X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/blobdiff_plain/aa3378df3cc7da00b8f93569d0c88f0c626ddb18..a5c9cd3122a00c434e3d019e4f4c7c443c233d23:/ssh.h diff --git a/ssh.h b/ssh.h index bfa8ea12..d62a9e1e 100644 --- a/ssh.h +++ b/ssh.h @@ -21,7 +21,9 @@ #include /* For struct sockaddr_in */ #include /* For struct pw */ #include /* For va_list */ - +#ifdef HAVE_SYS_SELECT_H +# include +#endif #include "rsa.h" #include "cipher.h" @@ -169,6 +171,15 @@ */ #define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID" +/* + * Default path to ssh-askpass used by ssh-add, + * environment variable for overwriting the default location + */ +#ifndef SSH_ASKPASS_DEFAULT +# define SSH_ASKPASS_DEFAULT "/usr/X11R6/bin/ssh-askpass" +#endif +#define SSH_ASKPASS_ENV "SSH_ASKPASS" + /* * Force host key length and server key length to differ by at least this * many bits. This is to make double encryption with rsaref work. @@ -294,7 +305,7 @@ void record_logout(int pid, const char *ttyname); */ int ssh_connect(const char *host, struct sockaddr_in * hostaddr, - int port, int connection_attempts, + u_short port, int connection_attempts, int anonymous, uid_t original_real_uid, const char *proxy_command); @@ -579,8 +590,8 @@ char *channel_open_message(void); * error. */ void -channel_request_local_forwarding(int port, const char *host, - int remote_port); +channel_request_local_forwarding(u_short port, const char *host, + u_short remote_port, int gateway_ports); /* * Initiate forwarding of connections to port "port" on remote host through @@ -589,8 +600,8 @@ channel_request_local_forwarding(int port, const char *host, * permitted. */ void -channel_request_remote_forwarding(int port, const char *host, - int remote_port); +channel_request_remote_forwarding(u_short port, const char *host, + u_short remote_port); /* * Permits opening to any host/port in SSH_MSG_PORT_OPEN. This is usually @@ -624,7 +635,7 @@ char *x11_create_display(int screen); * Returns a suitable value for the DISPLAY variable, or NULL if an error * occurs. */ -char *x11_create_display_inet(int screen); +char *x11_create_display_inet(int screen, int x11_display_offset); /* * This is called when SSH_SMSG_X11_OPEN is received. The packet contains @@ -693,9 +704,14 @@ struct envstring { struct envstring *next; char *s; }; + +/* + * Ensure all of data on socket comes through. f==read || f==write + */ +int atomicio(int (*f)(), int fd, void *s, size_t n); + #ifdef KRB4 #include - /* * Performs Kerberos v4 mutual authentication with the client. This returns 0 * if the client could not be authenticated, and 1 if authentication was @@ -704,6 +720,7 @@ struct envstring { int auth_krb4(const char *server_user, KTEXT auth, char **client); int krb4_init(uid_t uid); void krb4_cleanup_proc(void *ignore); +int auth_krb4_password(struct passwd * pw, const char *password); #ifdef AFS #include @@ -721,6 +738,11 @@ int radix_to_creds(const char *buf, CREDENTIALS * creds); #ifdef SKEY #include char *skey_fake_keyinfo(char *username); +int auth_skey_password(struct passwd * pw, const char *password); #endif /* SKEY */ +#ifdef USE_PAM +#include "auth-pam.h" +#endif /* USE_PAM */ + #endif /* SSH_H */