blob: 57907650480fcf62e16381452cb7b0400619739c [file] [log] [blame]
djm@openbsd.org06af3582019-09-03 08:29:15 +00001/* $OpenBSD: authfd.h,v 1.46 2019/09/03 08:29:15 djm Exp $ */
Ben Lindstrom05764b92002-03-05 01:53:02 +00002
Damien Millerd4a8b7e1999-10-27 13:42:43 +10003/*
Damien Miller95def091999-11-25 00:26:21 +11004 * Author: Tatu Ylonen <ylo@cs.hut.fi>
Damien Miller95def091999-11-25 00:26:21 +11005 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
Damien Miller95def091999-11-25 00:26:21 +11007 * Functions to interface with the SSH_AUTHENTICATION_FD socket.
Damien Miller4af51302000-04-16 11:18:38 +10008 *
Damien Millere4340be2000-09-16 13:29:08 +11009 * As far as I am concerned, the code I have written for this software
10 * can be used freely for any purpose. Any derived versions of this
11 * software must be clearly marked as such, and if the derived work is
12 * incompatible with the protocol description in the RFC file, it must be
13 * called by a name other than "ssh" or "Secure Shell".
Damien Miller95def091999-11-25 00:26:21 +110014 */
Damien Millerd4a8b7e1999-10-27 13:42:43 +100015
Damien Millerd4a8b7e1999-10-27 13:42:43 +100016#ifndef AUTHFD_H
17#define AUTHFD_H
18
djm@openbsd.org141efe42015-01-14 20:05:27 +000019/* List of identities returned by ssh_fetch_identitylist() */
20struct ssh_identitylist {
21 size_t nkeys;
22 struct sshkey **keys;
23 char **comments;
24};
25
26int ssh_get_authentication_socket(int *fdp);
27void ssh_close_authentication_socket(int sock);
28
29int ssh_lock_agent(int sock, int lock, const char *password);
naddy@openbsd.org3e371bd2017-05-05 10:42:49 +000030int ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp);
djm@openbsd.org141efe42015-01-14 20:05:27 +000031void ssh_free_identitylist(struct ssh_identitylist *idl);
djm@openbsd.org4f7a56d2019-06-21 04:21:04 +000032int ssh_add_identity_constrained(int sock, struct sshkey *key,
markus@openbsd.org1b11ea72018-02-23 15:58:37 +000033 const char *comment, u_int life, u_int confirm, u_int maxsign);
djm@openbsd.org06af3582019-09-03 08:29:15 +000034int ssh_agent_has_key(int sock, struct sshkey *key);
djm@openbsd.org141efe42015-01-14 20:05:27 +000035int ssh_remove_identity(int sock, struct sshkey *key);
36int ssh_update_card(int sock, int add, const char *reader_id,
37 const char *pin, u_int life, u_int confirm);
38int ssh_remove_all_identities(int sock, int version);
39
djm@openbsd.orga98339e2017-06-28 01:09:22 +000040int ssh_agent_sign(int sock, const struct sshkey *key,
djm@openbsd.org141efe42015-01-14 20:05:27 +000041 u_char **sigp, size_t *lenp,
markus@openbsd.org76c9fbb2015-12-04 16:41:28 +000042 const u_char *data, size_t datalen, const char *alg, u_int compat);
djm@openbsd.org141efe42015-01-14 20:05:27 +000043
Damien Millerd4a8b7e1999-10-27 13:42:43 +100044/* Messages for the authentication agent connection. */
45#define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1
46#define SSH_AGENT_RSA_IDENTITIES_ANSWER 2
47#define SSH_AGENTC_RSA_CHALLENGE 3
48#define SSH_AGENT_RSA_RESPONSE 4
49#define SSH_AGENT_FAILURE 5
50#define SSH_AGENT_SUCCESS 6
51#define SSH_AGENTC_ADD_RSA_IDENTITY 7
52#define SSH_AGENTC_REMOVE_RSA_IDENTITY 8
53#define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9
54
Damien Miller874d77b2000-10-14 16:23:11 +110055/* private OpenSSH extensions for SSH2 */
Damien Miller994cf142000-07-21 10:19:44 +100056#define SSH2_AGENTC_REQUEST_IDENTITIES 11
57#define SSH2_AGENT_IDENTITIES_ANSWER 12
58#define SSH2_AGENTC_SIGN_REQUEST 13
59#define SSH2_AGENT_SIGN_RESPONSE 14
Damien Miller994cf142000-07-21 10:19:44 +100060#define SSH2_AGENTC_ADD_IDENTITY 17
61#define SSH2_AGENTC_REMOVE_IDENTITY 18
62#define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19
63
Ben Lindstrom036a6b22001-07-04 03:50:02 +000064/* smartcard */
65#define SSH_AGENTC_ADD_SMARTCARD_KEY 20
Ben Lindstromcb72e4f2002-06-21 00:41:51 +000066#define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21
Ben Lindstrom036a6b22001-07-04 03:50:02 +000067
Ben Lindstrom2f717042002-06-06 21:52:03 +000068/* lock/unlock the agent */
69#define SSH_AGENTC_LOCK 22
Ben Lindstromcb72e4f2002-06-21 00:41:51 +000070#define SSH_AGENTC_UNLOCK 23
Ben Lindstrom2f717042002-06-06 21:52:03 +000071
Ben Lindstrom2b266b72002-06-21 00:08:39 +000072/* add key with constraints */
73#define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24
74#define SSH2_AGENTC_ADD_ID_CONSTRAINED 25
Damien Millerd94f20d2003-06-11 22:06:33 +100075#define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
Ben Lindstrom4eb4c4e2002-06-21 00:04:48 +000076
Ben Lindstromc90f8a92002-06-21 00:06:54 +000077#define SSH_AGENT_CONSTRAIN_LIFETIME 1
Damien Miller6c711792003-01-24 11:36:23 +110078#define SSH_AGENT_CONSTRAIN_CONFIRM 2
markus@openbsd.org1b11ea72018-02-23 15:58:37 +000079#define SSH_AGENT_CONSTRAIN_MAXSIGN 3
Ben Lindstrom61d328a2002-06-06 21:54:57 +000080
Ben Lindstromc9a26362001-08-15 23:04:50 +000081/* extended failure messages */
82#define SSH2_AGENT_FAILURE 30
83
Damien Miller874d77b2000-10-14 16:23:11 +110084/* additional error code for ssh.com's ssh-agent2 */
Ben Lindstromcb72e4f2002-06-21 00:41:51 +000085#define SSH_COM_AGENT2_FAILURE 102
Damien Miller874d77b2000-10-14 16:23:11 +110086
Damien Miller62cee002000-09-23 17:15:56 +110087#define SSH_AGENT_OLD_SIGNATURE 0x01
markus@openbsd.org76c9fbb2015-12-04 16:41:28 +000088#define SSH_AGENT_RSA_SHA2_256 0x02
89#define SSH_AGENT_RSA_SHA2_512 0x04
Damien Miller62cee002000-09-23 17:15:56 +110090
Damien Miller95def091999-11-25 00:26:21 +110091#endif /* AUTHFD_H */