+/* $OpenBSD: authfd.h,v 1.34 2003/11/21 11:57:03 djm Exp $ */
+
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* called by a name other than "ssh" or "Secure Shell".
*/
-/* RCSID("$OpenBSD: authfd.h,v 1.11 2000/09/07 20:27:49 deraadt Exp $"); */
-
#ifndef AUTHFD_H
#define AUTHFD_H
#define SSH_AGENTC_REMOVE_RSA_IDENTITY 8
#define SSH_AGENTC_REMOVE_ALL_RSA_IDENTITIES 9
+/* private OpenSSH extensions for SSH2 */
#define SSH2_AGENTC_REQUEST_IDENTITIES 11
#define SSH2_AGENT_IDENTITIES_ANSWER 12
#define SSH2_AGENTC_SIGN_REQUEST 13
#define SSH2_AGENTC_REMOVE_IDENTITY 18
#define SSH2_AGENTC_REMOVE_ALL_IDENTITIES 19
-typedef struct {
- int fd;
- Buffer identities;
- int howmany;
-} AuthenticationConnection;
+/* smartcard */
+#define SSH_AGENTC_ADD_SMARTCARD_KEY 20
+#define SSH_AGENTC_REMOVE_SMARTCARD_KEY 21
-/* Returns the number of the authentication fd, or -1 if there is none. */
-int ssh_get_authentication_socket();
+/* lock/unlock the agent */
+#define SSH_AGENTC_LOCK 22
+#define SSH_AGENTC_UNLOCK 23
-/*
- * This should be called for any descriptor returned by
- * ssh_get_authentication_socket(). Depending on the way the descriptor was
- * obtained, this may close the descriptor.
- */
-void ssh_close_authentication_socket(int authfd);
+/* add key with constraints */
+#define SSH_AGENTC_ADD_RSA_ID_CONSTRAINED 24
+#define SSH2_AGENTC_ADD_ID_CONSTRAINED 25
+#define SSH_AGENTC_ADD_SMARTCARD_KEY_CONSTRAINED 26
-/*
- * Opens and connects a private socket for communication with the
- * authentication agent. Returns NULL if an error occurred and the
- * connection could not be opened. The connection should be closed by the
- * caller by calling ssh_close_authentication_connection().
- */
-AuthenticationConnection *ssh_get_authentication_connection();
+#define SSH_AGENT_CONSTRAIN_LIFETIME 1
+#define SSH_AGENT_CONSTRAIN_CONFIRM 2
-/*
- * Closes the connection to the authentication agent and frees any associated
- * memory.
- */
-void ssh_close_authentication_connection(AuthenticationConnection *auth);
+/* extended failure messages */
+#define SSH2_AGENT_FAILURE 30
-/*
- * Returns the first authentication identity held by the agent or NULL if
- * no identies are available. Caller must free comment and key.
- * Note that you cannot mix calls with different versions.
- */
-Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version);
+/* additional error code for ssh.com's ssh-agent2 */
+#define SSH_COM_AGENT2_FAILURE 102
-/*
- * Returns the next authentication identity for the agent. Other functions
- * can be called between this and ssh_get_first_identity or two calls of this
- * function. This returns NULL if there are no more identities. The caller
- * must free key and comment after a successful return.
- */
-Key *ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version);
+#define SSH_AGENT_OLD_SIGNATURE 0x01
-/*
- * Requests the agent to decrypt the given challenge. Returns true if the
- * agent claims it was able to decrypt it.
- */
-int
-ssh_decrypt_challenge(AuthenticationConnection *auth,
- Key *key, BIGNUM * challenge,
- unsigned char session_id[16],
- unsigned int response_type,
- unsigned char response[16]);
+typedef struct {
+ int fd;
+ Buffer identities;
+ int howmany;
+} AuthenticationConnection;
+
+int ssh_agent_present(void);
+int ssh_get_authentication_socket(void);
+void ssh_close_authentication_socket(int);
+
+AuthenticationConnection *ssh_get_authentication_connection(void);
+void ssh_close_authentication_connection(AuthenticationConnection *);
+int ssh_get_num_identities(AuthenticationConnection *, int);
+Key *ssh_get_first_identity(AuthenticationConnection *, char **, int);
+Key *ssh_get_next_identity(AuthenticationConnection *, char **, int);
+int ssh_add_identity(AuthenticationConnection *, Key *, const char *);
+int ssh_add_identity_constrained(AuthenticationConnection *, Key *,
+ const char *, u_int, u_int);
+int ssh_remove_identity(AuthenticationConnection *, Key *);
+int ssh_remove_all_identities(AuthenticationConnection *, int);
+int ssh_lock_agent(AuthenticationConnection *, int, const char *);
+int ssh_update_card(AuthenticationConnection *, int, const char *,
+ const char *, u_int, u_int);
-/* Requests the agent to sign data using key */
int
-ssh_agent_sign(AuthenticationConnection *auth,
- Key *key,
- unsigned char **sigp, int *lenp,
- unsigned char *data, int datalen);
+ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16],
+ u_int, u_char[16]);
-/*
- * Adds an identity to the authentication server. This call is not meant to
- * be used by normal applications. This returns true if the identity was
- * successfully added.
- */
int
-ssh_add_identity(AuthenticationConnection *auth, Key *key,
- const char *comment);
-
-/*
- * Removes the identity from the authentication server. This call is not
- * meant to be used by normal applications. This returns true if the
- * identity was successfully added.
- */
-int ssh_remove_identity(AuthenticationConnection *auth, Key *key);
-
-/*
- * Removes all identities from the authentication agent. This call is not
- * meant to be used by normal applications. This returns true if the
- * operation was successful.
- */
-int ssh_remove_all_identities(AuthenticationConnection *auth, int version);
+ssh_agent_sign(AuthenticationConnection *, Key *, u_char **, u_int *, u_char *,
+ u_int);
#endif /* AUTHFD_H */