1/*	$NetBSD: skey.h,v 1.10 2016/01/22 23:25:51 dholland Exp $	*/
2
3/*
4 * S/KEY v1.1b (skey.h)
5 *
6 * Authors:
7 *          Neil M. Haller <nmh@thumper.bellcore.com>
8 *          Philip R. Karn <karn@chicago.qualcomm.com>
9 *          John S. Walden <jsw@thumper.bellcore.com>
10 *
11 * Modifications:
12 *          Scott Chasin <chasin@crimelab.com>
13 *          Todd C. Miller <Todd.Miller@courtesan.com>
14 *
15 * Main client header
16 */
17
18#include <stdio.h>
19
20/* Server-side data structure for reading keys file during login */
21struct skey {
22  FILE *keyfile;
23  char buf[256];
24  char *logname;
25  int n;
26  char *seed;
27  char *val;
28  long recstart;		/* needed so reread of buffer is efficient */
29};
30
31/* Client-side structure for scanning data stream for challenge */
32struct mc {
33  char buf[256];
34  int skip;
35  int cnt;
36};
37
38/* Maximum sequence number we allow */
39#ifndef SKEY_MAX_SEQ
40#define SKEY_MAX_SEQ		10000
41#endif
42
43/* Minimum secret password length (rfc2289) */
44#ifndef SKEY_MIN_PW_LEN
45#define SKEY_MIN_PW_LEN		10
46#endif
47
48/* Max secret password length (rfc2289 says 63 but allows more) */
49#ifndef SKEY_MAX_PW_LEN
50#define SKEY_MAX_PW_LEN		255
51#endif
52
53/* Max length of an S/Key seed (rfc2289) */
54#ifndef SKEY_MAX_SEED_LEN
55#define SKEY_MAX_SEED_LEN	16
56#endif
57
58/* Max length of S/Key challenge (otp-???? 9999 seed) */
59#ifndef SKEY_MAX_CHALLENGE
60#define SKEY_MAX_CHALLENGE     (11 + SKEY_MAX_HASHNAME_LEN + SKEY_MAX_SEED_LEN)
61#endif
62
63/* Max length of hash algorithm name (md4/md5/sha1/rmd160) */
64#define SKEY_MAX_HASHNAME_LEN	6
65
66/* Size of a binary key (not NULL-terminated) */
67#define SKEY_BINKEY_SIZE	8
68
69/* Location of random file for bogus challenges */
70#define _SKEY_RAND_FILE_PATH_	"/var/db/host.random"
71
72/* Prototypes */
73void f(char *);
74int keycrunch(char *, const char *, const char *);
75char *btoe(char *, const char *);
76char *put8(char *, const char *);
77int etob(char *, const char *);
78void rip(char *);
79int skeychallenge(struct skey *, const char *, char *, size_t);
80int skeylookup(struct skey *, const char *);
81int skeyverify(struct skey *, char *);
82void sevenbit(char *);
83void backspace(char *);
84const char *skipspace(const char *);
85char *readpass(char *, int);
86char *readskey(char *, int);
87int skey_authenticate(const char *);
88int skey_passcheck(const char *, char *);
89const char *skey_keyinfo(const char *);
90int skey_haskey(const char *);
91int getskeyprompt(struct skey *, char *, char *);
92int atob8(char *, const char *);
93int btoa8(char *, const char *);
94int htoi(int);
95const char *skey_get_algorithm(void);
96const char *skey_set_algorithm(const char *);
97int skeygetnext(struct skey *);
98int skeyzero(struct skey *, char *);
99