2010-04-16 05:56:21 +00:00
|
|
|
/* $OpenBSD: key.h,v 1.30 2010/04/16 01:47:26 djm Exp $ */
|
2001-01-29 07:39:26 +00:00
|
|
|
|
2000-09-16 02:29:08 +00:00
|
|
|
/*
|
2001-07-04 03:32:30 +00:00
|
|
|
* Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
|
2000-09-16 02:29:08 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
2000-03-26 03:04:51 +00:00
|
|
|
#ifndef KEY_H
|
|
|
|
#define KEY_H
|
|
|
|
|
2010-02-26 20:55:05 +00:00
|
|
|
#include "buffer.h"
|
2001-01-22 05:34:40 +00:00
|
|
|
#include <openssl/rsa.h>
|
|
|
|
#include <openssl/dsa.h>
|
|
|
|
|
2000-03-26 03:04:51 +00:00
|
|
|
typedef struct Key Key;
|
|
|
|
enum types {
|
2000-11-13 11:57:25 +00:00
|
|
|
KEY_RSA1,
|
2000-03-26 03:04:51 +00:00
|
|
|
KEY_RSA,
|
|
|
|
KEY_DSA,
|
2010-02-26 20:55:05 +00:00
|
|
|
KEY_RSA_CERT,
|
|
|
|
KEY_DSA_CERT,
|
2010-04-16 05:56:21 +00:00
|
|
|
KEY_RSA_CERT_V00,
|
|
|
|
KEY_DSA_CERT_V00,
|
2000-11-13 11:57:25 +00:00
|
|
|
KEY_UNSPEC
|
2000-03-26 03:04:51 +00:00
|
|
|
};
|
2001-03-11 20:03:44 +00:00
|
|
|
enum fp_type {
|
|
|
|
SSH_FP_SHA1,
|
|
|
|
SSH_FP_MD5
|
|
|
|
};
|
|
|
|
enum fp_rep {
|
|
|
|
SSH_FP_HEX,
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
2008-06-12 18:40:35 +00:00
|
|
|
SSH_FP_BUBBLEBABBLE,
|
|
|
|
SSH_FP_RANDOMART
|
2001-03-11 20:03:44 +00:00
|
|
|
};
|
2001-07-04 04:52:03 +00:00
|
|
|
|
|
|
|
/* key is stored in external hardware */
|
|
|
|
#define KEY_FLAG_EXT 0x0001
|
|
|
|
|
2010-02-26 20:55:05 +00:00
|
|
|
#define CERT_MAX_PRINCIPALS 256
|
|
|
|
struct KeyCert {
|
|
|
|
Buffer certblob; /* Kept around for use on wire */
|
|
|
|
u_int type; /* SSH2_CERT_TYPE_USER or SSH2_CERT_TYPE_HOST */
|
2010-04-16 05:56:21 +00:00
|
|
|
u_int64_t serial;
|
2010-02-26 20:55:05 +00:00
|
|
|
char *key_id;
|
|
|
|
u_int nprincipals;
|
|
|
|
char **principals;
|
|
|
|
u_int64_t valid_after, valid_before;
|
2010-04-16 05:56:21 +00:00
|
|
|
Buffer critical;
|
|
|
|
Buffer extensions;
|
2010-02-26 20:55:05 +00:00
|
|
|
Key *signature_key;
|
|
|
|
};
|
|
|
|
|
2000-03-26 03:04:51 +00:00
|
|
|
struct Key {
|
2001-07-04 04:52:03 +00:00
|
|
|
int type;
|
|
|
|
int flags;
|
2000-03-26 03:04:51 +00:00
|
|
|
RSA *rsa;
|
|
|
|
DSA *dsa;
|
2010-02-26 20:55:05 +00:00
|
|
|
struct KeyCert *cert;
|
2000-03-26 03:04:51 +00:00
|
|
|
};
|
|
|
|
|
2003-11-17 10:18:23 +00:00
|
|
|
Key *key_new(int);
|
2010-02-26 20:55:05 +00:00
|
|
|
void key_add_private(Key *);
|
2003-11-17 10:18:23 +00:00
|
|
|
Key *key_new_private(int);
|
|
|
|
void key_free(Key *);
|
|
|
|
Key *key_demote(const Key *);
|
2010-02-26 20:55:05 +00:00
|
|
|
int key_equal_public(const Key *, const Key *);
|
2003-11-17 10:18:23 +00:00
|
|
|
int key_equal(const Key *, const Key *);
|
2010-02-26 20:55:05 +00:00
|
|
|
char *key_fingerprint(Key *, enum fp_type, enum fp_rep);
|
|
|
|
u_char *key_fingerprint_raw(Key *, enum fp_type, u_int *);
|
2003-11-17 10:18:23 +00:00
|
|
|
const char *key_type(const Key *);
|
2010-03-21 18:58:24 +00:00
|
|
|
const char *key_cert_type(const Key *);
|
2003-11-17 10:18:23 +00:00
|
|
|
int key_write(const Key *, FILE *);
|
|
|
|
int key_read(Key *, char **);
|
|
|
|
u_int key_size(const Key *);
|
2000-11-13 11:57:25 +00:00
|
|
|
|
2001-07-04 04:02:36 +00:00
|
|
|
Key *key_generate(int, u_int);
|
2003-11-17 10:18:23 +00:00
|
|
|
Key *key_from_private(const Key *);
|
2001-07-04 04:46:56 +00:00
|
|
|
int key_type_from_name(char *);
|
2010-02-26 20:55:05 +00:00
|
|
|
int key_is_cert(const Key *);
|
|
|
|
int key_type_plain(int);
|
2010-04-16 05:56:21 +00:00
|
|
|
int key_to_certified(Key *, int);
|
2010-02-26 20:55:05 +00:00
|
|
|
int key_drop_cert(Key *);
|
|
|
|
int key_certify(Key *, Key *);
|
|
|
|
void key_cert_copy(const Key *, struct Key *);
|
|
|
|
int key_cert_check_authority(const Key *, int, int, const char *,
|
|
|
|
const char **);
|
2010-04-16 05:56:21 +00:00
|
|
|
int key_cert_is_legacy(Key *);
|
2000-11-13 11:57:25 +00:00
|
|
|
|
2003-11-17 10:18:23 +00:00
|
|
|
Key *key_from_blob(const u_char *, u_int);
|
|
|
|
int key_to_blob(const Key *, u_char **, u_int *);
|
|
|
|
const char *key_ssh_name(const Key *);
|
|
|
|
int key_names_valid2(const char *);
|
2000-11-13 11:57:25 +00:00
|
|
|
|
2003-11-17 10:18:23 +00:00
|
|
|
int key_sign(const Key *, u_char **, u_int *, const u_char *, u_int);
|
|
|
|
int key_verify(const Key *, const u_char *, u_int, const u_char *, u_int);
|
2000-03-26 03:04:51 +00:00
|
|
|
|
2003-11-17 10:18:23 +00:00
|
|
|
int ssh_dss_sign(const Key *, u_char **, u_int *, const u_char *, u_int);
|
|
|
|
int ssh_dss_verify(const Key *, const u_char *, u_int, const u_char *, u_int);
|
|
|
|
int ssh_rsa_sign(const Key *, u_char **, u_int *, const u_char *, u_int);
|
|
|
|
int ssh_rsa_verify(const Key *, const u_char *, u_int, const u_char *, u_int);
|
2003-02-24 01:01:40 +00:00
|
|
|
|
2000-03-26 03:04:51 +00:00
|
|
|
#endif
|