Home | History | Annotate | Line # | Download | only in libskey
      1 /*	$NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $	*/
      2 
      3 /*
      4  * S/KEY v1.1b (skey.h)
      5  *
      6  * Authors:
      7  *          Neil M. Haller <nmh (at) thumper.bellcore.com>
      8  *          Philip R. Karn <karn (at) chicago.qualcomm.com>
      9  *          John S. Walden <jsw (at) thumper.bellcore.com>
     10  *
     11  * Modifications:
     12  *          Scott Chasin <chasin (at) crimelab.com>
     13  *          Todd C. Miller <Todd.Miller (at) courtesan.com>
     14  *
     15  * Main client header
     16  */
     17 
     18 #include <stdio.h>
     19 
     20 /* Server-side data structure for reading keys file during login */
     21 struct skey {
     22   FILE *keyfile;
     23   char buf[256];
     24   char *logname;
     25   int n;
     26   char *seed;
     27   char *val;
     28   long recstart;		/* needed so reread of buffer is efficient */
     29 };
     30 
     31 /* Client-side structure for scanning data stream for challenge */
     32 struct mc {
     33   char buf[256];
     34   int skip;
     35   int cnt;
     36 };
     37 
     38 /* Maximum sequence number we allow */
     39 #ifndef SKEY_MAX_SEQ
     40 #define SKEY_MAX_SEQ		10000
     41 #endif
     42 
     43 /* Minimum secret password length (rfc2289) */
     44 #ifndef SKEY_MIN_PW_LEN
     45 #define SKEY_MIN_PW_LEN		10
     46 #endif
     47 
     48 /* Max secret password length (rfc2289 says 63 but allows more) */
     49 #ifndef SKEY_MAX_PW_LEN
     50 #define SKEY_MAX_PW_LEN		255
     51 #endif
     52 
     53 /* Max length of an S/Key seed (rfc2289) */
     54 #ifndef SKEY_MAX_SEED_LEN
     55 #define SKEY_MAX_SEED_LEN	16
     56 #endif
     57 
     58 /* Max length of S/Key challenge (otp-???? 9999 seed) */
     59 #ifndef SKEY_MAX_CHALLENGE
     60 #define SKEY_MAX_CHALLENGE     (11 + SKEY_MAX_HASHNAME_LEN + SKEY_MAX_SEED_LEN)
     61 #endif
     62 
     63 /* Max length of hash algorithm name (md4/md5/sha1/rmd160) */
     64 #define SKEY_MAX_HASHNAME_LEN	6
     65 
     66 /* Size of a binary key (not NULL-terminated) */
     67 #define SKEY_BINKEY_SIZE	8
     68 
     69 /* Location of random file for bogus challenges */
     70 #define _SKEY_RAND_FILE_PATH_	"/var/db/host.random"
     71 
     72 /* Prototypes */
     73 void f(char *);
     74 int keycrunch(char *, const char *, const char *);
     75 char *btoe(char *, const char *);
     76 char *put8(char *, const char *);
     77 int etob(char *, const char *);
     78 void rip(char *);
     79 int skeychallenge(struct skey *, const char *, char *, size_t);
     80 int skeylookup(struct skey *, const char *);
     81 int skeyverify(struct skey *, char *);
     82 void sevenbit(char *);
     83 void backspace(char *);
     84 const char *skipspace(const char *);
     85 char *readpass(char *, int);
     86 char *readskey(char *, int);
     87 int skey_authenticate(const char *);
     88 int skey_passcheck(const char *, char *);
     89 const char *skey_keyinfo(const char *);
     90 int skey_haskey(const char *);
     91 int getskeyprompt(struct skey *, char *, char *);
     92 int atob8(char *, const char *);
     93 int btoa8(char *, const char *);
     94 int htoi(int);
     95 const char *skey_get_algorithm(void);
     96 const char *skey_set_algorithm(const char *);
     97 int skeygetnext(struct skey *);
     98 int skeyzero(struct skey *, char *);
     99