blob: 79eca8cbe566b25f849ca1b013fd19bd6de0f596 [file] [log] [blame]
/**
* \file session_server_ch.h
* \author Michal Vasko <mvasko@cesnet.cz>
* \brief libnetconf2 Call Home session server manipulation
*
* Copyright (c) 2015 CESNET, z.s.p.o.
*
* This source code is licensed under BSD 3-Clause License (the "License").
* You may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://opensource.org/licenses/BSD-3-Clause
*/
#ifndef NC_SESSION_SERVER_CH_H_
#define NC_SESSION_SERVER_CH_H_
#include <stdint.h>
#include <libyang/libyang.h>
#include "session.h"
#include "netconf.h"
#ifdef NC_ENABLED_SSH
/**
* @brief Establish an SSH Call Home connection with a listening NETCONF client.
*
* @param[in] host Host the client is listening on.
* @param[in] port Port the client is listening on.
* @param[out] session New Call Home session.
* @return NC_MSG_HELLO on success, NC_MSG_BAD_HELLO on client \<hello\> message
* parsing fail, NC_MSG_WOULDBLOCK on timeout, NC_MSG_ERROR on other errors.
*/
NC_MSG_TYPE nc_connect_callhome_ssh(const char *host, uint16_t port, struct nc_session **session);
/**
* @brief Set Call Home SSH host keys the server will identify itself with. Each of RSA, DSA, and
* ECDSA keys can be set. If the particular type was already set, it is replaced.
*
* @param[in] privkey_path Path to a private key.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_set_hostkey(const char *privkey_path);
/**
* @brief Set Call Home SSH banner the server will send to every client.
*
* @param[in] banner SSH banner.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_set_banner(const char *banner);
/**
* @brief Set accepted Call Home SSH authentication methods. All (publickey, password, interactive)
* are supported by default.
*
* @param[in] auth_methods Accepted authentication methods bit field of NC_SSH_AUTH_TYPE.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_set_auth_methods(int auth_methods);
/**
* @brief Set Call Home SSH authentication attempts of every client. 3 by default.
*
* @param[in] auth_attempts Failed authentication attempts before a client is dropped.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_set_auth_attempts(uint16_t auth_attempts);
/**
* @brief Set Call Home SSH authentication timeout. 10 seconds by default.
*
* @param[in] auth_timeout Number of seconds before an unauthenticated client is dropped.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_set_auth_timeout(uint16_t auth_timeout);
/**
* @brief Add an authorized Call Home client SSH public key. This public key can be used for
* publickey authentication afterwards.
*
* @param[in] pubkey_path Path to the public key.
* @param[in] username Username that the client with the public key must use.
* @return 0 on success, -1 on error.
*/
int nc_server_ssh_ch_add_authkey(const char *pubkey_path, const char *username);
/**
* @brief Remove an authorized Call Home client SSH public key.
*
* @param[in] pubkey_path Path to an authorized public key. NULL matches all the keys.
* @param[in] username Username for an authorized public key. NULL matches all the usernames.
* @return 0 on success, -1 on not finding any match.
*/
int nc_server_ssh_ch_del_authkey(const char *pubkey_path, const char *username);
/**
* @brief Clear all the SSH Call Home options. Afterwards a new set of options
* can be set for the next client to connect to.
*/
void nc_server_ssh_ch_clear_opts(void);
#endif /* NC_ENABLED_SSH */
#ifdef NC_ENABLED_TLS
/**
* @brief Establish a TLS Call Home connection with a listening NETCONF client.
*
* @param[in] host Host the client is listening on.
* @param[in] port Port the client is listening on.
* @param[out] session New Call Home session.
* @return NC_MSG_HELLO on success, NC_MSG_BAD_HELLO on client \<hello\> message
* parsing fail, NC_MSG_WOULDBLOCK on timeout, NC_MSG_ERROR on other errors.
*/
NC_MSG_TYPE nc_connect_callhome_tls(const char *host, uint16_t port, struct nc_session **session);
/**
* @brief Set server Call Home TLS certificate. Alternative to nc_tls_server_set_cert_path().
* There can only be one certificate for each key type, it is replaced if already set.
