/usr/include/proftpd/auth.h is in proftpd-dev 1.3.5e-1build1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 | /*
* ProFTPD - FTP server daemon
* Copyright (c) 2004-2011 The ProFTPD Project team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Suite 500, Boston, MA 02110-1335, USA.
*
* As a special exemption, the ProFTPD Project and other respective copyright
* holders give permission to link this program with OpenSSL, and distribute
* the resulting executable, without including the source code for OpenSSL in
* the source distribution.
*/
/* ProFTPD Auth API
* $Id: auth.h,v 1.14 2011-05-23 20:35:35 castaglia Exp $
*/
#ifndef PR_AUTH_H
#define PR_AUTH_H
/* Possible return codes for auth handlers
*/
/* Account authenticated by means other than PASS (e.g. RFC2228 modules).
* This value is more generic than PR_AUTH_RFC2228_OK.
*/
#define PR_AUTH_OK_NO_PASS 3
/* Account authenticated by RFC2228 security data exchange */
#define PR_AUTH_RFC2228_OK 2
/* Account authenticated normally */
#define PR_AUTH_OK 0
/* Error occurred in auth handler */
#define PR_AUTH_ERROR -1
/* Account does not exist */
#define PR_AUTH_NOPWD -2
/* Password mismatch */
#define PR_AUTH_BADPWD -3
/* Password hasn't been changed recently enough */
#define PR_AUTH_AGEPWD -4
/* Account has been disabled */
#define PR_AUTH_DISABLEDPWD -5
void pr_auth_setpwent(pool *);
void pr_auth_endpwent(pool *);
void pr_auth_setgrent(pool *);
void pr_auth_endgrent(pool *);
struct passwd *pr_auth_getpwent(pool *);
struct group *pr_auth_getgrent(pool *);
struct passwd *pr_auth_getpwnam(pool *, const char *);
struct passwd *pr_auth_getpwuid(pool *, uid_t);
struct group *pr_auth_getgrnam(pool *, const char *);
struct group *pr_auth_getgrgid(pool *, gid_t);
int pr_auth_authenticate(pool *, const char *, const char *);
int pr_auth_authorize(pool *, const char *);
int pr_auth_check(pool *, const char *, const char *, const char *);
const char *pr_auth_uid2name(pool *, uid_t);
const char *pr_auth_gid2name(pool *, gid_t);
uid_t pr_auth_name2uid(pool *, const char *);
gid_t pr_auth_name2gid(pool *, const char *);
int pr_auth_getgroups(pool *, const char *, array_header **, array_header **);
int pr_auth_requires_pass(pool *, const char *);
/* This is a convenience function used by mod_auth as part of the
* authentication process. Given a user name, retrieve the <Anonymous>
* configuration for that user. If the user name is not be handled as
* an anonymous login, NULL is returned.
*/
config_rec *pr_auth_get_anon_config(pool *p, char **, char **, char **);
/* Wrapper function around the chroot(2) system call, handles setting of
* appropriate environment variables if necessary.
*/
int pr_auth_chroot(const char *);
/* Check the /etc/ftpusers file, as per the UseFtpUsers directive, to see
* if the given user is allowed. Returns TRUE if the user is banned by
* /etc/ftpusers, FALSE if not banned, and -1 if there was an error.
*/
int pr_auth_banned_by_ftpusers(xaset_t *, const char *);
/* Check the /etc/shells file, as per the RequireValidShell directive, to
* ensure that the given shell is valid. Returns TRUE if the user has
* a valid shell, FALSE if an invalid shell, and -1 if there was an error.
*/
int pr_auth_is_valid_shell(xaset_t *, const char *);
/* Add to the list of authenticating-only modules (e.g. PAM). */
int pr_auth_add_auth_only_module(const char *);
/* Remove the named module from the list of authenticating-only modules. */
int pr_auth_remove_auth_only_module(const char *);
/* Clear the authenticating-only module list, e.g. when authentication has
* completed.
*/
int pr_auth_clear_auth_only_modules(void);
/* Enable caching of certain data within the Auth API. */
int pr_auth_cache_set(int, unsigned int);
#define PR_AUTH_CACHE_FL_UID2NAME 0x00001
#define PR_AUTH_CACHE_FL_GID2NAME 0x00002
#define PR_AUTH_CACHE_FL_AUTH_MODULE 0x00004
/* Wrapper function for retrieving the user's home directory. This handles
* any possible RewriteHome configuration.
*/
char *pr_auth_get_home(pool *, char *pw_dir);
/* For internal use only. */
int init_auth(void);
int set_groups(pool *, gid_t, array_header *);
#endif /* PR_MODULES_H */
|