Annotation of src/usr.bin/ssh/auth.h, Revision 1.21
1.5 deraadt 1: /*
2: * Copyright (c) 2000 Markus Friedl. All rights reserved.
3: *
4: * Redistribution and use in source and binary forms, with or without
5: * modification, are permitted provided that the following conditions
6: * are met:
7: * 1. Redistributions of source code must retain the above copyright
8: * notice, this list of conditions and the following disclaimer.
9: * 2. Redistributions in binary form must reproduce the above copyright
10: * notice, this list of conditions and the following disclaimer in the
11: * documentation and/or other materials provided with the distribution.
12: *
13: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.7 djm 23: *
1.21 ! dugsong 24: * $OpenBSD: auth.h,v 1.20 2001/06/26 06:32:47 itojun Exp $
1.5 deraadt 25: */
1.1 markus 26: #ifndef AUTH_H
27: #define AUTH_H
28:
1.18 markus 29: #include "key.h"
30: #include "hostfile.h"
1.10 markus 31: #include <openssl/rsa.h>
32:
1.13 markus 33: #ifdef HAVE_LOGIN_CAP
34: #include <login_cap.h>
35: #endif
36: #ifdef BSD_AUTH
37: #include <bsd_auth.h>
38: #endif
1.21 ! dugsong 39: #ifdef KRB5
! 40: #include <krb5.h>
! 41: #endif
1.13 markus 42:
1.6 markus 43: typedef struct Authctxt Authctxt;
1.16 markus 44: typedef struct KbdintDevice KbdintDevice;
45:
1.6 markus 46: struct Authctxt {
1.21 ! dugsong 47: int success;
! 48: int postponed;
! 49: int valid;
! 50: int attempt;
! 51: int failures;
! 52: char *user;
! 53: char *service;
! 54: struct passwd *pw;
! 55: char *style;
! 56: void *kbdintctxt;
1.13 markus 57: #ifdef BSD_AUTH
1.21 ! dugsong 58: auth_session_t *as;
! 59: #endif
! 60: #ifdef KRB4
! 61: char *krb4_ticket_file;
! 62: #endif
! 63: #ifdef KRB5
! 64: krb5_context krb5_ctx;
! 65: krb5_auth_context krb5_auth_ctx;
! 66: krb5_ccache krb5_fwd_ccache;
! 67: krb5_principal krb5_user;
! 68: char *krb5_ticket_file;
1.13 markus 69: #endif
1.6 markus 70: };
1.10 markus 71:
72: /*
1.16 markus 73: * Keyboard interactive device:
74: * init_ctx returns: non NULL upon success
75: * query returns: 0 - success, otherwise failure
76: * respond returns: 0 - success, 1 - need further interaction,
77: * otherwise - failure
78: */
79: struct KbdintDevice
80: {
81: const char *name;
82: void* (*init_ctx) __P((Authctxt*));
83: int (*query) __P((void *ctx, char **name, char **infotxt,
84: u_int *numprompts, char ***prompts,
85: u_int **echo_on));
86: int (*respond) __P((void *ctx, u_int numresp, char **responses));
87: void (*free_ctx) __P((void *ctx));
88: };
89:
90: /*
1.10 markus 91: * Tries to authenticate the user using the .rhosts file. Returns true if
92: * authentication succeeds. If ignore_rhosts is non-zero, this will not
93: * consider .rhosts and .shosts (/etc/hosts.equiv will still be used).
94: */
1.20 itojun 95: int auth_rhosts(struct passwd *, const char *);
1.15 markus 96:
97: /* extended interface similar to auth_rhosts() */
98: int
1.20 itojun 99: auth_rhosts2(struct passwd *, const char *, const char *, const char *);
1.10 markus 100:
101: /*
102: * Tries to authenticate the user using the .rhosts file and the host using
103: * its host key. Returns true if authentication succeeds.
104: */
105: int
1.20 itojun 106: auth_rhosts_rsa(struct passwd *, const char *, RSA *);
1.10 markus 107:
108: /*
109: * Tries to authenticate the user using password. Returns true if
110: * authentication succeeds.
