private_key, char **comment_return);
353
354/*------------ Definitions for logging. -----------------------*/
355
356/* Supported syslog facilities. */
357typedef enum
358{
359 SYSLOG_FACILITY_DAEMON,
360 SYSLOG_FACILITY_USER,
361 SYSLOG_FACILITY_AUTH,
362 SYSLOG_FACILITY_LOCAL0,
363 SYSLOG_FACILITY_LOCAL1,
364 SYSLOG_FACILITY_LOCAL2,
365 SYSLOG_FACILITY_LOCAL3,
366 SYSLOG_FACILITY_LOCAL4,
367 SYSLOG_FACILITY_LOCAL5,
368 SYSLOG_FACILITY_LOCAL6,
369 SYSLOG_FACILITY_LOCAL7
370} SyslogFacility;
371
372/* Initializes logging. If debug is non-zero, debug() will output something.
373 If quiet is non-zero, none of these will log send anything to syslog
374 (but maybe to stderr). */
375void log_init(char *av0, int on_stderr, int debug, int quiet,
376 SyslogFacility facility);
377
378/* Outputs a message to syslog or stderr, depending on the implementation.
379 The format must guarantee that the final message does not exceed 1024
380 characters. The message should not contain newline. */
381void log(const char *fmt, ...);
382
383/* Outputs a message to syslog or stderr, depending on the implementation.
384 The format must guarantee that the final message does not exceed 1024
385 characters. The message should not contain newline. */
386void debug(const char *fmt, ...);
387
388/* Outputs a message to syslog or stderr, depending on the implementation.
389 The format must guarantee that the final message does not exceed 1024
390 characters. The message should not contain newline. */
391void error(const char *fmt, ...);
392
393/* Outputs a message to syslog or stderr, depending on the implementation.
394 The format must guarantee that the final message does not exceed 1024
395 characters. The message should not contain newline.
396 This call never returns. */
397void fatal(const char *fmt, ...);
398
399/* Registers a cleanup function to be called by fatal() before exiting.
400 It is permissible to call fatal_remove_cleanup for the function itself
401 from the function. */
402void fatal_add_cleanup(void (*proc)(void *context), void *context);
403
404/* Removes a cleanup frunction to be called at fatal(). */
405void fatal_remove_cleanup(void (*proc)(void *context), void *context);
406
407/*---------------- definitions for channels ------------------*/
408
409/* Sets specific protocol options. */
410void channel_set_options(int hostname_in_open);
411
412/* Allocate a new channel object and set its type and socket. Remote_name
413 must have been allocated with xmalloc; this will free it when the channel
414 is freed. */
415int channel_allocate(int type, int sock, char *remote_name);
416
417/* Free the channel and close its socket. */
418void channel_free(int channel);
419
420/* Add any bits relevant to channels in select bitmasks. */
421void channel_prepare_select(fd_set *readset, fd_set *writeset);
422
423/* After select, perform any appropriate operations for channels which
424 have events pending. */
425void channel_after_select(fd_set *readset, fd_set *writeset);
426
427/* If there is data to send to the connection, send some of it now. */
428void channel_output_poll(void);
429
430/* This is called when a packet of type CHANNEL_DATA has just been received.
431 The message type has already been consumed, but channel number and data
432 is still there. */
433void channel_input_data(int payload_len);
434
435/* Returns true if no channel has too much buffered data. */
436int channel_not_very_much_buffered_data(void);
437
438/* This is called after receiving CHANNEL_CLOSE. */
439void channel_input_close(void);
440
441/* This is called after receiving CHANNEL_CLOSE_CONFIRMATION. */
442void channel_input_close_confirmation(void);
443
444/* This is called after receiving CHANNEL_OPEN_CONFIRMATION. */
445void channel_input_open_confirmation(void);
446
447/* This is called after receiving CHANNEL_OPEN_FAILURE from the other side. */
448void channel_input_open_failure(void);
449
450/* This closes any sockets that are listening for connections; this removes
451 any unix domain sockets. */
452void channel_stop_listening(void);
453
454/* Closes the sockets of all channels. This is used to close extra file
455 descriptors after a fork. */
456void channel_close_all(void);
457
458/* Returns the maximum file descriptor number used by the channels. */
459int channel_max_fd(void);
460
461/* Returns true if there is still an open channel over the connection. */
462int channel_still_open(void);
463
464/* Returns a string containing a list of all open channels. The list is
465 suitable for displaying to the user. It uses crlf instead of newlines.
