xref: /netbsd-src/lib/libskey/skey.h (revision 6cf6fe02a981b55727c49c3d37b0d8191a98c0ee)
1 /*	$NetBSD: skey.h,v 1.9 2005/02/04 16:12:13 perry Exp $	*/
2 
3 /*
4  * S/KEY v1.1b (skey.h)
5  *
6  * Authors:
7  *          Neil M. Haller <nmh@thumper.bellcore.com>
8  *          Philip R. Karn <karn@chicago.qualcomm.com>
9  *          John S. Walden <jsw@thumper.bellcore.com>
10  *
11  * Modifications:
12  *          Scott Chasin <chasin@crimelab.com>
13  *          Todd C. Miller <Todd.Miller@courtesan.com>
14  *
15  * Main client header
16  */
17 
18 /* Server-side data structure for reading keys file during login */
19 struct skey {
20   FILE *keyfile;
21   char buf[256];
22   char *logname;
23   int n;
24   char *seed;
25   char *val;
26   long recstart;		/* needed so reread of buffer is efficient */
27 };
28 
29 /* Client-side structure for scanning data stream for challenge */
30 struct mc {
31   char buf[256];
32   int skip;
33   int cnt;
34 };
35 
36 /* Maximum sequence number we allow */
37 #ifndef SKEY_MAX_SEQ
38 #define SKEY_MAX_SEQ		10000
39 #endif
40 
41 /* Minimum secret password length (rfc2289) */
42 #ifndef SKEY_MIN_PW_LEN
43 #define SKEY_MIN_PW_LEN		10
44 #endif
45 
46 /* Max secret password length (rfc2289 says 63 but allows more) */
47 #ifndef SKEY_MAX_PW_LEN
48 #define SKEY_MAX_PW_LEN		255
49 #endif
50 
51 /* Max length of an S/Key seed (rfc2289) */
52 #ifndef SKEY_MAX_SEED_LEN
53 #define SKEY_MAX_SEED_LEN	16
54 #endif
55 
56 /* Max length of S/Key challenge (otp-???? 9999 seed) */
57 #ifndef SKEY_MAX_CHALLENGE
58 #define SKEY_MAX_CHALLENGE     (11 + SKEY_MAX_HASHNAME_LEN + SKEY_MAX_SEED_LEN)
59 #endif
60 
61 /* Max length of hash algorithm name (md4/md5/sha1/rmd160) */
62 #define SKEY_MAX_HASHNAME_LEN	6
63 
64 /* Size of a binary key (not NULL-terminated) */
65 #define SKEY_BINKEY_SIZE	8
66 
67 /* Location of random file for bogus challenges */
68 #define _SKEY_RAND_FILE_PATH_	"/var/db/host.random"
69 
70 /* Prototypes */
71 void f(char *);
72 int keycrunch(char *, const char *, const char *);
73 char *btoe(char *, const char *);
74 char *put8(char *, const char *);
75 int etob(char *, const char *);
76 void rip(char *);
77 int skeychallenge(struct skey *, const char *, char *, size_t);
78 int skeylookup(struct skey *, const char *);
79 int skeyverify(struct skey *, char *);
80 void sevenbit(char *);
81 void backspace(char *);
82 const char *skipspace(const char *);
83 char *readpass(char *, int);
84 char *readskey(char *, int);
85 int skey_authenticate(const char *);
86 int skey_passcheck(const char *, char *);
87 const char *skey_keyinfo(const char *);
88 int skey_haskey(const char *);
89 int getskeyprompt(struct skey *, char *, char *);
90 int atob8(char *, const char *);
91 int btoa8(char *, const char *);
92 int htoi(int);
93 const char *skey_get_algorithm(void);
94 const char *skey_set_algorithm(const char *);
95 int skeygetnext(struct skey *);
96 int skeyzero(struct skey *, char *);
97