HardenedBSD/crypto/openssh/ssh.h

106 lines
2.9 KiB
C
Raw Normal View History

2016-03-10 21:10:25 +01:00
/* $OpenBSD: ssh.h,v 1.83 2015/12/11 03:19:09 djm Exp $ */
2002-03-18 10:55:03 +01:00
2000-02-24 15:29:47 +01:00
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
2000-05-15 06:37:24 +02:00
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
2000-02-24 15:29:47 +01:00
*/
/* Cipher used for encrypting authentication files. */
#define SSH_AUTHFILE_CIPHER SSH_CIPHER_3DES
/* Default port number. */
#define SSH_DEFAULT_PORT 22
2016-03-10 21:10:25 +01:00
/*
* Maximum number of certificate files that can be specified
* in configuration files or on the command line.
*/
#define SSH_MAX_CERTIFICATE_FILES 100
2000-02-24 15:29:47 +01:00
/*
* Maximum number of RSA authentication identity files that can be specified
* in configuration files or on the command line.
*/
#define SSH_MAX_IDENTITY_FILES 100
2005-06-05 17:40:50 +02:00
/*
* Maximum length of lines in authorized_keys file.
* Current value permits 16kbit RSA and RSA1 keys and 8kbit DSA keys, with
* some room for options and comments.
*/
2016-03-10 21:10:25 +01:00
#define SSH_MAX_PUBKEY_BYTES 16384
2005-06-05 17:40:50 +02:00
2000-02-24 15:29:47 +01:00
/*
2002-06-23 16:01:54 +02:00
* Major protocol version. Different version indicates major incompatibility
2000-02-24 15:29:47 +01:00
* that prevents communication.
2000-05-15 06:37:24 +02:00
*
2000-02-24 15:29:47 +01:00
* Minor protocol version. Different version indicates minor incompatibility
* that does not prevent interoperation.
*/
2000-05-15 06:37:24 +02:00
#define PROTOCOL_MAJOR_1 1
#define PROTOCOL_MINOR_1 5
/* We support both SSH1 and SSH2 */
#define PROTOCOL_MAJOR_2 2
#define PROTOCOL_MINOR_2 0
2000-02-24 15:29:47 +01:00
/*
* Name for the service. The port named by this service overrides the
* default port if present.
*/
#define SSH_SERVICE_NAME "ssh"
/*
2002-06-29 13:34:13 +02:00
* Name of the environment variable containing the process ID of the
* authentication agent.
2000-02-24 15:29:47 +01:00
*/
#define SSH_AGENTPID_ENV_NAME "SSH_AGENT_PID"
2000-02-24 15:29:47 +01:00
/*
* Name of the environment variable containing the pathname of the
* authentication socket.
*/
#define SSH_AUTHSOCKET_ENV_NAME "SSH_AUTH_SOCK"
2000-02-24 15:29:47 +01:00
/*
* Environment variable for overwriting the default location of askpass
2000-02-24 15:29:47 +01:00
*/
#define SSH_ASKPASS_ENV "SSH_ASKPASS"
/*
* Force host key length and server key length to differ by at least this
* many bits. This is to make double encryption with rsaref work.
*/
#define SSH_KEY_BITS_RESERVED 128
/*
* Length of the session key in bytes. (Specified as 256 bits in the
* protocol.)
*/
#define SSH_SESSION_KEY_LENGTH 32
2002-03-18 10:55:03 +01:00
/* Used to identify ``EscapeChar none'' */
#define SSH_ESCAPECHAR_NONE -2
2002-06-23 16:01:54 +02:00
/*
* unprivileged user when UsePrivilegeSeparation=yes;
* sshd will change its privileges to this user and its
* primary group.
*/
2002-06-28 00:31:32 +02:00
#ifndef SSH_PRIVSEP_USER
2002-06-23 16:01:54 +02:00
#define SSH_PRIVSEP_USER "sshd"
2002-06-28 00:31:32 +02:00
#endif
2002-06-23 16:01:54 +02:00
/* Minimum modulus size (n) for RSA keys. */
#define SSH_RSA_MINIMUM_MODULUS_SIZE 768
2004-02-26 11:38:49 +01:00
/* Listen backlog for sshd, ssh-agent and forwarding sockets */
#define SSH_LISTEN_BACKLOG 128