2021-10-28 02:54:18 +00:00
|
|
|
/* $OpenBSD: ssh-sk.h,v 1.11 2021/10/28 02:54:18 djm Exp $ */
|
2019-10-31 21:16:20 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2019 Google LLC
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _SSH_SK_H
|
|
|
|
#define _SSH_SK_H 1
|
|
|
|
|
|
|
|
struct sshbuf;
|
|
|
|
struct sshkey;
|
2020-01-06 02:00:46 +00:00
|
|
|
struct sk_option;
|
2019-10-31 21:16:20 +00:00
|
|
|
|
2019-12-30 09:23:28 +00:00
|
|
|
/* Version of protocol expected from ssh-sk-helper */
|
2020-01-10 23:43:26 +00:00
|
|
|
#define SSH_SK_HELPER_VERSION 5
|
2019-12-30 09:23:28 +00:00
|
|
|
|
|
|
|
/* ssh-sk-helper messages */
|
|
|
|
#define SSH_SK_HELPER_ERROR 0 /* Only valid H->C */
|
|
|
|
#define SSH_SK_HELPER_SIGN 1
|
|
|
|
#define SSH_SK_HELPER_ENROLL 2
|
|
|
|
#define SSH_SK_HELPER_LOAD_RESIDENT 3
|
|
|
|
|
2021-10-28 02:54:18 +00:00
|
|
|
struct sshsk_resident_key {
|
|
|
|
struct sshkey *key;
|
|
|
|
uint8_t *user_id;
|
|
|
|
size_t user_id_len;
|
|
|
|
};
|
|
|
|
|
2019-10-31 21:16:20 +00:00
|
|
|
/*
|
2019-11-12 19:31:45 +00:00
|
|
|
* Enroll (generate) a new security-key hosted private key of given type
|
|
|
|
* via the specified provider middleware.
|
2019-10-31 21:16:20 +00:00
|
|
|
* If challenge_buf is NULL then a random 256 bit challenge will be used.
|
|
|
|
*
|
|
|
|
* Returns 0 on success or a ssherr.h error code on failure.
|
|
|
|
*
|
|
|
|
* If successful and the attest_data buffer is not NULL then attestation
|
|
|
|
* information is placed there.
|
|
|
|
*/
|
2020-01-06 02:00:46 +00:00
|
|
|
int sshsk_enroll(int type, const char *provider_path, const char *device,
|
|
|
|
const char *application, const char *userid, uint8_t flags,
|
|
|
|
const char *pin, struct sshbuf *challenge_buf,
|
2019-12-30 09:23:28 +00:00
|
|
|
struct sshkey **keyp, struct sshbuf *attest);
|
2019-10-31 21:16:20 +00:00
|
|
|
|
|
|
|
/*
|
2019-11-12 19:31:18 +00:00
|
|
|
* Calculate an ECDSA_SK or ED25519_SK signature using the specified key
|
2019-11-12 19:30:50 +00:00
|
|
|
* and provider middleware.
|
2019-10-31 21:16:20 +00:00
|
|
|
*
|
|
|
|
* Returns 0 on success or a ssherr.h error code on failure.
|
|
|
|
*/
|
2019-12-13 19:09:10 +00:00
|
|
|
int sshsk_sign(const char *provider_path, struct sshkey *key,
|
2019-10-31 21:16:20 +00:00
|
|
|
u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
|
2019-12-30 09:23:28 +00:00
|
|
|
u_int compat, const char *pin);
|
2019-10-31 21:16:20 +00:00
|
|
|
|
2019-12-30 09:21:16 +00:00
|
|
|
/*
|
|
|
|
* Enumerates and loads all SSH-compatible resident keys from a security
|
|
|
|
* key.
|
|
|
|
*
|
|
|
|
* Returns 0 on success or a ssherr.h error code on failure.
|
|
|
|
*/
|
2020-01-06 02:00:46 +00:00
|
|
|
int sshsk_load_resident(const char *provider_path, const char *device,
|
2021-10-28 02:54:18 +00:00
|
|
|
const char *pin, u_int flags, struct sshsk_resident_key ***srksp,
|
|
|
|
size_t *nsrksp);
|
|
|
|
|
|
|
|
/* Free an array of sshsk_resident_key (as returned from sshsk_load_resident) */
|
|
|
|
void sshsk_free_resident_keys(struct sshsk_resident_key **srks, size_t nsrks);
|
2019-12-30 09:21:16 +00:00
|
|
|
|
2019-10-31 21:16:20 +00:00
|
|
|
#endif /* _SSH_SK_H */
|
|
|
|
|