blob: 1db067a813a1de3dbb3fefde0010da5153a4fc4b [file] [log] [blame]
djm@openbsd.org99aa8032020-01-25 23:02:13 +00001/* $OpenBSD: authfile.h,v 1.25 2020/01/25 23:02:13 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millere4340be2000-09-16 13:29:08 +11003/*
Damien Miller86687062014-07-02 15:28:02 +10004 * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved.
Damien Millere4340be2000-09-16 13:29:08 +11005 *
Damien Miller86687062014-07-02 15:28:02 +10006 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Damien Millere4340be2000-09-16 13:29:08 +110025 */
Damien Miller389edc42000-11-06 12:39:34 +110026
Damien Millereba71ba2000-04-29 23:57:08 +100027#ifndef AUTHFILE_H
28#define AUTHFILE_H
29
Damien Miller86687062014-07-02 15:28:02 +100030struct sshbuf;
31struct sshkey;
32
djm@openbsd.org1195f4c2015-01-08 10:14:08 +000033/* XXX document these */
34/* XXX some of these could probably be merged/retired */
35
Damien Miller86687062014-07-02 15:28:02 +100036int sshkey_save_private(struct sshkey *, const char *,
37 const char *, const char *, int, const char *, int);
Damien Miller86687062014-07-02 15:28:02 +100038int sshkey_load_cert(const char *, struct sshkey **);
39int sshkey_load_public(const char *, struct sshkey **, char **);
40int sshkey_load_private(const char *, const char *, struct sshkey **, char **);
41int sshkey_load_private_cert(int, const char *, const char *,
dtucker@openbsd.org6b39a7b2019-08-05 11:50:33 +000042 struct sshkey **);
Damien Miller86687062014-07-02 15:28:02 +100043int sshkey_load_private_type(int, const char *, const char *,
dtucker@openbsd.org6b39a7b2019-08-05 11:50:33 +000044 struct sshkey **, char **);
djm@openbsd.org1195f4c2015-01-08 10:14:08 +000045int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
46 struct sshkey **keyp, char **commentp);
Damien Miller86687062014-07-02 15:28:02 +100047int sshkey_perm_ok(int, const char *);
djm@openbsd.org5e39a492014-12-04 02:24:32 +000048int sshkey_in_file(struct sshkey *, const char *, int, int);
49int sshkey_check_revoked(struct sshkey *key, const char *revoked_keys_file);
djm@openbsd.orgdd8002f2019-09-03 08:30:47 +000050int sshkey_advance_past_options(char **cpp);
djm@openbsd.org878ba432020-01-02 22:38:33 +000051int sshkey_save_public(const struct sshkey *key, const char *path,
52 const char *comment);
Damien Millereba71ba2000-04-29 23:57:08 +100053
54#endif