blob: 4198607454fb8f82ba3c1c75bb87731d1a7337c5 [file] [log] [blame]
Kevin Steves7ba49702002-07-21 23:16:00 +00001/*
2 * Copyright (c) 2000 Damien Miller. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
Damien Millere9cf3572001-02-09 12:55:35 +110024
Damien Millere72b7af1999-12-30 15:08:44 +110025#include "includes.h"
26#ifdef USE_PAM
27
djm@openbsd.org7c856852018-03-03 03:15:51 +000028struct ssh;
29
Darren Tuckerdbf7a742004-03-08 23:04:06 +110030void start_pam(Authctxt *);
Damien Millere72b7af1999-12-30 15:08:44 +110031void finish_pam(void);
Damien Miller1f499fd2003-08-25 13:08:49 +100032u_int do_pam_account(void);
djm@openbsd.org7c856852018-03-03 03:15:51 +000033void do_pam_session(struct ssh *);
Damien Millereb0e9692003-05-19 11:28:44 +100034void do_pam_setcred(int );
Kevin Steves6beac8c2000-10-14 15:08:49 +000035void do_pam_chauthtok(void);
Darren Tucker49aaf4a2003-08-26 11:58:16 +100036int do_pam_putenv(char *, char *);
Damien Millereb0e9692003-05-19 11:28:44 +100037char ** fetch_pam_environment(void);
Damien Millerc756e9b2003-11-17 21:41:42 +110038char ** fetch_pam_child_environment(void);
Damien Millereb0e9692003-05-19 11:28:44 +100039void free_pam_environment(char **);
Darren Tucker8846a072003-10-07 11:30:15 +100040void sshpam_thread_cleanup(void);
41void sshpam_cleanup(void);
Darren Tucker450a1582004-05-30 20:43:59 +100042int sshpam_auth_passwd(Authctxt *, const char *);
Darren Tucker01558b72016-07-18 09:33:25 +100043int sshpam_get_maxtries_reached(void);
44void sshpam_set_maxtries_reached(int);
Darren Tucker69687f42004-09-11 22:17:26 +100045int is_pam_session_open(void);
Damien Millere72b7af1999-12-30 15:08:44 +110046
47#endif /* USE_PAM */