]> andersk Git - openssh.git/blame - authfd.h
- (djm) OpenBSD CVS sync:
[openssh.git] / authfd.h
CommitLineData
8efc0c15 1/*
5260325f 2 * Author: Tatu Ylonen <ylo@cs.hut.fi>
5260325f 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved
5260325f 5 * Functions to interface with the SSH_AUTHENTICATION_FD socket.
6ae2364d 6 *
bcbf86ec 7 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
5260325f 12 */
8efc0c15 13
188adeb2 14/* RCSID("$OpenBSD: authfd.h,v 1.12 2000/09/21 11:07:51 markus Exp $"); */
8efc0c15 15
16#ifndef AUTHFD_H
17#define AUTHFD_H
18
19#include "buffer.h"
20
21/* Messages for the authentication agent connection. */
22#define SSH_AGENTC_REQUEST_RSA_IDENTITIES 1
23#define SSH_AGENT_RSA_IDENTITIES_ANSWER 2
24#define SSH_AGENTC_RSA_CHALLENGE 3
25#define SSH_AGENT_RSA_RESPONSE 4
26#define SSH_AGENT_FAILURE 5
27#define SSH_AGENT_SUCCESS 6
28#define SSH_AGENTC_ADD_RSA_IDENTITY 7
29#define SSH_AGENTC_REMOVE_RSA_IDENTITY 8
30#define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9
31
4c8722d9 32#define SSH2_AGENTC_REQUEST_IDENTITIES 11
33#define SSH2_AGENT_IDENTITIES_ANSWER 12
34#define SSH2_AGENTC_SIGN_REQUEST 13
35#define SSH2_AGENT_SIGN_RESPONSE 14
4c8722d9 36#define SSH2_AGENTC_ADD_IDENTITY 17
37#define SSH2_AGENTC_REMOVE_IDENTITY 18
38#define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19
39
188adeb2 40#define SSH_AGENT_OLD_SIGNATURE 0x01
41
42
5260325f 43typedef struct {
44 int fd;
5260325f 45 Buffer identities;
46 int howmany;
47} AuthenticationConnection;
2e73a022 48
8efc0c15 49/* Returns the number of the authentication fd, or -1 if there is none. */
5260325f 50int ssh_get_authentication_socket();
8efc0c15 51
aa3378df 52/*
53 * This should be called for any descriptor returned by
54 * ssh_get_authentication_socket(). Depending on the way the descriptor was
55 * obtained, this may close the descriptor.
56 */
5260325f 57void ssh_close_authentication_socket(int authfd);
8efc0c15 58
aa3378df 59/*
60 * Opens and connects a private socket for communication with the
61 * authentication agent. Returns NULL if an error occurred and the
62 * connection could not be opened. The connection should be closed by the
63 * caller by calling ssh_close_authentication_connection().
64 */
8efc0c15 65AuthenticationConnection *ssh_get_authentication_connection();
66
aa3378df 67/*
68 * Closes the connection to the authentication agent and frees any associated
69 * memory.
70 */
2e73a022 71void ssh_close_authentication_connection(AuthenticationConnection *auth);
8efc0c15 72
aa3378df 73/*
2e73a022 74 * Returns the first authentication identity held by the agent or NULL if
75 * no identies are available. Caller must free comment and key.
76 * Note that you cannot mix calls with different versions.
aa3378df 77 */
2e73a022 78Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version);
8efc0c15 79
aa3378df 80/*
81 * Returns the next authentication identity for the agent. Other functions
82 * can be called between this and ssh_get_first_identity or two calls of this
2e73a022 83 * function. This returns NULL if there are no more identities. The caller
84 * must free key and comment after a successful return.
aa3378df 85 */
2e73a022 86Key *ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version);
8efc0c15 87
2e73a022 88/*
89 * Requests the agent to decrypt the given challenge. Returns true if the
90 * agent claims it was able to decrypt it.
91 */
6ae2364d 92int
2e73a022 93ssh_decrypt_challenge(AuthenticationConnection *auth,
94 Key *key, BIGNUM * challenge,
5260325f 95 unsigned char session_id[16],
96 unsigned int response_type,
97 unsigned char response[16]);
8efc0c15 98
2e73a022 99/* Requests the agent to sign data using key */
100int
101ssh_agent_sign(AuthenticationConnection *auth,
102 Key *key,
103 unsigned char **sigp, int *lenp,
104 unsigned char *data, int datalen);
105
aa3378df 106/*
107 * Adds an identity to the authentication server. This call is not meant to
108 * be used by normal applications. This returns true if the identity was
109 * successfully added.
110 */
6ae2364d 111int
2e73a022 112ssh_add_identity(AuthenticationConnection *auth, Key *key,
aa3378df 113 const char *comment);
8efc0c15 114
aa3378df 115/*
116 * Removes the identity from the authentication server. This call is not
117 * meant to be used by normal applications. This returns true if the
118 * identity was successfully added.
119 */
2e73a022 120int ssh_remove_identity(AuthenticationConnection *auth, Key *key);
8efc0c15 121
aa3378df 122/*
123 * Removes all identities from the authentication agent. This call is not
124 * meant to be used by normal applications. This returns true if the
125 * operation was successful.
126 */
2e73a022 127int ssh_remove_all_identities(AuthenticationConnection *auth, int version);
8efc0c15 128
5260325f 129#endif /* AUTHFD_H */
This page took 0.08166 seconds and 5 git commands to generate.