blob: 04439fd07e43968b7dcaa2fd5e781ce7b63ea547 [file] [log] [blame]
Damien Millerd4a8b7e1999-10-27 13:42:43 +10001/*
Damien Miller95def091999-11-25 00:26:21 +11002 * Author: Tatu Ylonen <ylo@cs.hut.fi>
Damien Miller95def091999-11-25 00:26:21 +11003 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved
Damien Miller95def091999-11-25 00:26:21 +11005 * Functions to interface with the SSH_AUTHENTICATION_FD socket.
Damien Miller4af51302000-04-16 11:18:38 +10006 *
Damien Millere4340be2000-09-16 13:29:08 +11007 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
Damien Miller95def091999-11-25 00:26:21 +110012 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100013
Ben Lindstrom036a6b22001-07-04 03:50:02 +000014/* RCSID("$OpenBSD: authfd.h,v 1.17 2001/06/26 04:59:59 markus Exp $"); */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100015
16#ifndef AUTHFD_H
17#define AUTHFD_H
18
19#include "buffer.h"
20
21/* Messages for the authentication agent connection. */
22#define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1
23#define SSH_AGENT_RSA_IDENTITIES_ANSWER 2
24#define SSH_AGENTC_RSA_CHALLENGE 3
25#define SSH_AGENT_RSA_RESPONSE 4
26#define SSH_AGENT_FAILURE 5
27#define SSH_AGENT_SUCCESS 6
28#define SSH_AGENTC_ADD_RSA_IDENTITY 7
29#define SSH_AGENTC_REMOVE_RSA_IDENTITY 8
30#define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9
31
Damien Miller874d77b2000-10-14 16:23:11 +110032/* private OpenSSH extensions for SSH2 */
Damien Miller994cf142000-07-21 10:19:44 +100033#define SSH2_AGENTC_REQUEST_IDENTITIES 11
34#define SSH2_AGENT_IDENTITIES_ANSWER 12
35#define SSH2_AGENTC_SIGN_REQUEST 13
36#define SSH2_AGENT_SIGN_RESPONSE 14
Damien Miller994cf142000-07-21 10:19:44 +100037#define SSH2_AGENTC_ADD_IDENTITY 17
38#define SSH2_AGENTC_REMOVE_IDENTITY 18
39#define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19
40
Ben Lindstrom036a6b22001-07-04 03:50:02 +000041/* smartcard */
42#define SSH_AGENTC_ADD_SMARTCARD_KEY 20
43#define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21
44
Damien Miller874d77b2000-10-14 16:23:11 +110045/* additional error code for ssh.com's ssh-agent2 */
46#define SSH_COM_AGENT2_FAILURE 102
47
Damien Miller62cee002000-09-23 17:15:56 +110048#define SSH_AGENT_OLD_SIGNATURE 0x01
49
50
Damien Miller95def091999-11-25 00:26:21 +110051typedef struct {
52 int fd;
Damien Miller95def091999-11-25 00:26:21 +110053 Buffer identities;
54 int howmany;
55} AuthenticationConnection;
Damien Millerad833b32000-08-23 10:46:23 +100056
Damien Millerd4a8b7e1999-10-27 13:42:43 +100057/* Returns the number of the authentication fd, or -1 if there is none. */
Ben Lindstrom46c16222000-12-22 01:43:59 +000058int ssh_get_authentication_socket(void);
Damien Millerd4a8b7e1999-10-27 13:42:43 +100059
Damien Miller5428f641999-11-25 11:54:57 +110060/*
61 * This should be called for any descriptor returned by
62 * ssh_get_authentication_socket(). Depending on the way the descriptor was
63 * obtained, this may close the descriptor.
64 */
Damien Miller95def091999-11-25 00:26:21 +110065void ssh_close_authentication_socket(int authfd);
Damien Millerd4a8b7e1999-10-27 13:42:43 +100066
Damien Miller5428f641999-11-25 11:54:57 +110067/*
68 * Opens and connects a private socket for communication with the
69 * authentication agent. Returns NULL if an error occurred and the
70 * connection could not be opened. The connection should be closed by the
71 * caller by calling ssh_close_authentication_connection().
