1*ba1276acSMatthew Dillon /* $OpenBSD: authfd.h,v 1.52 2023/12/18 14:46:56 djm Exp $ */ 218de8d7fSPeter Avalos 318de8d7fSPeter Avalos /* 418de8d7fSPeter Avalos * Author: Tatu Ylonen <ylo@cs.hut.fi> 518de8d7fSPeter Avalos * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 618de8d7fSPeter Avalos * All rights reserved 718de8d7fSPeter Avalos * Functions to interface with the SSH_AUTHENTICATION_FD socket. 818de8d7fSPeter Avalos * 918de8d7fSPeter Avalos * As far as I am concerned, the code I have written for this software 1018de8d7fSPeter Avalos * can be used freely for any purpose. Any derived versions of this 1118de8d7fSPeter Avalos * software must be clearly marked as such, and if the derived work is 1218de8d7fSPeter Avalos * incompatible with the protocol description in the RFC file, it must be 1318de8d7fSPeter Avalos * called by a name other than "ssh" or "Secure Shell". 1418de8d7fSPeter Avalos */ 1518de8d7fSPeter Avalos 1618de8d7fSPeter Avalos #ifndef AUTHFD_H 1718de8d7fSPeter Avalos #define AUTHFD_H 1818de8d7fSPeter Avalos 19ee116499SAntonio Huete Jimenez struct sshbuf; 20ee116499SAntonio Huete Jimenez struct sshkey; 21ee116499SAntonio Huete Jimenez 22e9778795SPeter Avalos /* List of identities returned by ssh_fetch_identitylist() */ 23e9778795SPeter Avalos struct ssh_identitylist { 24e9778795SPeter Avalos size_t nkeys; 25e9778795SPeter Avalos struct sshkey **keys; 26e9778795SPeter Avalos char **comments; 27e9778795SPeter Avalos }; 28e9778795SPeter Avalos 29ee116499SAntonio Huete Jimenez /* Key destination restrictions */ 30ee116499SAntonio Huete Jimenez struct dest_constraint_hop { 31ee116499SAntonio Huete Jimenez char *user; /* wildcards allowed */ 32ee116499SAntonio Huete Jimenez char *hostname; /* used to matching cert principals and for display */ 33ee116499SAntonio Huete Jimenez int is_ca; 34ee116499SAntonio Huete Jimenez u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ 35ee116499SAntonio Huete Jimenez struct sshkey **keys; 36ee116499SAntonio Huete Jimenez int *key_is_ca; 37ee116499SAntonio Huete Jimenez }; 38ee116499SAntonio Huete Jimenez struct dest_constraint { 39ee116499SAntonio Huete Jimenez struct dest_constraint_hop from; 40ee116499SAntonio Huete Jimenez struct dest_constraint_hop to; 41ee116499SAntonio Huete Jimenez }; 42ee116499SAntonio Huete Jimenez 43e9778795SPeter Avalos int ssh_get_authentication_socket(int *fdp); 440cbfa66cSDaniel Fojt int ssh_get_authentication_socket_path(const char *authsocket, int *fdp); 45e9778795SPeter Avalos void ssh_close_authentication_socket(int sock); 46e9778795SPeter Avalos 47e9778795SPeter Avalos int ssh_lock_agent(int sock, int lock, const char *password); 48ce74bacaSMatthew Dillon int ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp); 49e9778795SPeter Avalos void ssh_free_identitylist(struct ssh_identitylist *idl); 500cbfa66cSDaniel Fojt int ssh_add_identity_constrained(int sock, struct sshkey *key, 510cbfa66cSDaniel Fojt const char *comment, u_int life, u_int confirm, u_int maxsign, 52ee116499SAntonio Huete Jimenez const char *provider, struct dest_constraint **dest_constraints, 53ee116499SAntonio Huete Jimenez size_t ndest_constraints); 5450a69bb5SSascha Wildner int ssh_agent_has_key(int sock, const struct sshkey *key); 5550a69bb5SSascha Wildner int ssh_remove_identity(int sock, const struct sshkey *key); 56e9778795SPeter Avalos int ssh_update_card(int sock, int add, const char *reader_id, 57ee116499SAntonio Huete Jimenez const char *pin, u_int life, u_int confirm, 58ee116499SAntonio Huete Jimenez struct dest_constraint **dest_constraints, 59*ba1276acSMatthew Dillon size_t ndest_constraints, 