1 /*- 2 * Copyright (c) 1991, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * from: @(#)auth-proto.h 8.1 (Berkeley) 6/4/93 34 * $NetBSD: auth-proto.h,v 1.5 1996/02/24 01:15:16 jtk Exp $ 35 */ 36 37 /* 38 * Copyright (C) 1990 by the Massachusetts Institute of Technology 39 * 40 * Export of this software from the United States of America is assumed 41 * to require a specific license from the United States Government. 42 * It is the responsibility of any person or organization contemplating 43 * export to obtain such a license before exporting. 44 * 45 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 46 * distribute this software and its documentation for any purpose and 47 * without fee is hereby granted, provided that the above copyright 48 * notice appear in all copies and that both that copyright notice and 49 * this permission notice appear in supporting documentation, and that 50 * the name of M.I.T. not be used in advertising or publicity pertaining 51 * to distribution of the software without specific, written prior 52 * permission. M.I.T. makes no representations about the suitability of 53 * this software for any purpose. It is provided "as is" without express 54 * or implied warranty. 55 */ 56 57 #include <sys/cdefs.h> 58 59 #if defined(AUTHENTICATION) 60 Authenticator *findauthenticator __P((int, int)); 61 62 void auth_init __P((char *, int)); 63 int auth_cmd __P((int, char **)); 64 void auth_request __P((void)); 65 void auth_send __P((unsigned char *, int)); 66 void auth_send_retry __P((void)); 67 void auth_is __P((unsigned char *, int)); 68 void auth_reply __P((unsigned char *, int)); 69 void auth_finished __P((Authenticator *, int)); 70 int auth_wait __P((char *)); 71 void auth_disable_name __P((char *)); 72 void auth_gen_printsub __P((unsigned char *, int, unsigned char *, int)); 73 74 int getauthmask __P((char *, int *)); 75 int auth_enable __P((char *)); 76 int auth_disable __P((char *)); 77 int auth_onoff __P((char *, int)); 78 int auth_togdebug __P((int)); 79 int auth_status __P((void)); 80 void auth_name __P((unsigned char *, int)); 81 int auth_sendname __P((unsigned char *, int)); 82 void auth_finished __P((Authenticator *, int)); 83 int auth_wait __P((char *)); 84 void auth_debug __P((int)); 85 void auth_printsub __P((unsigned char *, int, unsigned char *, int)); 86 87 #ifdef KRB4 88 int kerberos4_init __P((Authenticator *, int)); 89 int kerberos4_send __P((Authenticator *)); 90 void kerberos4_is __P((Authenticator *, unsigned char *, int)); 91 void kerberos4_reply __P((Authenticator *, unsigned char *, int)); 92 int kerberos4_status __P((Authenticator *, char *, int)); 93 void kerberos4_printsub __P((unsigned char *, int, unsigned char *, int)); 94 #endif 95 96 #ifdef KRB5 97 int kerberos5_init __P((Authenticator *, int)); 98 int kerberos5_send __P((Authenticator *)); 99 void kerberos5_is __P((Authenticator *, unsigned char *, int)); 100 void kerberos5_reply __P((Authenticator *, unsigned char *, int)); 101 int kerberos5_status __P((Authenticator *, char *, int)); 102 void kerberos5_printsub __P((unsigned char *, int, unsigned char *, int)); 103 #endif 104 #endif 105