- markus@cvs.openbsd.org 2002/03/19 10:35:39
     [auth-options.c auth.h session.c session.h sshd.c]
     clean up prototypes
diff --git a/ChangeLog b/ChangeLog
index 05e9382..c02042d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -86,6 +86,10 @@
      use xfree() after xstrdup().
 
      markus@ ok
+   - markus@cvs.openbsd.org 2002/03/19 10:35:39
+     [auth-options.c auth.h session.c session.h sshd.c]
+     clean up prototypes
+
 20020317
  - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is wanted,
    warn if directory does not exist. Put system directories in front of
@@ -7931,4 +7935,4 @@
  - Wrote replacements for strlcpy and mkdtemp
  - Released 1.0pre1
 
-$Id: ChangeLog,v 1.1949 2002/03/22 02:47:28 mouring Exp $
+$Id: ChangeLog,v 1.1950 2002/03/22 02:50:06 mouring Exp $
diff --git a/auth-options.c b/auth-options.c
index 48be6d8..3408b3d 100644
--- a/auth-options.c
+++ b/auth-options.c
@@ -10,7 +10,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: auth-options.c,v 1.22 2002/03/18 17:50:31 provos Exp $");
+RCSID("$OpenBSD: auth-options.c,v 1.23 2002/03/19 10:35:39 markus Exp $");
 
 #include "packet.h"
 #include "xmalloc.h"
@@ -42,7 +42,7 @@
 
 extern ServerOptions options;
 
-void
+static void
 auth_send_debug(Buffer *m)
 {
 	char *msg;
diff --git a/auth.h b/auth.h
index 3e4a550..a336926 100644
--- a/auth.h
+++ b/auth.h
@@ -1,4 +1,4 @@
-/*	$OpenBSD: auth.h,v 1.34 2002/03/18 17:50:31 provos Exp $	*/
+/*	$OpenBSD: auth.h,v 1.35 2002/03/19 10:35:39 markus Exp $	*/
 
 /*
  * Copyright (c) 2000 Markus Friedl.  All rights reserved.
@@ -88,7 +88,7 @@
 	void	(*free_ctx)(void *ctx);
 };
 
-int     auth_rhosts(struct passwd *, const char *);
+int      auth_rhosts(struct passwd *, const char *);
 int
 auth_rhosts2(struct passwd *, const char *, const char *, const char *);
 
@@ -96,6 +96,13 @@
 int      auth_password(Authctxt *, const char *);
 int      auth_rsa(struct passwd *, BIGNUM *);
 int      auth_rsa_challenge_dialog(Key *);
+BIGNUM	*auth_rsa_generate_challenge(Key *);
+int	 auth_rsa_verify_response(Key *, BIGNUM *, u_char[]);
+int	 auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
+
+int	 auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
+int	 hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
+int	 user_key_allowed(struct passwd *, Key *);
 
 #ifdef KRB4
 #include <krb.h>
@@ -133,6 +140,10 @@
 
 int	auth2_challenge(Authctxt *, char *);
 void	auth2_challenge_stop(Authctxt *);
+int	bsdauth_query(void *, char **, char **, u_int *, char ***, u_int **);
+int	bsdauth_respond(void *, u_int, char **);
+int	skey_query(void *, char **, char **, u_int *, char ***, u_int **);
+int	skey_respond(void *, u_int, char **);
 
 int	allowed_user(struct passwd *);
 struct passwd * getpwnamallow(const char *user);
@@ -153,6 +164,12 @@
 check_key_in_hostfiles(struct passwd *, Key *, const char *,
     const char *, const char *);
 
+/* hostkey handling */
+Key	*get_hostkey_by_index(int);
+Key	*get_hostkey_by_type(int);
+int	 get_hostkey_index(Key *);
+int	 ssh1_session_key(BIGNUM *);
+
 #define AUTH_FAIL_MAX 6
 #define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2)
 #define AUTH_FAIL_MSG "Too many authentication failures for %.100s"
diff --git a/session.c b/session.c
index e5ea637..1b0d652 100644
--- a/session.c
+++ b/session.c
@@ -33,7 +33,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: session.c,v 1.130 2002/03/18 17:50:31 provos Exp $");
+RCSID("$OpenBSD: session.c,v 1.131 2002/03/19 10:35:39 markus Exp $");
 
 #include "ssh.h"
 #include "ssh1.h"
@@ -1114,7 +1114,7 @@
 		fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
 }
 
-void
+static void
 launch_login(struct passwd *pw, const char *hostname)
 {
 	/* Launch login(1). */
diff --git a/session.h b/session.h
index 81f024c..fad3abe 100644
--- a/session.h
+++ b/session.h
@@ -1,4 +1,4 @@
-/*	$OpenBSD: session.h,v 1.15 2002/03/18 17:50:31 provos Exp $	*/
+/*	$OpenBSD: session.h,v 1.16 2002/03/19 10:35:39 markus Exp $	*/
 
 /*
  * Copyright (c) 2000, 2001 Markus Friedl.  All rights reserved.
@@ -59,6 +59,7 @@
 void	 session_close_by_pid(pid_t, int);
 void	 session_close_by_channel(int, void *);
 void	 session_destroy_all(void (*)(Session *));
+void	 session_pty_cleanup2(void *);
 
 Session	*session_new(void);
 Session	*session_by_tty(char *);
diff --git a/sshd.c b/sshd.c
index c788ac0..d34b1a7 100644
--- a/sshd.c
+++ b/sshd.c
@@ -42,7 +42,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.232 2002/03/19 03:03:43 stevesk Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.233 2002/03/19 10:35:39 markus Exp $");
 
 #include <openssl/dh.h>
 #include <openssl/bn.h>
@@ -516,7 +516,7 @@
 	/* We do not clear ssh1_host key and cookie.  XXX - Okay Niels? */
 }
 
-void
+static void
 privsep_preauth_child(void)
 {
 	u_int32_t rand[256];
@@ -546,7 +546,7 @@
 	setuid(options.unprivileged_user);
 }
 
-void
+static void
 privsep_postauth(Authctxt *authctxt, pid_t pid)
 {
 	extern Authctxt *x_authctxt;