]>
Commit | Line | Data |
---|---|---|
a8bbdc75 | 1 | /* $OpenBSD: ssh.h,v 1.71 2002/06/22 02:00:29 stevesk Exp $ */ |
93c3b6de | 2 | |
8efc0c15 | 3 | /* |
5260325f | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
5260325f | 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
6 | * All rights reserved | |
6ae2364d | 7 | * |
bcbf86ec | 8 | * As far as I am concerned, the code I have written for this software |
9 | * can be used freely for any purpose. Any derived versions of this | |
10 | * software must be clearly marked as such, and if the derived work is | |
11 | * incompatible with the protocol description in the RFC file, it must be | |
12 | * called by a name other than "ssh" or "Secure Shell". | |
5260325f | 13 | */ |
8efc0c15 | 14 | |
8efc0c15 | 15 | #ifndef SSH_H |
16 | #define SSH_H | |
17 | ||
4cca272e | 18 | #include <netinet/in.h> /* For struct sockaddr_in */ |
19 | #include <pwd.h> /* For struct pw */ | |
6a17f9c2 | 20 | #include <stdarg.h> /* For va_list */ |
57ce3f00 | 21 | #include <syslog.h> /* For LOG_AUTH and friends */ |
48e671d5 | 22 | #include <sys/socket.h> /* For struct sockaddr_storage */ |
84ceda19 | 23 | #include "openbsd-compat/fake-socket.h" /* For struct sockaddr_storage */ |
eef6f7e9 | 24 | #ifdef HAVE_SYS_SELECT_H |
25 | # include <sys/select.h> | |
26 | #endif | |
42f11eb2 | 27 | |
8efc0c15 | 28 | /* Cipher used for encrypting authentication files. */ |
29 | #define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES | |
30 | ||
31 | /* Default port number. */ | |
32 | #define SSH_DEFAULT_PORT 22 | |
33 | ||
34 | /* Maximum number of TCP/IP ports forwarded per direction. */ | |
35 | #define SSH_MAX_FORWARDS_PER_DIRECTION 100 | |
36 | ||
aa3378df | 37 | /* |
38 | * Maximum number of RSA authentication identity files that can be specified | |
39 | * in configuration files or on the command line. | |
40 | */ | |
8efc0c15 | 41 | #define SSH_MAX_IDENTITY_FILES 100 |
42 | ||
aa3378df | 43 | /* |
7f056bc5 | 44 | * Major protocol version. Different version indicates major incompatibility |
aa3378df | 45 | * that prevents communication. |
a8be9f80 | 46 | * |
aa3378df | 47 | * Minor protocol version. Different version indicates minor incompatibility |
48 | * that does not prevent interoperation. | |
49 | */ | |
a8be9f80 | 50 | #define PROTOCOL_MAJOR_1 1 |
51 | #define PROTOCOL_MINOR_1 5 | |
52 | ||
53 | /* We support both SSH1 and SSH2 */ | |
54 | #define PROTOCOL_MAJOR_2 2 | |
55 | #define PROTOCOL_MINOR_2 0 | |
8efc0c15 | 56 | |
aa3378df | 57 | /* |
58 | * Name for the service. The port named by this service overrides the | |
59 | * default port if present. | |
60 | */ | |
8efc0c15 | 61 | #define SSH_SERVICE_NAME "ssh" |
62 | ||
aa3378df | 63 | /* |
a8bbdc75 | 64 | * Name of the environment variable containing the process ID of the |
65 | * authentication agent. | |
aa3378df | 66 | */ |
b705bea0 | 67 | #define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID" |
8efc0c15 | 68 | |
aa3378df | 69 | /* |
70 | * Name of the environment variable containing the pathname of the | |
71 | * authentication socket. | |
72 | */ | |
42f11eb2 | 73 | #define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK" |
50da1126 | 74 | |
57112b5a | 75 | /* |
42f11eb2 | 76 | * Environment variable for overwriting the default location of askpass |
57112b5a | 77 | */ |
57112b5a | 78 | #define SSH_ASKPASS_ENV "SSH_ASKPASS" |
79 | ||
aa3378df | 80 | /* |
81 | * Force host key length and server key length to differ by at least this | |
82 | * many bits. This is to make double encryption with rsaref work. | |
83 | */ | |
8efc0c15 | 84 | #define SSH_KEY_BITS_RESERVED 128 |
85 | ||
aa3378df | 86 | /* |
87 | * Length of the session key in bytes. (Specified as 256 bits in the | |
88 | * protocol.) | |
89 | */ | |
8efc0c15 | 90 | #define SSH_SESSION_KEY_LENGTH 32 |
91 | ||
92 | /* Name of Kerberos service for SSH to use. */ | |
93 | #define KRB4_SERVICE_NAME "rcmd" | |
94 | ||
4bf9c10e | 95 | /* Used to identify ``EscapeChar none'' */ |
96 | #define SSH_ESCAPECHAR_NONE -2 | |
97 | ||
2ea6de2b | 98 | /* |
99 | * unprivileged user when UsePrivilegeSeparation=yes; | |
5de727d6 | 100 | * sshd will change its privileges to this user and its |
2ea6de2b | 101 | * primary group. |
102 | */ | |
9a0fbcb3 | 103 | #ifndef SSH_PRIVSEP_USER |
897fecd3 | 104 | #define SSH_PRIVSEP_USER "sshd" |
9a0fbcb3 | 105 | #endif |
2ea6de2b | 106 | |
82b00264 | 107 | /* Minimum modulus size (n) for RSA keys. */ |
108 | #define SSH_RSA_MINIMUM_MODULUS_SIZE 768 | |
109 | ||
5260325f | 110 | #endif /* SSH_H */ |