1*eead3eb2Sdjm /* $OpenBSD: authfd.h,v 1.52 2023/12/18 14:46:56 djm Exp $ */ 2617bdbdbSstevesk 384959968Sderaadt /* 432f90fecSderaadt * Author: Tatu Ylonen <ylo@cs.hut.fi> 532f90fecSderaadt * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 632f90fecSderaadt * All rights reserved 732f90fecSderaadt * Functions to interface with the SSH_AUTHENTICATION_FD socket. 832f90fecSderaadt * 9607fba6cSderaadt * As far as I am concerned, the code I have written for this software 10607fba6cSderaadt * can be used freely for any purpose. Any derived versions of this 11607fba6cSderaadt * software must be clearly marked as such, and if the derived work is 12607fba6cSderaadt * incompatible with the protocol description in the RFC file, it must be 13607fba6cSderaadt * called by a name other than "ssh" or "Secure Shell". 1484959968Sderaadt */ 1584959968Sderaadt 1684959968Sderaadt #ifndef AUTHFD_H 1784959968Sderaadt #define AUTHFD_H 1884959968Sderaadt 19798a6ad5Sdjm struct sshbuf; 2082d651daSdjm struct sshkey; 21798a6ad5Sdjm 22b7e9f6c7Sdjm /* List of identities returned by ssh_fetch_identitylist() */ 23b7e9f6c7Sdjm struct ssh_identitylist { 24b7e9f6c7Sdjm size_t nkeys; 25b7e9f6c7Sdjm struct sshkey **keys; 26b7e9f6c7Sdjm char **comments; 27b7e9f6c7Sdjm }; 28b7e9f6c7Sdjm 2982d651daSdjm /* Key destination restrictions */ 3082d651daSdjm struct dest_constraint_hop { 3182d651daSdjm char *user; /* wildcards allowed */ 3282d651daSdjm char *hostname; /* used to matching cert principals and for display */ 3382d651daSdjm int is_ca; 3482d651daSdjm u_int nkeys; /* number of entries in *both* 'keys' and 'key_is_ca' */ 3582d651daSdjm struct sshkey **keys; 3682d651daSdjm int *key_is_ca; 3782d651daSdjm }; 3882d651daSdjm struct dest_constraint { 3982d651daSdjm struct dest_constraint_hop from; 4082d651daSdjm struct dest_constraint_hop to; 4182d651daSdjm }; 4282d651daSdjm 43b7e9f6c7Sdjm int ssh_get_authentication_socket(int *fdp); 44388f6d08Sdjm int ssh_get_authentication_socket_path(const char *authsocket, int *fdp); 45b7e9f6c7Sdjm void ssh_close_authentication_socket(int sock); 46b7e9f6c7Sdjm 47b7e9f6c7Sdjm int ssh_lock_agent(int sock, int lock, const char *password); 48d4984305Snaddy int ssh_fetch_identitylist(int sock, struct ssh_identitylist **idlp); 49b7e9f6c7Sdjm void ssh_free_identitylist(struct ssh_identitylist *idl); 50707316f9Sdjm int ssh_add_identity_constrained(int sock, struct sshkey *key, 5124952783Sdjm const char *comment, u_int life, u_int confirm, u_int maxsign, 5282d651daSdjm const char *provider, struct dest_constraint **dest_constraints, 5382d651daSdjm size_t ndest_constraints); 549f201044Sdjm int ssh_agent_has_key(int sock, const struct sshkey *key); 559f201044Sdjm int ssh_remove_identity(int sock, const struct sshkey *key); 56b7e9f6c7Sdjm int ssh_update_card(int sock, int add, const char *reader_id, 5782d651daSdjm const char *pin, u_int life, u_int confirm, 5882d651daSdjm struct dest_constraint **dest_constraints, 59*eead3eb2Sdjm size_t ndest_constraints, 60*eead3eb2Sdjm int cert_only, struct sshkey **certs, size_t ncerts); 61b7e9f6c7Sdjm int