auth-proto.h revision 1.5 1 /*-
2 * Copyright (c) 1991, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * from: @(#)auth-proto.h 8.1 (Berkeley) 6/4/93
34 * $NetBSD: auth-proto.h,v 1.5 1996/02/24 01:15:16 jtk Exp $
35 */
36
37 /*
38 * Copyright (C) 1990 by the Massachusetts Institute of Technology
39 *
40 * Export of this software from the United States of America is assumed
41 * to require a specific license from the United States Government.
42 * It is the responsibility of any person or organization contemplating
43 * export to obtain such a license before exporting.
44 *
45 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
46 * distribute this software and its documentation for any purpose and
47 * without fee is hereby granted, provided that the above copyright
48 * notice appear in all copies and that both that copyright notice and
49 * this permission notice appear in supporting documentation, and that
50 * the name of M.I.T. not be used in advertising or publicity pertaining
51 * to distribution of the software without specific, written prior
52 * permission. M.I.T. makes no representations about the suitability of
53 * this software for any purpose. It is provided "as is" without express
54 * or implied warranty.
55 */
56
57 #include <sys/cdefs.h>
58
59 #if defined(AUTHENTICATION)
60 Authenticator *findauthenticator __P((int, int));
61
62 void auth_init __P((char *, int));
63 int auth_cmd __P((int, char **));
64 void auth_request __P((void));
65 void auth_send __P((unsigned char *, int));
66 void auth_send_retry __P((void));
67 void auth_is __P((unsigned char *, int));
68 void auth_reply __P((unsigned char *, int));
69 void auth_finished __P((Authenticator *, int));
70 int auth_wait __P((char *));
71 void auth_disable_name __P((char *));
72 void auth_gen_printsub __P((unsigned char *, int, unsigned char *, int));
73
74 int getauthmask __P((char *, int *));
75 int auth_enable __P((char *));
76 int auth_disable __P((char *));
77 int auth_onoff __P((char *, int));
78 int auth_togdebug __P((int));
79 int auth_status __P((void));
80 void auth_name __P((unsigned char *, int));
81 int auth_sendname __P((unsigned char *, int));
82 void auth_finished __P((Authenticator *, int));
83 int auth_wait __P((char *));
84 void auth_debug __P((int));
85 void auth_printsub __P((unsigned char *, int, unsigned char *, int));
86
87 #ifdef KRB4
88 int kerberos4_init __P((Authenticator *, int));
89 int kerberos4_send __P((Authenticator *));
90 void kerberos4_is __P((Authenticator *, unsigned char *, int));
91 void kerberos4_reply __P((Authenticator *, unsigned char *, int));
92 int kerberos4_status __P((Authenticator *, char *, int));
93 void kerberos4_printsub __P((unsigned char *, int, unsigned char *, int));
94 #endif
95
96 #ifdef KRB5
97 int kerberos5_init __P((Authenticator *, int));
98 int kerberos5_send __P((Authenticator *));
99 void kerberos5_is __P((Authenticator *, unsigned char *, int));
100 void kerberos5_reply __P((Authenticator *, unsigned char *, int));
101 int kerberos5_status __P((Authenticator *, char *, int));
102 void kerberos5_printsub __P((unsigned char *, int, unsigned char *, int));
103 #endif
104 #endif
105