2 * Copyright (c) 1991, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#)auth-proto.h 8.1 (Berkeley) 6/4/93
37 * Copyright (C) 1990 by the Massachusetts Institute of Technology
39 * Export of this software from the United States of America is assumed
40 * to require a specific license from the United States Government.
41 * It is the responsibility of any person or organization contemplating
42 * export to obtain such a license before exporting.
44 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
45 * distribute this software and its documentation for any purpose and
46 * without fee is hereby granted, provided that the above copyright
47 * notice appear in all copies and that both that copyright notice and
48 * this permission notice appear in supporting documentation, and that
49 * the name of M.I.T. not be used in advertising or publicity pertaining
50 * to distribution of the software without specific, written prior
51 * permission. M.I.T. makes no representations about the suitability of
52 * this software for any purpose. It is provided "as is" without express
53 * or implied warranty.
64 #if defined(AUTHENTICATION)
65 Authenticator *findauthenticator P((int, int));
67 void auth_init P((char *, int));
68 int auth_cmd P((int, char **));
69 void auth_request P((void));
70 void auth_send P((unsigned char *, int));
71 void auth_send_retry P((void));
72 void auth_is P((unsigned char *, int));
73 void auth_reply P((unsigned char *, int));
74 void auth_finished P((Authenticator *, int));
75 int auth_wait P((char *));
76 void auth_disable_name P((char *));
77 void auth_gen_printsub P((unsigned char *, int, unsigned char *, int));
78 void auth_name P((unsigned char *, int));
79 void auth_printsub P((unsigned char *, int, unsigned char *, int));
80 int auth_sendname P((unsigned char *, int));
81 void auth_encrypt_user P((char *));
84 int kerberos4_init P((Authenticator *, int));
85 int kerberos4_send P((Authenticator *));
86 void kerberos4_is P((Authenticator *, unsigned char *, int));
87 void kerberos4_reply P((Authenticator *, unsigned char *, int));
88 int kerberos4_status P((Authenticator *, char *, int));
89 void kerberos4_printsub P((unsigned char *, int, unsigned char *, int));
93 int kerberos5_init P((Authenticator *, int));
94 int kerberos5_send P((Authenticator *));
95 void kerberos5_is P((Authenticator *, unsigned char *, int));
96 void kerberos5_reply P((Authenticator *, unsigned char *, int));
97 int kerberos5_status P((Authenticator *, char *, int));
98 void kerberos5_printsub P((unsigned char *, int, unsigned char *, int));
101 int sra_init P((Authenticator *, int));
102 int sra_send P((Authenticator *));
103 void sra_is P((Authenticator *, unsigned char *, int));
104 void sra_reply P((Authenticator *, unsigned char *, int));
105 int sra_status P((Authenticator *, char *, int));
106 void sra_printsub P((unsigned char *, int, unsigned char *, int));