xref: /dflybsd-src/crypto/openssh/authfd.h (revision ba1276acd1c8c22d225b1bcf370a14c878644f44)
1*ba1276acSMatthew Dillon /* $OpenBSD: authfd.h,v 1.52 2023/12/18 14:46:56 djm Exp $ */
218de8d7fSPeter Avalos 
318de8d7fSPeter Avalos /*
418de8d7fSPeter Avalos  * Author: Tatu Ylonen <ylo@cs.hut.fi>
518de8d7fSPeter Avalos  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
618de8d7fSPeter Avalos  *                    All rights reserved
718de8d7fSPeter Avalos  * Functions to interface with the SSH_AUTHENTICATION_FD socket.
818de8d7fSPeter Avalos  *
918de8d7fSPeter Avalos  * As far as I am concerned, the code I have written for this software
1018de8d7fSPeter Avalos  * can be used freely for any purpose.  Any derived versions of this
1118de8d7fSPeter Avalos  * software must be clearly marked as such, and if the derived work is
1218de8d7fSPeter Avalos  * incompatible with the protocol description in the RFC file, it must be
1318de8d7fSPeter Avalos  * called by a name other than "ssh" or "Secure Shell".
1418de8d7fSPeter Avalos  */
1518de8d7fSPeter Avalos 
1618de8d7fSPeter Avalos #ifndef AUTHFD_H
1718de8d7fSPeter Avalos #define AUTHFD_H
1818de8d7fSPeter Avalos 
19ee116499SAntonio Huete Jimenez struct sshbuf;
20ee116499SAntonio Huete Jimenez struct sshkey;
21ee116499SAntonio Huete Jimenez 
22e9778795SPeter Avalos /* List of identities returned by ssh_fetch_identitylist() */
23e9778795SPeter Avalos struct ssh_identitylist {
24e9778795SPeter Avalos 	size_t nkeys;
25e9778795SPeter Avalos 	struct sshkey **keys;
26e9778795SPeter Avalos 	char **comments;
27e9778795SPeter Avalos };
28e9778795SPeter Avalos 
29ee116499SAntonio Huete Jimenez /* Key destination restrictions */
30ee116499SAntonio Huete Jimenez struct dest_constraint_hop {
31ee116499SAntonio Huete Jimenez 	char *user;	/* wildcards allowed */
32ee116499SAntonio Huete Jimenez 	char *hostname; /* used to matching cert principals and for display */
33ee116499SAntonio Huete Jimenez 	int is_ca;
34ee116499SAntonio Huete Jimenez 	u_int nkeys;	/* number of entries in *both* 'keys' and 'key_is_ca' */
35ee116499SAntonio Huete Jimenez 	struct sshkey **keys;
36ee116499SAntonio Huete Jimenez 	int *key_is_ca;
37ee116499SAntonio Huete Jimenez };
38ee116499SAntonio Huete Jimenez struct dest_constraint {
39ee116499SAntonio Huete Jimenez 	struct dest_constraint_hop from;
40ee116499SAntonio Huete Jimenez 	struct dest_constraint_hop to;
41ee116499SAntonio Huete Jimenez };
42ee116499SAntonio Huete Jimenez 
43e9778795SPeter Avalos int	ssh_get_authentication_socket(int *fdp);
440cbfa66cSDaniel Fojt int	ssh_get_authentication_socket_path(const char *authsocket, int *fdp);
45e9778795SPeter Avalos void	ssh_close_authentication_socket(int sock);
46e9778795SPeter Avalos 
47e9778795SPeter Avalos int	ssh_lock_agent(int sock, int lock, const char *password);
48ce74bacaSMatthew Dillon int	ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp);
49e9778795SPeter Avalos void	ssh_free_identitylist(struct ssh_identitylist *idl);
500cbfa66cSDaniel Fojt int	ssh_add_identity_constrained(int sock, struct sshkey *key,
510cbfa66cSDaniel Fojt     const char *comment, u_int life, u_int confirm, u_int maxsign,
52ee116499SAntonio Huete Jimenez     const char *provider, struct dest_constraint **dest_constraints,
53ee116499SAntonio Huete Jimenez     size_t ndest_constraints);
5450a69bb5SSascha Wildner int	ssh_agent_has_key(int sock, const struct sshkey *key);
5550a69bb5SSascha Wildner int	ssh_remove_identity(int sock, const struct sshkey *key);
56e9778795SPeter Avalos int	ssh_update_card(int sock, int add, const char *reader_id,
57ee116499SAntonio Huete Jimenez 	    const char *pin, u_int life, u_int confirm,
58ee116499SAntonio Huete Jimenez 	    struct dest_constraint **dest_constraints,
