blob: a2840cf80822e3eb525ca0975db0f1cdec0d80d5 [file] [log] [blame]
djm@openbsd.org878ba432020-01-02 22:38:33 +00001/* $OpenBSD: authfile.h,v 1.24 2020/01/02 22:38:33 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millere4340be2000-09-16 13:29:08 +11003/*
Damien Miller86687062014-07-02 15:28:02 +10004 * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved.
Damien Millere4340be2000-09-16 13:29:08 +11005 *
Damien Miller86687062014-07-02 15:28:02 +10006 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Damien Millere4340be2000-09-16 13:29:08 +110025 */
Damien Miller389edc42000-11-06 12:39:34 +110026
Damien Millereba71ba2000-04-29 23:57:08 +100027#ifndef AUTHFILE_H
28#define AUTHFILE_H
29
Damien Miller86687062014-07-02 15:28:02 +100030struct sshbuf;
31struct sshkey;
32
djm@openbsd.org1195f4c2015-01-08 10:14:08 +000033/* XXX document these */
34/* XXX some of these could probably be merged/retired */
35
Damien Miller86687062014-07-02 15:28:02 +100036int sshkey_save_private(struct sshkey *, const char *,
37 const char *, const char *, int, const char *, int);
djm@openbsd.org1195f4c2015-01-08 10:14:08 +000038int sshkey_load_file(int, struct sshbuf *);
Damien Miller86687062014-07-02 15:28:02 +100039int sshkey_load_cert(const char *, struct sshkey **);
40int sshkey_load_public(const char *, struct sshkey **, char **);
41int sshkey_load_private(const char *, const char *, struct sshkey **, char **);
42int sshkey_load_private_cert(int, const char *, const char *,
dtucker@openbsd.org6b39a7b2019-08-05 11:50:33 +000043 struct sshkey **);
Damien Miller86687062014-07-02 15:28:02 +100044int sshkey_load_private_type(int, const char *, const char *,
dtucker@openbsd.org6b39a7b2019-08-05 11:50:33 +000045 struct sshkey **, char **);
djm@openbsd.org1195f4c2015-01-08 10:14:08 +000046int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
47 struct sshkey **keyp, char **commentp);
Damien Miller86687062014-07-02 15:28:02 +100048int sshkey_perm_ok(int, const char *);
djm@openbsd.org5e39a492014-12-04 02:24:32 +000049int sshkey_in_file(struct sshkey *, const char *, int, int);
50int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file);
djm@openbsd.orgdd8002f2019-09-03 08:30:47 +000051int sshkey_advance_past_options(char **cpp);
djm@openbsd.org878ba432020-01-02 22:38:33 +000052int sshkey_save_public(const struct sshkey *key, const char *path,
53 const char *comment);
Damien Millereba71ba2000-04-29 23:57:08 +100054
55#endif