djm@openbsd.org | 40be78f | 2019-12-21 02:19:13 +0000 | [diff] [blame^] | 1 | /* $OpenBSD: authfd.h,v 1.48 2019/12/21 02:19:13 djm Exp $ */ |
Ben Lindstrom | 05764b9 | 2002-03-05 01:53:02 +0000 | [diff] [blame] | 2 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 3 | /* |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 5 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 6 | * All rights reserved |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 7 | * Functions to interface with the SSH_AUTHENTICATION_FD socket. |
Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 8 | * |
Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 9 | * As far as I am concerned, the code I have written for this software |
| 10 | * can be used freely for any purpose. Any derived versions of this |
| 11 | * software must be clearly marked as such, and if the derived work is |
| 12 | * incompatible with the protocol description in the RFC file, it must be |
| 13 | * called by a name other than "ssh" or "Secure Shell". |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 14 | */ |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 15 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 16 | #ifndef AUTHFD_H |
| 17 | #define AUTHFD_H |
| 18 | |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 19 | /* List of identities returned by ssh_fetch_identitylist() */ |
| 20 | struct ssh_identitylist { |
| 21 | size_t nkeys; |
| 22 | struct sshkey **keys; |
| 23 | char **comments; |
| 24 | }; |
| 25 | |
| 26 | int ssh_get_authentication_socket(int *fdp); |
djm@openbsd.org | 40be78f | 2019-12-21 02:19:13 +0000 | [diff] [blame^] | 27 | int ssh_get_authentication_socket_path(const char *authsocket, int *fdp); |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 28 | void ssh_close_authentication_socket(int sock); |
| 29 | |
| 30 | int ssh_lock_agent(int sock, int lock, const char *password); |
naddy@openbsd.org | 3e371bd | 2017-05-05 10:42:49 +0000 | [diff] [blame] | 31 | int ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp); |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 32 | void ssh_free_identitylist(struct ssh_identitylist *idl); |
djm@openbsd.org | 4f7a56d | 2019-06-21 04:21:04 +0000 | [diff] [blame] | 33 | int ssh_add_identity_constrained(int sock, struct sshkey *key, |
djm@openbsd.org | b9dd14d | 2019-10-31 21:19:14 +0000 | [diff] [blame] | 34 | const char *comment, u_int life, u_int confirm, u_int maxsign, |
| 35 | const char *provider); |
djm@openbsd.org | 06af358 | 2019-09-03 08:29:15 +0000 | [diff] [blame] | 36 | int ssh_agent_has_key(int sock, struct sshkey *key); |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 37 | int ssh_remove_identity(int sock, struct sshkey *key); |
| 38 | int ssh_update_card(int sock, int add, const char *reader_id, |
| 39 | const char *pin, u_int life, u_int confirm); |
| 40 | int ssh_remove_all_identities(int sock, int version); |
| 41 | |
djm@openbsd.org | a98339e | 2017-06-28 01:09:22 +0000 | [diff] [blame] | 42 | int ssh_agent_sign(int sock, const struct sshkey *key, |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 43 | u_char **sigp, size_t *lenp, |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 44 | const u_char *data, size_t datalen, const char *alg, u_int compat); |
djm@openbsd.org | 141efe4 | 2015-01-14 20:05:27 +0000 | [diff] [blame] | 45 | |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 46 | /* Messages for the authentication agent connection. */ |
| 47 | #define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1 |
