blob: a6c74934d69ad1583a5eb73626cb7d0ecd4318cb [file] [log] [blame]
Darren Tucker232b76f2006-05-06 17:41:51 +10001/* $OpenBSD: authfile.h,v 1.13 2006/04/25 08:02:27 dtucker Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millere4340be2000-09-16 13:29:08 +11003/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
5 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Millere4340be2000-09-16 13:29:08 +11007 *
8 * As far as I am concerned, the code I have written for this software
9 * can be used freely for any purpose. Any derived versions of this
10 * software must be clearly marked as such, and if the derived work is
11 * incompatible with the protocol description in the RFC file, it must be
12 * called by a name other than "ssh" or "Secure Shell".
13 */
Damien Miller389edc42000-11-06 12:39:34 +110014
Damien Millereba71ba2000-04-29 23:57:08 +100015#ifndef AUTHFILE_H
16#define AUTHFILE_H
17
Ben Lindstrom4cc240d2001-07-04 04:46:56 +000018int key_save_private(Key *, const char *, const char *, const char *);
19Key *key_load_public(const char *, char **);
20Key *key_load_public_type(int, const char *, char **);
21Key *key_load_private(const char *, const char *, char **);
Darren Tucker232b76f2006-05-06 17:41:51 +100022Key *key_load_private_type(int, const char *, const char *, char **, int *);
Ben Lindstrom1bad2562002-06-06 19:57:33 +000023Key *key_load_private_pem(int, int, const char *, char **);
Damien Miller8275fad2006-03-15 12:06:23 +110024int key_perm_ok(int, const char *);
Damien Millereba71ba2000-04-29 23:57:08 +100025
26#endif