466 The caller should free the string with xfree. */
467char *channel_open_message(void);
468
469/* Initiate forwarding of connections to local port "port" through the secure
470 channel to host:port from remote side. This never returns if there
471 was an error. */
472void channel_request_local_forwarding(int port, const char *host,
473 int remote_port);
474
475/* Initiate forwarding of connections to port "port" on remote host through
476 the secure channel to host:port from local side. This never returns
477 if there was an error. This registers that open requests for that
478 port are permitted. */
479void channel_request_remote_forwarding(int port, const char *host,
480 int remote_port);
481
482/* Permits opening to any host/port in SSH_MSG_PORT_OPEN. This is usually
483 called by the server, because the user could connect to any port anyway,
484 and the server has no way to know but to trust the client anyway. */
485void channel_permit_all_opens(void);
486
487/* This is called after receiving CHANNEL_FORWARDING_REQUEST. This initates
488 listening for the port, and sends back a success reply (or disconnect
489 message if there was an error). This never returns if there was an
490 error. */
491void channel_input_port_forward_request(int is_root);
492
493/* This is called after receiving PORT_OPEN message. This attempts to connect
494 to the given host:port, and sends back CHANNEL_OPEN_CONFIRMATION or
495 CHANNEL_OPEN_FAILURE. */
496void channel_input_port_open(int payload_len);
497
498/* Creates a port for X11 connections, and starts listening for it.
499 Returns the display name, or NULL if an error was encountered. */
500char *x11_create_display(int screen);
501
502/* Creates an internet domain socket for listening for X11 connections.
503 Returns a suitable value for the DISPLAY variable, or NULL if an error
504 occurs. */
505char *x11_create_display_inet(int screen);
506
507/* This is called when SSH_SMSG_X11_OPEN is received. The packet contains
508 the remote channel number. We should do whatever we want, and respond
509 with either SSH_MSG_OPEN_CONFIRMATION or SSH_MSG_OPEN_FAILURE. */
510void x11_input_open(int payload_len);
511
512/* Requests forwarding of X11 connections. This should be called on the
513 client only. */
514void x11_request_forwarding(void);
515
516/* Requests forwarding for X11 connections, with authentication spoofing.
517 This should be called in the client only. */
518void x11_request_forwarding_with_spoofing(const char *proto, const char *data);
519
520/* Local Xauthority file (server only). */
521extern char *xauthfile;
522
523/* Sends a message to the server to request authentication fd forwarding. */
524void auth_request_forwarding(void);
525
526/* Returns the name of the forwarded authentication socket. Returns NULL
527 if there is no forwarded authentication socket. The returned value points
528 to a static buffer. */
529char *auth_get_socket_name(void);
530
531/* This if called to process SSH_CMSG_AGENT_REQUEST_FORWARDING on the server.
532 This starts forwarding authentication requests. */
533void auth_input_request_forwarding(struct passwd *pw);
534
535/* This is called to process an SSH_SMSG_AGENT_OPEN message. */
536void auth_input_open_request(void);
537
538/* Returns true if the given string matches the pattern (which may contain
539 ? and * as wildcards), and zero if it does not match. */
540int match_pattern(const char *s, const char *pattern);
541
542/* Expands tildes in the file name. Returns data allocated by xmalloc.
543 Warning: this calls getpw*. */
544char *tilde_expand_filename(const char *filename, uid_t my_uid);
545
546/* Performs the interactive session. This handles data transmission between
547 the client and the program. Note that the notion of stdin, stdout, and
548 stderr in this function is sort of reversed: this function writes to
549 stdin (of the child program), and reads from stdout and stderr (of the
550 child program). */
551void server_loop(int pid, int fdin, int fdout, int fderr);
552
553/* Client side main loop for the interactive session. */
554int client_loop(int have_pty, int escape_char);
555
556/* Linked list of custom environment strings (see auth-rsa.c). */
557struct envstring {
558 struct envstring *next;
559 char *s;
560};
561
562#ifdef KRB4
563#include <krb.h>
564
565/* Performs Kerberos v4 mutual authentication with the client. This returns
566 0 if the client could not be authenticated, and 1 if authentication was
567 successful. This may exit if there is a serious protocol violation. */
568int auth_krb4(const char *server_user, KTEXT auth, char **client);
569int ssh_tf_init(uid_t uid);
570
571#ifdef AFS
572#include <kafs.h>
573
574/* Accept passed Kerberos v4 ticket-granting ticket and AFS tokens. */
575int auth_kerberos_tgt(struct passwd *pw, const char *string);
576int auth_afs_token(char *server_user, uid_t uid, const char *string);
577
578int creds_to_radix(CREDENTIALS *creds, unsigned char *buf);
579int radix_to_creds(const char *buf, CREDENTIALS *creds);
580#endif /* AFS */
581
582#endif /* KRB4 */
583
584#ifdef SKEY
585#include <skey.h>
586char *skey_fake_keyinfo(char *username);
587#endif /* SKEY */
588
589#endif /* SSH_H */
This page took 0.143032 seconds and 5 git commands to generate.