mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-11-25 11:38:10 +08:00
232b76f9f8
[authfile.c authfile.h sshconnect2.c ssh.c sshconnect1.c] Prevent ssh from trying to open private keys with bad permissions more than once or prompting for their passphrases (which it subsequently ignores anyway), similar to a previous change in ssh-add. bz #1186, ok djm@
27 lines
1021 B
C
27 lines
1021 B
C
/* $OpenBSD: authfile.h,v 1.13 2006/04/25 08:02:27 dtucker Exp $ */
|
|
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
#ifndef AUTHFILE_H
|
|
#define AUTHFILE_H
|
|
|
|
int key_save_private(Key *, const char *, const char *, const char *);
|
|
Key *key_load_public(const char *, char **);
|
|
Key *key_load_public_type(int, const char *, char **);
|
|
Key *key_load_private(const char *, const char *, char **);
|
|
Key *key_load_private_type(int, const char *, const char *, char **, int *);
|
|
Key *key_load_private_pem(int, int, const char *, char **);
|
|
int key_perm_ok(int, const char *);
|
|
|
|
#endif
|