
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
159 строки
6.7 KiB
C
159 строки
6.7 KiB
C
/*
|
|
* This file is part of the SSH Library
|
|
*
|
|
* Copyright (c) 2010 by Aris Adamantiadis
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#ifndef PKI_PRIV_H_
|
|
#define PKI_PRIV_H_
|
|
|
|
#include "libssh/pki.h"
|
|
|
|
/* defined in bcrypt_pbkdf.c */
|
|
int bcrypt_pbkdf(const char *pass,
|
|
size_t passlen,
|
|
const uint8_t *salt,
|
|
size_t saltlen,
|
|
uint8_t *key,
|
|
size_t keylen,
|
|
unsigned int rounds);
|
|
|
|
#define RSA_HEADER_BEGIN "-----BEGIN RSA PRIVATE KEY-----"
|
|
#define RSA_HEADER_END "-----END RSA PRIVATE KEY-----"
|
|
#define DSA_HEADER_BEGIN "-----BEGIN DSA PRIVATE KEY-----"
|
|
#define DSA_HEADER_END "-----END DSA PRIVATE KEY-----"
|
|
#define ECDSA_HEADER_BEGIN "-----BEGIN EC PRIVATE KEY-----"
|
|
#define ECDSA_HEADER_END "-----END EC PRIVATE KEY-----"
|
|
#define OPENSSH_HEADER_BEGIN "-----BEGIN OPENSSH PRIVATE KEY-----"
|
|
#define OPENSSH_HEADER_END "-----END OPENSSH PRIVATE KEY-----"
|
|
/* Magic defined in OpenSSH/PROTOCOL.key */
|
|
#define OPENSSH_AUTH_MAGIC "openssh-key-v1"
|
|
|
|
int pki_key_ecdsa_nid_from_name(const char *name);
|
|
const char *pki_key_ecdsa_nid_to_name(int nid);
|
|
const char *ssh_key_signature_to_char(enum ssh_keytypes_e type,
|
|
enum ssh_digest_e hash_type);
|
|
enum ssh_digest_e ssh_key_type_to_hash(ssh_session session,
|
|
enum ssh_keytypes_e type);
|
|
|
|
/* SSH Key Functions */
|
|
ssh_key pki_key_dup(const ssh_key key, int demote);
|
|
int pki_key_generate_rsa(ssh_key key, int parameter);
|
|
int pki_key_generate_dss(ssh_key key, int parameter);
|
|
int pki_key_generate_ecdsa(ssh_key key, int parameter);
|
|
int pki_key_generate_ed25519(ssh_key key);
|
|
|
|
int pki_key_compare(const ssh_key k1,
|
|
const ssh_key k2,
|
|
enum ssh_keycmp_e what);
|
|
|
|
/* SSH Private Key Functions */
|
|
enum ssh_keytypes_e pki_privatekey_type_from_string(const char *privkey);
|
|
ssh_key pki_private_key_from_base64(const char *b64_key,
|
|
const char *passphrase,
|
|
ssh_auth_callback auth_fn,
|
|
void *auth_data);
|
|
|
|
ssh_string pki_private_key_to_pem(const ssh_key key,
|
|
const char *passphrase,
|
|
ssh_auth_callback auth_fn,
|
|
void *auth_data);
|
|
int pki_import_privkey_buffer(enum ssh_keytypes_e type,
|
|
ssh_buffer buffer,
|
|
ssh_key *pkey);
|
|
|
|
/* SSH Public Key Functions */
|
|
int pki_pubkey_build_dss(ssh_key key,
|
|
ssh_string p,
|
|
ssh_string q,
|
|
ssh_string g,
|
|
ssh_string pubkey);
|
|
int pki_pubkey_build_rsa(ssh_key key,
|
|
ssh_string e,
|
|
ssh_string n);
|
|
int pki_pubkey_build_ecdsa(ssh_key key, int nid, ssh_string e);
|
|
ssh_string pki_publickey_to_blob(const ssh_key key);
|
|
|
|
/* SSH Private Key Functions */
|
|
int pki_privkey_build_dss(ssh_key key,
|
|
ssh_string p,
|
|
ssh_string q,
|
|
ssh_string g,
|
|
ssh_string pubkey,
|
|
ssh_string privkey);
|
|
int pki_privkey_build_rsa(ssh_key key,
|
|
ssh_string n,
|
|
ssh_string e,
|
|
ssh_string d,
|
|
ssh_string iqmp,
|
|
ssh_string p,
|
|
ssh_string q);
|
|
int pki_privkey_build_ecdsa(ssh_key key,
|
|
int nid,
|
|
ssh_string e,
|
|
ssh_string exp);
|
|
ssh_string pki_publickey_to_blob(const ssh_key key);
|
|
|
|
/* SSH Signature Functions */
|
|
ssh_string pki_signature_to_blob(const ssh_signature sign);
|
|
ssh_signature pki_signature_from_blob(const ssh_key pubkey,
|
|
const ssh_string sig_blob,
|
|
enum ssh_keytypes_e type,
|
|
enum ssh_digest_e hash_type);
|
|
int pki_signature_verify(ssh_session session,
|
|
const ssh_signature sig,
|
|
const ssh_key key,
|
|
const unsigned char *hash,
|
|
size_t hlen);
|
|
|
|
/* SSH Signing Functions */
|
|
#define pki_do_sign(key, hash, hlen) \
|
|
pki_do_sign_hash(key, hash, hlen, SSH_DIGEST_AUTO)
|
|
ssh_signature pki_do_sign_hash(const ssh_key privkey,
|
|
const unsigned char *hash,
|
|
size_t hlen,
|
|
enum ssh_digest_e hash_type);
|
|
#define pki_do_sign_sessionid(key, hash, hlen) \
|
|
pki_do_sign_sessionid_hash(key, hash, hlen, SSH_DIGEST_AUTO)
|
|
ssh_signature pki_do_sign_sessionid_hash(const ssh_key key,
|
|
const unsigned char *hash,
|
|
size_t hlen,
|
|
enum ssh_digest_e hash_type);
|
|
int pki_ed25519_sign(const ssh_key privkey, ssh_signature sig,
|
|
const unsigned char *hash, size_t hlen);
|
|
int pki_ed25519_verify(const ssh_key pubkey, ssh_signature sig,
|
|
const unsigned char *hash, size_t hlen);
|
|
int pki_ed25519_key_cmp(const ssh_key k1,
|
|
const ssh_key k2,
|
|
enum ssh_keycmp_e what);
|
|
int pki_ed25519_key_dup(ssh_key new, const ssh_key key);
|
|
int pki_ed25519_public_key_to_blob(ssh_buffer buffer, ssh_key key);
|
|
ssh_string pki_ed25519_sig_to_blob(ssh_signature sig);
|
|
int pki_ed25519_sig_from_blob(ssh_signature sig, ssh_string sig_blob);
|
|
int pki_privkey_build_ed25519(ssh_key key,
|
|
ssh_string pubkey,
|
|
ssh_string privkey);
|
|
|
|
/* PKI Container OpenSSH */
|
|
ssh_key ssh_pki_openssh_pubkey_import(const char *text_key);
|
|
ssh_key ssh_pki_openssh_privkey_import(const char *text_key,
|
|
const char *passphrase, ssh_auth_callback auth_fn, void *auth_data);
|
|
ssh_string ssh_pki_openssh_privkey_export(const ssh_key privkey,
|
|
const char *passphrase, ssh_auth_callback auth_fn, void *auth_data);
|
|
|
|
#endif /* PKI_PRIV_H_ */
|