ssh_remove_all_identities(int sock, int version); 62b7e9f6c7Sdjm 638705e2e1Sdjm int ssh_agent_sign(int sock, const struct sshkey *key, 64b7e9f6c7Sdjm u_char **sigp, size_t *lenp, 65321f30e3Smarkus const u_char *data, size_t datalen, const char *alg, u_int compat); 66b7e9f6c7Sdjm 67798a6ad5Sdjm int ssh_agent_bind_hostkey(int sock, const struct sshkey *key, 68798a6ad5Sdjm const struct sshbuf *session_id, const struct sshbuf *signature, 69798a6ad5Sdjm int forwarding); 70798a6ad5Sdjm 7184959968Sderaadt /* Messages for the authentication agent connection. */ 7284959968Sderaadt #define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1 7384959968Sderaadt #define SSH_AGENT_RSA_IDENTITIES_ANSWER 2 7484959968Sderaadt #define SSH_AGENTC_RSA_CHALLENGE 3 7584959968Sderaadt #define SSH_AGENT_RSA_RESPONSE 4 7684959968Sderaadt #define SSH_AGENT_FAILURE 5 7784959968Sderaadt #define SSH_AGENT_SUCCESS 6 7884959968Sderaadt #define SSH_AGENTC_ADD_RSA_IDENTITY 7 7984959968Sderaadt #define SSH_AGENTC_REMOVE_RSA_IDENTITY 8 8084959968Sderaadt #define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9 8184959968Sderaadt 8210da3483Smarkus /* private OpenSSH extensions for SSH2 */ 833ad03657Smarkus #define SSH2_AGENTC_REQUEST_IDENTITIES 11 843ad03657Smarkus #define SSH2_AGENT_IDENTITIES_ANSWER 12 853ad03657Smarkus #define SSH2_AGENTC_SIGN_REQUEST 13 863ad03657Smarkus #define SSH2_AGENT_SIGN_RESPONSE 14 873ad03657Smarkus #define SSH2_AGENTC_ADD_IDENTITY 17 883ad03657Smarkus #define SSH2_AGENTC_REMOVE_IDENTITY 18 893ad03657Smarkus #define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19 903ad03657Smarkus 9144986879Smarkus /* smartcard */ 9244986879Smarkus #define SSH_AGENTC_ADD_SMARTCARD_KEY 20 9344986879Smarkus #define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21 9444986879Smarkus 95712b8fdeSmarkus /* lock/unlock the agent */ 96712b8fdeSmarkus #define SSH_AGENTC_LOCK 22 97712b8fdeSmarkus #define SSH_AGENTC_UNLOCK 23 98712b8fdeSmarkus 99e01d29b9Smarkus /* add key with constraints */ 100e01d29b9Smarkus #define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24 101e01d29b9Smarkus #define SSH2_AGENTC_ADD_ID_CONSTRAINED 25 102006fce9fSdjm #define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26 103d77f6525Smarkus 104798a6ad5Sdjm /* generic extension mechanism */ 105798a6ad5Sdjm #define SSH_AGENTC_EXTENSION 27 106798a6ad5Sdjm 107f5a3f9f6Smarkus #define SSH_AGENT_CONSTRAIN_LIFETIME 1 10812af6642Smarkus #define SSH_AGENT_CONSTRAIN_CONFIRM 2 109a6be8e7cSmarkus #define SSH_AGENT_CONSTRAIN_MAXSIGN 3 11024952783Sdjm #define SSH_AGENT_CONSTRAIN_EXTENSION 255 111f9ca96dcSmarkus 1129b40274eSmarkus /* extended failure messages */ 1139b40274eSmarkus #define SSH2_AGENT_FAILURE 30 1149b40274eSmarkus 11510da3483Smarkus /* additional error code for ssh.com's ssh-agent2 */ 11610da3483Smarkus #define SSH_COM_AGENT2_FAILURE 102 11710da3483Smarkus 1181604b9adSmarkus #define SSH_AGENT_OLD_SIGNATURE 0x01 119321f30e3Smarkus #define SSH_AGENT_RSA_SHA2_256 0x02 120321f30e3Smarkus #define SSH_AGENT_RSA_SHA2_512 0x04 1211604b9adSmarkus 12284959968Sderaadt #endif /* AUTHFD_H */ 123