djm@openbsd.org | 878ba43 | 2020-01-02 22:38:33 +0000 | [diff] [blame] | 1 | /* $OpenBSD: authfile.h,v 1.24 2020/01/02 22:38:33 djm Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 3 | /* |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 4 | * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved. |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 5 | * |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
| 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 25 | */ |
Damien Miller | 389edc4 | 2000-11-06 12:39:34 +1100 | [diff] [blame] | 26 | |
Damien Miller | eba71ba | 2000-04-29 23:57:08 +1000 | [diff] [blame] | 27 | #ifndef AUTHFILE_H |
| 28 | #define AUTHFILE_H |
| 29 | |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 30 | struct sshbuf; |
| 31 | struct sshkey; |
| 32 | |
djm@openbsd.org | 1195f4c | 2015-01-08 10:14:08 +0000 | [diff] [blame] | 33 | /* XXX document these */ |
| 34 | /* XXX some of these could probably be merged/retired */ |
| 35 | |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 36 | int sshkey_save_private(struct sshkey *, const char *, |
| 37 | const char *, const char *, int, const char *, int); |
djm@openbsd.org | 1195f4c | 2015-01-08 10:14:08 +0000 | [diff] [blame] | 38 | int sshkey_load_file(int, struct sshbuf *); |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 39 | int sshkey_load_cert(const char *, struct sshkey **); |
| 40 | int sshkey_load_public(const char *, struct sshkey **, char **); |
| 41 | int sshkey_load_private(const char *, const char *, struct sshkey **, char **); |
| 42 | int sshkey_load_private_cert(int, const char *, const char *, |
dtucker@openbsd.org | 6b39a7b | 2019-08-05 11:50:33 +0000 | [diff] [blame] | 43 | struct sshkey **); |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 44 | int sshkey_load_private_type(int, const char *, const char *, |
dtucker@openbsd.org | 6b39a7b | 2019-08-05 11:50:33 +0000 | [diff] [blame] | 45 | struct sshkey **, char **); |
djm@openbsd.org | 1195f4c | 2015-01-08 10:14:08 +0000 | [diff] [blame] | 46 | int sshkey_load_private_type_fd(int fd, int type, const char *passphrase, |
| 47 | struct sshkey **keyp, char **commentp); |
Damien Miller | 8668706 | 2014-07-02 15:28:02 +1000 | [diff] [blame] | 48 | int sshkey_perm_ok(int, const char *); |
djm@openbsd.org | 5e39a49 | 2014-12-04 02:24:32 +0000 | [diff] [blame] | 49 | int sshkey_in_file(struct sshkey *, const char *, int, int); |
| 50 | int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file); |
djm@openbsd.org | dd8002f | 2019-09-03 08:30:47 +0000 | [diff] [blame] | 51 | int sshkey_advance_past_options(char **cpp); |
djm@openbsd.org | 878ba43 | 2020-01-02 22:38:33 +0000 | [diff] [blame] | 52 | int sshkey_save_public(const struct sshkey *key, const char *path, |
| 53 | const char *comment); |
Damien Miller | eba71ba | 2000-04-29 23:57:08 +1000 | [diff] [blame] | 54 | |
| 55 | #endif |