blob: 6745dc062be1e6b689cfdd5de16acc04d3ea476b [file] [log] [blame]
Damien Millerc1583312010-08-05 13:04:50 +10001/* $OpenBSD: authfile.h,v 1.15 2010/08/04 05:42:47 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millere4340be2000-09-16 13:29:08 +11003/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
5 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Millere4340be2000-09-16 13:29:08 +11007 *
8 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
13 */
Damien Miller389edc42000-11-06 12:39:34 +110014
Damien Millereba71ba2000-04-29 23:57:08 +100015#ifndef AUTHFILE_H
16#define AUTHFILE_H
17
Ben Lindstrom4cc240d2001-07-04 04:46:56 +000018int key_save_private(Key *, const char *, const char *, const char *);
Damien Millerc1583312010-08-05 13:04:50 +100019Key *key_load_cert(const char *);
Ben Lindstrom4cc240d2001-07-04 04:46:56 +000020Key *key_load_public(const char *, char **);
21Key *key_load_public_type(int, const char *, char **);
22Key *key_load_private(const char *, const char *, char **);
Damien Millerc1583312010-08-05 13:04:50 +100023Key *key_load_private_cert(int, const char *, const char *, int *);
Darren Tucker232b76f2006-05-06 17:41:51 +100024Key *key_load_private_type(int, const char *, const char *, char **, int *);
Ben Lindstrom1bad2562002-06-06 19:57:33 +000025Key *key_load_private_pem(int, int, const char *, char **);
Damien Miller8275fad2006-03-15 12:06:23 +110026int key_perm_ok(int, const char *);
Damien Miller1aed65e2010-03-04 21:53:35 +110027int key_in_file(Key *, const char *, int);
Damien Millereba71ba2000-04-29 23:57:08 +100028
29#endif