72 */
Ben Lindstrom46c16222000-12-22 01:43:59 +000073AuthenticationConnection *ssh_get_authentication_connection(void);
Damien Millerd4a8b7e1999-10-27 13:42:43 +100074
Damien Miller5428f641999-11-25 11:54:57 +110075/*
76 * Closes the connection to the authentication agent and frees any associated
77 * memory.
78 */
Damien Millerad833b32000-08-23 10:46:23 +100079void ssh_close_authentication_connection(AuthenticationConnection *auth);
Damien Millerd4a8b7e1999-10-27 13:42:43 +100080
Damien Miller5428f641999-11-25 11:54:57 +110081/*
Damien Miller0bc1bd82000-11-13 22:57:25 +110082 * Returns the number authentication identity held by the agent.
83 */
84int ssh_get_num_identities(AuthenticationConnection *auth, int version);
85
86/*
Damien Millerad833b32000-08-23 10:46:23 +100087 * Returns the first authentication identity held by the agent or NULL if
88 * no identies are available. Caller must free comment and key.
89 * Note that you cannot mix calls with different versions.
Damien Miller5428f641999-11-25 11:54:57 +110090 */
Damien Millerad833b32000-08-23 10:46:23 +100091Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version);
Damien Millerd4a8b7e1999-10-27 13:42:43 +100092
Damien Miller5428f641999-11-25 11:54:57 +110093/*
94 * Returns the next authentication identity for the agent. Other functions
95 * can be called between this and ssh_get_first_identity or two calls of this
Damien Millerad833b32000-08-23 10:46:23 +100096 * function. This returns NULL if there are no more identities. The caller
97 * must free key and comment after a successful return.
98 */
99Key *ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version);
100
101/*
102 * Requests the agent to decrypt the given challenge. Returns true if the
103 * agent claims it was able to decrypt it.
Damien Miller5428f641999-11-25 11:54:57 +1100104 */
Damien Miller4af51302000-04-16 11:18:38 +1000105int
Damien Millerad833b32000-08-23 10:46:23 +1000106ssh_decrypt_challenge(AuthenticationConnection *auth,
107 Key *key, BIGNUM * challenge,
Ben Lindstrom46c16222000-12-22 01:43:59 +0000108 u_char session_id[16],
109 u_int response_type,
110 u_char response[16]);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000111
Damien Millerad833b32000-08-23 10:46:23 +1000112/* Requests the agent to sign data using key */
113int
114ssh_agent_sign(AuthenticationConnection *auth,
115 Key *key,
Ben Lindstrom46c16222000-12-22 01:43:59 +0000116 u_char **sigp, int *lenp,
117 u_char *data, int datalen);
Damien Millerad833b32000-08-23 10:46:23 +1000118
Damien Miller5428f641999-11-25 11:54:57 +1100119/*
120 * Adds an identity to the authentication server. This call is not meant to
121 * be used by normal applications. This returns true if the identity was
122 * successfully added.
123 */
Damien Miller4af51302000-04-16 11:18:38 +1000124int
Damien Millerad833b32000-08-23 10:46:23 +1000125ssh_add_identity(AuthenticationConnection *auth, Key *key,
Damien Miller5428f641999-11-25 11:54:57 +1100126 const char *comment);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000127
Damien Miller5428f641999-11-25 11:54:57 +1100128/*
129 * Removes the identity from the authentication server. This call is not
130 * meant to be used by normal applications. This returns true if the
131 * identity was successfully added.
132 */
Damien Millerad833b32000-08-23 10:46:23 +1000133int ssh_remove_identity(AuthenticationConnection *auth, Key *key);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000134
Damien Miller5428f641999-11-25 11:54:57 +1100135/*
136 * Removes all identities from the authentication agent. This call is not
137 * meant to be used by normal applications. This returns true if the
138 * operation was successful.
139 */
Ben Lindstrom036a6b22001-07-04 03:50:02 +0000140int ssh_remove_all_identities(AuthenticationConnection *auth, int version);
141
142int ssh_update_card(AuthenticationConnection *auth, int add, int reader_id);
Damien Millerd4a8b7e1999-10-27 13:42:43 +1000143
Damien Miller95def091999-11-25 00:26:21 +1100144#endif /* AUTHFD_H */