59*ba1276acSMatthew Dillon 	    size_t ndest_constraints,
60*ba1276acSMatthew Dillon 	    int cert_only, struct sshkey **certs, size_t ncerts);
61e9778795SPeter Avalos int	ssh_remove_all_identities(int sock, int version);
62e9778795SPeter Avalos 
63ce74bacaSMatthew Dillon int	ssh_agent_sign(int sock, const struct sshkey *key,
64e9778795SPeter Avalos 	    u_char **sigp, size_t *lenp,
65e9778795SPeter Avalos 	    const u_char *data, size_t datalen, const char *alg, u_int compat);
66e9778795SPeter Avalos 
67ee116499SAntonio Huete Jimenez int	ssh_agent_bind_hostkey(int sock, const struct sshkey *key,
68ee116499SAntonio Huete Jimenez     const struct sshbuf *session_id, const struct sshbuf *signature,
69ee116499SAntonio Huete Jimenez     int forwarding);
70ee116499SAntonio Huete Jimenez 
7118de8d7fSPeter Avalos /* Messages for the authentication agent connection. */
7218de8d7fSPeter Avalos #define SSH_AGENTC_REQUEST_RSA_IDENTITIES	1
7318de8d7fSPeter Avalos #define SSH_AGENT_RSA_IDENTITIES_ANSWER		2
7418de8d7fSPeter Avalos #define SSH_AGENTC_RSA_CHALLENGE		3
7518de8d7fSPeter Avalos #define SSH_AGENT_RSA_RESPONSE			4
7618de8d7fSPeter Avalos #define SSH_AGENT_FAILURE			5
7718de8d7fSPeter Avalos #define SSH_AGENT_SUCCESS			6
7818de8d7fSPeter Avalos #define SSH_AGENTC_ADD_RSA_IDENTITY		7
7918de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_RSA_IDENTITY		8
8018de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES	9
8118de8d7fSPeter Avalos 
8218de8d7fSPeter Avalos /* private OpenSSH extensions for SSH2 */
8318de8d7fSPeter Avalos #define SSH2_AGENTC_REQUEST_IDENTITIES		11
8418de8d7fSPeter Avalos #define SSH2_AGENT_IDENTITIES_ANSWER		12
8518de8d7fSPeter Avalos #define SSH2_AGENTC_SIGN_REQUEST		13
8618de8d7fSPeter Avalos #define SSH2_AGENT_SIGN_RESPONSE		14
8718de8d7fSPeter Avalos #define SSH2_AGENTC_ADD_IDENTITY		17
8818de8d7fSPeter Avalos #define SSH2_AGENTC_REMOVE_IDENTITY		18
8918de8d7fSPeter Avalos #define SSH2_AGENTC_REMOVE_ALL_IDENTITIES	19
9018de8d7fSPeter Avalos 
9118de8d7fSPeter Avalos /* smartcard */
9218de8d7fSPeter Avalos #define SSH_AGENTC_ADD_SMARTCARD_KEY		20
9318de8d7fSPeter Avalos #define SSH_AGENTC_REMOVE_SMARTCARD_KEY		21
9418de8d7fSPeter Avalos 
9518de8d7fSPeter Avalos /* lock/unlock the agent */
9618de8d7fSPeter Avalos #define SSH_AGENTC_LOCK				22
9718de8d7fSPeter Avalos #define SSH_AGENTC_UNLOCK			23
9818de8d7fSPeter Avalos 
9918de8d7fSPeter Avalos /* add key with constraints */
10018de8d7fSPeter Avalos #define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED	24
10118de8d7fSPeter Avalos #define SSH2_AGENTC_ADD_ID_CONSTRAINED		25
10218de8d7fSPeter Avalos #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
10318de8d7fSPeter Avalos 
104ee116499SAntonio Huete Jimenez /* generic extension mechanism */
105ee116499SAntonio Huete Jimenez #define SSH_AGENTC_EXTENSION			27
106ee116499SAntonio Huete Jimenez 
10718de8d7fSPeter Avalos #define	SSH_AGENT_CONSTRAIN_LIFETIME		1
10818de8d7fSPeter Avalos #define	SSH_AGENT_CONSTRAIN_CONFIRM		2
109664f4763Szrj #define	SSH_AGENT_CONSTRAIN_MAXSIGN		3
1100cbfa66cSDaniel Fojt #define	SSH_AGENT_CONSTRAIN_EXTENSION		255
11118de8d7fSPeter Avalos 
11218de8d7fSPeter Avalos /* extended failure messages */
11318de8d7fSPeter Avalos #define SSH2_AGENT_FAILURE			30
11418de8d7fSPeter Avalos 
11518de8d7fSPeter Avalos /* additional error code for ssh.com's ssh-agent2 */
11618de8d7fSPeter Avalos #define SSH_COM_AGENT2_FAILURE			102
11718de8d7fSPeter Avalos 
11818de8d7fSPeter Avalos #define	SSH_AGENT_OLD_SIGNATURE			0x01
119e9778795SPeter Avalos #define	SSH_AGENT_RSA_SHA2_256			0x02
120e9778795SPeter Avalos #define	SSH_AGENT_RSA_SHA2_512			0x04
12118de8d7fSPeter Avalos 
12218de8d7fSPeter Avalos #endif				/* AUTHFD_H */
123