60*ba1276acSMatthew Dillon int cert_only, struct sshkey **certs, size_t ncerts); 61e9778795SPeter Avalos int ssh_remove_all_identities(int sock, int version); 62e9778795SPeter Avalos 63ce74bacaSMatthew Dillon int ssh_agent_sign(int sock, const struct sshkey *key, 64e9778795SPeter Avalos u_char **sigp, size_t *lenp, 65e9778795SPeter Avalos const u_char *data, size_t datalen, const char *alg, u_int compat); 66e9778795SPeter Avalos 67ee116499SAntonio Huete Jimenez int ssh_agent_bind_hostkey(int sock, const struct sshkey *key, 68ee116499SAntonio Huete Jimenez const struct sshbuf *session_id, const struct sshbuf *signature, 69ee116499SAntonio Huete Jimenez int forwarding); 70ee116499SAntonio Huete Jimenez 7118de8d7fSPeter Avalos /* Messages for the authentication agent connection. */ 7218de8d7fSPeter Avalos #define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1 7318de8d7fSPeter Avalos #define SSH_AGENT_RSA_IDENTITIES_ANSWER 2 7418de8d7fSPeter Avalos #define SSH_AGENTC_RSA_CHALLENGE 3 7518de8d7fSPeter Avalos #define SSH_AGENT_RSA_RESPONSE 4 7618de8d7fSPeter Avalos #define SSH_AGENT_FAILURE 5 7718de8d7fSPeter Avalos #define SSH_AGENT_SUCCESS 6 7818de8d7fSPeter Avalos #define SSH_AGENTC_ADD_RSA_IDENTITY 7 7918de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_RSA_IDENTITY 8 8018de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9 8118de8d7fSPeter Avalos 8218de8d7fSPeter Avalos /* private OpenSSH extensions for SSH2 */ 8318de8d7fSPeter Avalos #define SSH2_AGENTC_REQUEST_IDENTITIES 11 8418de8d7fSPeter Avalos #define SSH2_AGENT_IDENTITIES_ANSWER 12 8518de8d7fSPeter Avalos #define SSH2_AGENTC_SIGN_REQUEST 13 8618de8d7fSPeter Avalos #define SSH2_AGENT_SIGN_RESPONSE 14 8718de8d7fSPeter Avalos #define SSH2_AGENTC_ADD_IDENTITY 17 8818de8d7fSPeter Avalos #define SSH2_AGENTC_REMOVE_IDENTITY 18 8918de8d7fSPeter Avalos #define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19 9018de8d7fSPeter Avalos 9118de8d7fSPeter Avalos /* smartcard */ 9218de8d7fSPeter Avalos #define SSH_AGENTC_ADD_SMARTCARD_KEY 20 9318de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21 9418de8d7fSPeter Avalos 9518de8d7fSPeter Avalos /* lock/unlock the agent */ 9618de8d7fSPeter Avalos #define SSH_AGENTC_LOCK 22 9718de8d7fSPeter Avalos #define SSH_AGENTC_UNLOCK 23 9818de8d7fSPeter Avalos 9918de8d7fSPeter Avalos /* add key with constraints */ 10018de8d7fSPeter Avalos #define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24 10118de8d7fSPeter Avalos #define SSH2_AGENTC_ADD_ID_CONSTRAINED 25 10218de8d7fSPeter Avalos #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26 10318de8d7fSPeter Avalos 104ee116499SAntonio Huete Jimenez /* generic extension mechanism */ 105ee116499SAntonio Huete Jimenez #define SSH_AGENTC_EXTENSION 27 106ee116499SAntonio Huete Jimenez 10718de8d7fSPeter Avalos #define SSH_AGENT_CONSTRAIN_LIFETIME 1 10818de8d7fSPeter Avalos #define SSH_AGENT_CONSTRAIN_CONFIRM 2 109664f4763Szrj #define SSH_AGENT_CONSTRAIN_MAXSIGN 3 1100cbfa66cSDaniel Fojt #define SSH_AGENT_CONSTRAIN_EXTENSION 255 11118de8d7fSPeter Avalos 11218de8d7fSPeter Avalos /* extended failure messages */ 11318de8d7fSPeter Avalos #define SSH2_AGENT_FAILURE 30 11418de8d7fSPeter Avalos 11518de8d7fSPeter Avalos /* additional error code for ssh.com's ssh-agent2 */ 11618de8d7fSPeter Avalos #define SSH_COM_AGENT2_FAILURE 102 11718de8d7fSPeter Avalos 11818de8d7fSPeter Avalos #define SSH_AGENT_OLD_SIGNATURE 0x01 119e9778795SPeter Avalos #define SSH_AGENT_RSA_SHA2_256 0x02 120e9778795SPeter Avalos #define SSH_AGENT_RSA_SHA2_512 0x04 12118de8d7fSPeter Avalos 12218de8d7fSPeter Avalos #endif /* AUTHFD_H */ 123