2020-06-26 07:03:36 +02:00
|
|
|
/* $OpenBSD: authfd.h,v 1.49 2020/06/26 05:03:36 djm Exp $ */
|
2002-03-05 02:53:02 +01:00
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
/*
|
1999-11-24 14:26:21 +01:00
|
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
* All rights reserved
|
|
|
|
* Functions to interface with the SSH_AUTHENTICATION_FD socket.
|
2000-04-16 03:18:38 +02:00
|
|
|
*
|
2000-09-16 04:29:08 +02:00
|
|
|
* As far as I am concerned, the code I have written for this software
|
|
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
|
|
* software must be clearly marked as such, and if the derived work is
|
|
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
|
|
* called by a name other than "ssh" or "Secure Shell".
|
1999-11-24 14:26:21 +01:00
|
|
|
*/
|
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
#ifndef AUTHFD_H
|
|
|
|
#define AUTHFD_H
|
|
|
|
|
2015-01-14 21:05:27 +01:00
|
|
|
/* List of identities returned by ssh_fetch_identitylist() */
|
|
|
|
struct ssh_identitylist {
|
|
|
|
size_t nkeys;
|
|
|
|
struct sshkey **keys;
|
|
|
|
char **comments;
|
|
|
|
};
|
|
|
|
|
|
|
|
int ssh_get_authentication_socket(int *fdp);
|
2019-12-21 03:19:13 +01:00
|
|
|
int ssh_get_authentication_socket_path(const char *authsocket, int *fdp);
|
2015-01-14 21:05:27 +01:00
|
|
|
void ssh_close_authentication_socket(int sock);
|
|
|
|
|
|
|
|
int ssh_lock_agent(int sock, int lock, const char *password);
|
2017-05-05 12:42:49 +02:00
|
|
|
int ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp);
|
2015-01-14 21:05:27 +01:00
|
|
|
void ssh_free_identitylist(struct ssh_identitylist *idl);
|
2019-06-21 06:21:04 +02:00
|
|
|
int ssh_add_identity_constrained(int sock, struct sshkey *key,
|
2019-10-31 22:19:14 +01:00
|
|
|
const char *comment, u_int life, u_int confirm, u_int maxsign,
|
|
|
|
const char *provider);
|
2020-06-26 07:03:36 +02:00
|
|
|
int ssh_agent_has_key(int sock, const struct sshkey *key);
|
|
|
|
int ssh_remove_identity(int sock, const struct sshkey *key);
|
2015-01-14 21:05:27 +01:00
|
|
|
int ssh_update_card(int sock, int add, const char *reader_id,
|
|
|
|
const char *pin, u_int life, u_int confirm);
|
|
|
|
int ssh_remove_all_identities(int sock, int version);
|
|
|
|
|
2017-06-28 03:09:22 +02:00
|
|
|
int ssh_agent_sign(int sock, const struct sshkey *key,
|
2015-01-14 21:05:27 +01:00
|
|
|
u_char **sigp, size_t *lenp,
|
2015-12-04 17:41:28 +01:00
|
|
|
const u_char *data, size_t datalen, const char *alg, u_int compat);
|
2015-01-14 21:05:27 +01:00
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
/* Messages for the authentication agent connection. */
|
|
|
|
#define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1
|
|
|
|
#define SSH_AGENT_RSA_IDENTITIES_ANSWER 2
|
|
|
|
#define SSH_AGENTC_RSA_CHALLENGE 3
|
|
|
|
#define SSH_AGENT_RSA_RESPONSE 4
|
|
|
|
#define SSH_AGENT_FAILURE 5
|
|
|
|
#define SSH_AGENT_SUCCESS 6
|
|
|
|
#define SSH_AGENTC_ADD_RSA_IDENTITY 7
|
|
|
|
#define SSH_AGENTC_REMOVE_RSA_IDENTITY 8
|
|
|
|
#define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9
|
|
|
|
|
2000-10-14 07:23:11 +02:00
|
|
|
/* private OpenSSH extensions for SSH2 */
|
2000-07-21 02:19:44 +02:00
|
|
|
#define SSH2_AGENTC_REQUEST_IDENTITIES 11
|
|
|
|
#define SSH2_AGENT_IDENTITIES_ANSWER 12
|
|
|
|
#define SSH2_AGENTC_SIGN_REQUEST 13
|
|
|
|
#define SSH2_AGENT_SIGN_RESPONSE 14
|
|
|
|
#define SSH2_AGENTC_ADD_IDENTITY 17
|
|
|
|
#define SSH2_AGENTC_REMOVE_IDENTITY 18
|
|
|
|
#define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19
|
|
|
|
|
2001-07-04 05:50:02 +02:00
|
|
|
/* smartcard */
|
|
|
|
#define SSH_AGENTC_ADD_SMARTCARD_KEY 20
|
2002-06-21 02:41:51 +02:00
|
|
|
#define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21
|
2001-07-04 05:50:02 +02:00
|
|
|
|
2002-06-06 23:52:03 +02:00
|
|
|
/* lock/unlock the agent */
|
|
|
|
#define SSH_AGENTC_LOCK 22
|
2002-06-21 02:41:51 +02:00
|
|
|
#define SSH_AGENTC_UNLOCK 23
|
2002-06-06 23:52:03 +02:00
|
|
|
|
2002-06-21 02:08:39 +02:00
|
|
|
/* add key with constraints */
|
|
|
|
#define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24
|
|
|
|
#define SSH2_AGENTC_ADD_ID_CONSTRAINED 25
|
2003-06-11 14:06:33 +02:00
|
|
|
#define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
|
2002-06-21 02:04:48 +02:00
|
|
|
|
2002-06-21 02:06:54 +02:00
|
|
|
#define SSH_AGENT_CONSTRAIN_LIFETIME 1
|
2003-01-24 01:36:23 +01:00
|
|
|
#define SSH_AGENT_CONSTRAIN_CONFIRM 2
|
2018-02-23 16:58:37 +01:00
|
|
|
#define SSH_AGENT_CONSTRAIN_MAXSIGN 3
|
2019-10-31 22:19:14 +01:00
|
|
|
#define SSH_AGENT_CONSTRAIN_EXTENSION 255
|
2002-06-06 23:54:57 +02:00
|
|
|
|
2001-08-16 01:04:50 +02:00
|
|
|
/* extended failure messages */
|
|
|
|
#define SSH2_AGENT_FAILURE 30
|
|
|
|
|
2000-10-14 07:23:11 +02:00
|
|
|
/* additional error code for ssh.com's ssh-agent2 */
|
2002-06-21 02:41:51 +02:00
|
|
|
#define SSH_COM_AGENT2_FAILURE 102
|
2000-10-14 07:23:11 +02:00
|
|
|
|
2000-09-23 08:15:56 +02:00
|
|
|
#define SSH_AGENT_OLD_SIGNATURE 0x01
|
2015-12-04 17:41:28 +01:00
|
|
|
#define SSH_AGENT_RSA_SHA2_256 0x02
|
|
|
|
#define SSH_AGENT_RSA_SHA2_512 0x04
|
2000-09-23 08:15:56 +02:00
|
|
|
|
1999-11-24 14:26:21 +01:00
|
|
|
#endif /* AUTHFD_H */
|