source: trunk/third/openssh/kex.h @ 22574

Revision 22574, 3.9 KB checked in by ghudson, 18 years ago (diff)
Merge with OpenSSH 4.2p1. Merge work was done in the svn repository in /afs/dev.mit.edu/project/openssh, and was based on patches from Simon Wilkinson and the krb5 team to add GSSAPI key exchange support and compatibility with OpenSSH 3.5.
Line 
1/*      $OpenBSD: kex.h,v 1.37 2005/07/25 11:59:39 markus Exp $ */
2
3/*
4 * Copyright (c) 2000, 2001 Markus Friedl.  All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 *    notice, this list of conditions and the following disclaimer in the
13 *    documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26#ifndef KEX_H
27#define KEX_H
28
29#include <openssl/evp.h>
30#include "buffer.h"
31#include "cipher.h"
32#include "key.h"
33
34#define KEX_DH1         "diffie-hellman-group1-sha1"
35#define KEX_DH14        "diffie-hellman-group14-sha1"
36#define KEX_DHGEX       "diffie-hellman-group-exchange-sha1"
37
38#define COMP_NONE       0
39#define COMP_ZLIB       1
40#define COMP_DELAYED    2
41
42enum kex_init_proposals {
43        PROPOSAL_KEX_ALGS,
44        PROPOSAL_SERVER_HOST_KEY_ALGS,
45        PROPOSAL_ENC_ALGS_CTOS,
46        PROPOSAL_ENC_ALGS_STOC,
47        PROPOSAL_MAC_ALGS_CTOS,
48        PROPOSAL_MAC_ALGS_STOC,
49        PROPOSAL_COMP_ALGS_CTOS,
50        PROPOSAL_COMP_ALGS_STOC,
51        PROPOSAL_LANG_CTOS,
52        PROPOSAL_LANG_STOC,
53        PROPOSAL_MAX
54};
55
56enum kex_modes {
57        MODE_IN,
58        MODE_OUT,
59        MODE_MAX
60};
61
62enum kex_exchange {
63        KEX_DH_GRP1_SHA1,
64        KEX_DH_GRP14_SHA1,
65        KEX_DH_GEX_SHA1,
66        KEX_GSS_GRP1_SHA1,
67        KEX_MAX
68};
69
70#define KEX_INIT_SENT   0x0001
71
72typedef struct Kex Kex;
73typedef struct Mac Mac;
74typedef struct Comp Comp;
75typedef struct Enc Enc;
76typedef struct Newkeys Newkeys;
77
78struct Enc {
79        char    *name;
80        Cipher  *cipher;
81        int     enabled;
82        u_int   key_len;
83        u_int   block_size;
84        u_char  *key;
85        u_char  *iv;
86};
87struct Mac {
88        char    *name;
89        int     enabled;
90        const EVP_MD    *md;
91        u_int   mac_len;
92        u_char  *key;
93        u_int   key_len;
94};
95struct Comp {
96        int     type;
97        int     enabled;
98        char    *name;
99};
100struct Newkeys {
101        Enc     enc;
102        Mac     mac;
103        Comp    comp;
104};
105struct Kex {
106        u_char  *session_id;
107        u_int   session_id_len;
108        Newkeys *newkeys[MODE_MAX];
109        u_int   we_need;
110        int     server;
111        char    *name;
112        int     hostkey_type;
113        int     kex_type;
114        Buffer  my;
115        Buffer  peer;
116        int     done;
117        int     flags;
118#ifdef GSSAPI
119        int gss_deleg_creds;
120#endif
121        char    *client_version_string;
122        char    *server_version_string;
123        int     (*verify_host_key)(Key *);
124        Key     *(*load_host_key)(int);
125        int     (*host_key_index)(Key *);
126        void    (*kex[KEX_MAX])(Kex *);
127};
128
129Kex     *kex_setup(char *[PROPOSAL_MAX]);
130void     kex_finish(Kex *);
131
132void     kex_send_kexinit(Kex *);
133void     kex_input_kexinit(int, u_int32_t, void *);
134void     kex_derive_keys(Kex *, u_char *, BIGNUM *);
135
136Newkeys *kex_get_newkeys(int);
137
138void     kexdh_client(Kex *);
139void     kexdh_server(Kex *);
140void     kexgex_client(Kex *);
141void     kexgex_server(Kex *);
142#ifdef GSSAPI
143void     kexgss_client(Kex *);
144void     kexgss_server(Kex *);
145#endif
146
147u_char *
148kex_dh_hash(char *, char *, char *, int, char *, int, u_char *, int,
149    BIGNUM *, BIGNUM *, BIGNUM *);
150u_char *
151kexgex_hash(char *, char *, char *, int, char *, int, u_char *, int,
152    int, int, int, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *);
153
154void
155derive_ssh1_session_id(BIGNUM *, BIGNUM *, u_int8_t[8], u_int8_t[16]);
156
157#if defined(DEBUG_KEX) || defined(DEBUG_KEXDH)
158void    dump_digest(char *, u_char *, int);
159#endif
160
161#endif
Note: See TracBrowser for help on using the repository browser.