| 48 | #define SSH_AGENT_RSA_IDENTITIES_ANSWER 2 |
| 49 | #define SSH_AGENTC_RSA_CHALLENGE 3 |
| 50 | #define SSH_AGENT_RSA_RESPONSE 4 |
| 51 | #define SSH_AGENT_FAILURE 5 |
| 52 | #define SSH_AGENT_SUCCESS 6 |
| 53 | #define SSH_AGENTC_ADD_RSA_IDENTITY 7 |
| 54 | #define SSH_AGENTC_REMOVE_RSA_IDENTITY 8 |
| 55 | #define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9 |
| 56 | |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 57 | /* private OpenSSH extensions for SSH2 */ |
Damien Miller | 994cf14 | 2000-07-21 10:19:44 +1000 | [diff] [blame] | 58 | #define SSH2_AGENTC_REQUEST_IDENTITIES 11 |
| 59 | #define SSH2_AGENT_IDENTITIES_ANSWER 12 |
| 60 | #define SSH2_AGENTC_SIGN_REQUEST 13 |
| 61 | #define SSH2_AGENT_SIGN_RESPONSE 14 |
Damien Miller | 994cf14 | 2000-07-21 10:19:44 +1000 | [diff] [blame] | 62 | #define SSH2_AGENTC_ADD_IDENTITY 17 |
| 63 | #define SSH2_AGENTC_REMOVE_IDENTITY 18 |
| 64 | #define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19 |
| 65 | |
Ben Lindstrom | 036a6b2 | 2001-07-04 03:50:02 +0000 | [diff] [blame] | 66 | /* smartcard */ |
| 67 | #define SSH_AGENTC_ADD_SMARTCARD_KEY 20 |
Ben Lindstrom | cb72e4f | 2002-06-21 00:41:51 +0000 | [diff] [blame] | 68 | #define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21 |
Ben Lindstrom | 036a6b2 | 2001-07-04 03:50:02 +0000 | [diff] [blame] | 69 | |
Ben Lindstrom | 2f71704 | 2002-06-06 21:52:03 +0000 | [diff] [blame] | 70 | /* lock/unlock the agent */ |
| 71 | #define SSH_AGENTC_LOCK 22 |
Ben Lindstrom | cb72e4f | 2002-06-21 00:41:51 +0000 | [diff] [blame] | 72 | #define SSH_AGENTC_UNLOCK 23 |
Ben Lindstrom | 2f71704 | 2002-06-06 21:52:03 +0000 | [diff] [blame] | 73 | |
Ben Lindstrom | 2b266b7 | 2002-06-21 00:08:39 +0000 | [diff] [blame] | 74 | /* add key with constraints */ |
| 75 | #define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24 |
| 76 | #define SSH2_AGENTC_ADD_ID_CONSTRAINED 25 |
Damien Miller | d94f20d | 2003-06-11 22:06:33 +1000 | [diff] [blame] | 77 | #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26 |
Ben Lindstrom | 4eb4c4e | 2002-06-21 00:04:48 +0000 | [diff] [blame] | 78 | |
Ben Lindstrom | c90f8a9 | 2002-06-21 00:06:54 +0000 | [diff] [blame] | 79 | #define SSH_AGENT_CONSTRAIN_LIFETIME 1 |
Damien Miller | 6c71179 | 2003-01-24 11:36:23 +1100 | [diff] [blame] | 80 | #define SSH_AGENT_CONSTRAIN_CONFIRM 2 |
markus@openbsd.org | 1b11ea7 | 2018-02-23 15:58:37 +0000 | [diff] [blame] | 81 | #define SSH_AGENT_CONSTRAIN_MAXSIGN 3 |
djm@openbsd.org | b9dd14d | 2019-10-31 21:19:14 +0000 | [diff] [blame] | 82 | #define SSH_AGENT_CONSTRAIN_EXTENSION 255 |
Ben Lindstrom | 61d328a | 2002-06-06 21:54:57 +0000 | [diff] [blame] | 83 | |
Ben Lindstrom | c9a2636 | 2001-08-15 23:04:50 +0000 | [diff] [blame] | 84 | /* extended failure messages */ |
| 85 | #define SSH2_AGENT_FAILURE 30 |
| 86 | |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 87 | /* additional error code for ssh.com's ssh-agent2 */ |
Ben Lindstrom | cb72e4f | 2002-06-21 00:41:51 +0000 | [diff] [blame] | 88 | #define SSH_COM_AGENT2_FAILURE 102 |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 89 | |
Damien Miller | 62cee00 | 2000-09-23 17:15:56 +1100 | [diff] [blame] | 90 | #define SSH_AGENT_OLD_SIGNATURE 0x01 |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 91 | #define SSH_AGENT_RSA_SHA2_256 0x02 |
| 92 | #define SSH_AGENT_RSA_SHA2_512 0x04 |
Damien Miller | 62cee00 | 2000-09-23 17:15:56 +1100 | [diff] [blame] | 93 | |
Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 94 | #endif /* AUTHFD_H */ |