[BACK]Return to ssh-sk.h CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/ssh-sk.h, Revision 1.6

1.6     ! djm         1: /* $OpenBSD: ssh-sk.h,v 1.5 2019/11/12 19:31:45 markus Exp $ */
1.1       djm         2: /*
                      3:  * Copyright (c) 2019 Google LLC
                      4:  *
                      5:  * Permission to use, copy, modify, and distribute this software for any
                      6:  * purpose with or without fee is hereby granted, provided that the above
                      7:  * copyright notice and this permission notice appear in all copies.
                      8:  *
                      9:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
                     10:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
                     11:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
                     12:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
                     13:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
                     14:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
                     15:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
                     16:  */
                     17:
                     18: #ifndef _SSH_SK_H
                     19: #define _SSH_SK_H 1
                     20:
                     21: struct sshbuf;
                     22: struct sshkey;
1.2       djm        23:
1.1       djm        24: /*
1.5       markus     25:  * Enroll (generate) a new security-key hosted private key of given type
                     26:  * via the specified provider middleware.
1.1       djm        27:  * If challenge_buf is NULL then a random 256 bit challenge will be used.
                     28:  *
                     29:  * Returns 0 on success or a ssherr.h error code on failure.
                     30:  *
                     31:  * If successful and the attest_data buffer is not NULL then attestation
                     32:  * information is placed there.
                     33:  */
1.5       markus     34: int sshsk_enroll(int type, const char *provider_path, const char *application,
1.1       djm        35:     uint8_t flags, struct sshbuf *challenge_buf, struct sshkey **keyp,
                     36:     struct sshbuf *attest);
                     37:
                     38: /*
1.4       markus     39:  * Calculate an ECDSA_SK or ED25519_SK signature using the specified key
1.3       markus     40:  * and provider middleware.
1.1       djm        41:  *
                     42:  * Returns 0 on success or a ssherr.h error code on failure.
                     43:  */
1.6     ! djm        44: int sshsk_sign(const char *provider_path, struct sshkey *key,
1.1       djm        45:     u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
                     46:     u_int compat);
                     47:
                     48: #endif /* _SSH_SK_H */
                     49: