ssh-sk.h 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. /* $OpenBSD: ssh-sk.h,v 1.10 2020/01/10 23:43:26 djm Exp $ */
  2. /*
  3. * Copyright (c) 2019 Google LLC
  4. *
  5. * Permission to use, copy, modify, and distribute this software for any
  6. * purpose with or without fee is hereby granted, provided that the above
  7. * copyright notice and this permission notice appear in all copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  10. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  11. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  12. * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  13. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  14. * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  15. * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  16. */
  17. #ifndef _SSH_SK_H
  18. #define _SSH_SK_H 1
  19. struct sshbuf;
  20. struct sshkey;
  21. struct sk_option;
  22. /* Version of protocol expected from ssh-sk-helper */
  23. #define SSH_SK_HELPER_VERSION 5
  24. /* ssh-sk-helper messages */
  25. #define SSH_SK_HELPER_ERROR 0 /* Only valid H->C */
  26. #define SSH_SK_HELPER_SIGN 1
  27. #define SSH_SK_HELPER_ENROLL 2
  28. #define SSH_SK_HELPER_LOAD_RESIDENT 3
  29. /*
  30. * Enroll (generate) a new security-key hosted private key of given type
  31. * via the specified provider middleware.
  32. * If challenge_buf is NULL then a random 256 bit challenge will be used.
  33. *
  34. * Returns 0 on success or a ssherr.h error code on failure.
  35. *
  36. * If successful and the attest_data buffer is not NULL then attestation
  37. * information is placed there.
  38. */
  39. int sshsk_enroll(int type, const char *provider_path, const char *device,
  40. const char *application, const char *userid, uint8_t flags,
  41. const char *pin, struct sshbuf *challenge_buf,
  42. struct sshkey **keyp, struct sshbuf *attest);
  43. /*
  44. * Calculate an ECDSA_SK or ED25519_SK signature using the specified key
  45. * and provider middleware.
  46. *
  47. * Returns 0 on success or a ssherr.h error code on failure.
  48. */
  49. int sshsk_sign(const char *provider_path, struct sshkey *key,
  50. u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
  51. u_int compat, const char *pin);
  52. /*
  53. * Enumerates and loads all SSH-compatible resident keys from a security
  54. * key.
  55. *
  56. * Returns 0 on success or a ssherr.h error code on failure.
  57. */
  58. int sshsk_load_resident(const char *provider_path, const char *device,
  59. const char *pin, struct sshkey ***keysp, size_t *nkeysp);
  60. #endif /* _SSH_SK_H */