111: */
1.20 itojun 112: int auth_password(Authctxt *, const char *);
1.10 markus 113:
114: /*
115: * Performs the RSA authentication dialog with the client. This returns 0 if
116: * the client could not be authenticated, and 1 if authentication was
117: * successful. This may exit if there is a serious protocol violation.
118: */
1.20 itojun 119: int auth_rsa(struct passwd *, BIGNUM *);
1.10 markus 120:
121: /*
122: * Parses an RSA key (number of bits, e, n) from a string. Moves the pointer
123: * over the key. Skips any whitespace at the beginning and at end.
124: */
1.20 itojun 125: int auth_rsa_read_key(char **, u_int *, BIGNUM *, BIGNUM *);
1.10 markus 126:
127: /*
128: * Performs the RSA authentication challenge-response dialog with the client,
129: * and returns true (non-zero) if the client gave the correct answer to our
130: * challenge; returns zero if the client gives a wrong answer.
131: */
1.20 itojun 132: int auth_rsa_challenge_dialog(RSA *);
1.10 markus 133:
134: #ifdef KRB4
135: #include <krb.h>
136: /*
137: * Performs Kerberos v4 mutual authentication with the client. This returns 0
138: * if the client could not be authenticated, and 1 if authentication was
139: * successful. This may exit if there is a serious protocol violation.
140: */
1.21 ! dugsong 141: int auth_krb4(Authctxt *, KTEXT, char **);
! 142: int auth_krb4_password(Authctxt *, const char *);
1.20 itojun 143: void krb4_cleanup_proc(void *);
1.10 markus 144:
145: #ifdef AFS
146: #include <kafs.h>
147:
148: /* Accept passed Kerberos v4 ticket-granting ticket and AFS tokens. */
1.21 ! dugsong 149: int auth_krb4_tgt(Authctxt *, const char *);
! 150: int auth_afs_token(Authctxt *, const char *);
1.10 markus 151: #endif /* AFS */
152:
153: #endif /* KRB4 */
1.21 ! dugsong 154:
! 155: #ifdef KRB5
! 156: int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client);
! 157: int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
! 158: int auth_krb5_password(Authctxt *authctxt, const char *password);
! 159: void krb5_cleanup_proc(void *authctxt);
! 160: #endif /* KRB5 */
1.6 markus 161:
1.1 markus 162: void do_authentication(void);
1.2 markus 163: void do_authentication2(void);
164:
1.9 markus 165: Authctxt *authctxt_new(void);
1.20 itojun 166: void auth_log(Authctxt *, int, char *, char *);
167: void userauth_finish(Authctxt *, int, char *);
168: int auth_root_allowed(char *);
1.6 markus 169:
1.20 itojun 170: int auth2_challenge(Authctxt *, char *);
1.1 markus 171:
1.20 itojun 172: int allowed_user(struct passwd *);
1.9 markus 173:
1.20 itojun 174: char *get_challenge(Authctxt *);
175: int verify_response(Authctxt *, const char *);
1.9 markus 176:
1.6 markus 177: struct passwd * auth_get_user(void);
1.17 markus 178:
179: /* expand a filename - return buffer is allocated by xmalloc */
1.20 itojun 180: char *expand_filename(const char *, struct passwd *);
181: char *authorized_keys_file(struct passwd *);
182: char *authorized_keys_file2(struct passwd *);
1.17 markus 183:
184: /* check a file and the path to it */
185: int
1.20 itojun 186: secure_filename(FILE *, const char *, struct passwd *, char *, size_t);
1.18 markus 187:
188: /* helper for hostbased auth */
189: HostStatus
1.20 itojun 190: check_key_in_hostfiles(struct passwd *, Key *, const char *,
191: const char *, const char *);
1.3 markus 192:
193: #define AUTH_FAIL_MAX 6
194: #define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2)
195: #define AUTH_FAIL_MSG "Too many authentication failures for %.100s"
196:
1.1 markus 197: #endif