*
* @param[in] cert Base64-encoded certificate in ASN.1 DER encoding.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_cert(const char *cert);
/**
* @brief Set server Call Home TLS certificate. Alternative to nc_tls_server_set_cert().
* There can only be one certificate for each key type, it is replaced if already set.
*
* @param[in] cert_path Path to a certificate file in PEM format.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_cert_path(const char *cert_path);
/**
* @brief Set server Call Home TLS private key matching the certificate.
* Alternative to nc_tls_server_set_key_path(). There can only be one of every key
* type, it is replaced if already set.
*
* @param[in] privkey Base64-encoded certificate in ASN.1 DER encoding.
* @param[in] is_rsa Whether \p privkey are the data of an RSA (1) or DSA (0) key.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_key(const char *privkey, int is_rsa);
/**
* @brief Set server Call Home TLS private key matching the certificate.
* Alternative to nc_tls_server_set_key_path(). There can only be one of every key
* type, it is replaced if already set.
*
* @param[in] privkey_path Path to a private key file in PEM format.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_key_path(const char *privkey_path);
/**
* @brief Add a Call Home trusted certificate. Can be both a CA or a client one.
*
* @param[in] cert Base64-enocded certificate in ASN.1 DER encoding.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_add_trusted_cert(const char *cert);
/**
* @brief Add a Call Home trusted certificate. Can be both a CA or a client one.
*
* @param[in] cert_path Path to a trusted certificate file in PEM format.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_add_trusted_cert_path(const char *cert_path);
/**
* @brief Set trusted Call Home Certificate Authority certificate locations. There
* can only be one file and one directory, they are replaced if already set.
*
* @param[in] ca_file Path to a trusted CA cert store file in PEM format.
* Can be NULL.
* @param[in] ca_dir Path to a trusted CA cert store hashed directory
* (c_rehash utility can be used to create hashes)
* with PEM files. Can be NULL.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_trusted_ca_paths(const char *ca_file, const char *ca_dir);
/**
* @brief Destroy and clean all the set Call Home certificates and private keys.
* CRLs and CTN entries are not affected.
*/
void nc_server_tls_ch_clear_certs(void);
/**
* @brief Set Call Home Certificate Revocation List locations. There can only be
* one file and one directory, they are replaced if already set.
*
* @param[in] crl_file Path to a CRL store file in PEM format. Can be NULL.
* @param[in] crl_dir Path to a CRL store hashed directory (c_rehash utility
* can be used to create hashes) with PEM files. Can be NULL.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_set_crl_paths(const char *crl_file, const char *crl_dir);
/**
* @brief Destroy and clean Call Home CRLs. Call Home certificates, private keys,
* and CTN entries are not affected.
*/
void nc_server_tls_ch_clear_crls(void);
/**
* @brief Add a Call Home Cert-to-name entry.
*
* @param[in] id Priority of the entry.
* @param[in] fingerprint Matching certificate fingerprint.
* @param[in] map_type Type of username-certificate mapping.
* @param[in] name Specific username if \p map_type == NC_TLS_CTN_SPECIFED. Must be NULL otherwise.
* @return 0 on success, -1 on error.
*/
int nc_server_tls_ch_add_ctn(uint32_t id, const char *fingerprint, NC_TLS_CTN_MAPTYPE map_type, const char *name);
/**
* @brief Remove a Call Home Cert-to-name entry.
*
* @param[in] id Priority of the entry. -1 matches all the priorities.
* @param[in] fingerprint Fingerprint fo the entry. NULL matches all the fingerprints.
* @param[in] map_type Mapping type of the entry. 0 matches all the mapping types.
* @param[in] name Specific username for the entry. NULL matches all the usernames.
* @return 0 on success, -1 on not finding any match.
*/
int nc_server_tls_ch_del_ctn(int64_t id, const char *fingerprint, NC_TLS_CTN_MAPTYPE map_type, const char *name);
/**
* @brief Clear all the TLS Call Home options. Afterwards a new set of options
* can be set for the next client to connect.
*/
void nc_server_tls_ch_clear_opts(void);
#endif /* NC_ENABLED_TLS */
#endif /* NC_SESSION_SERVER_CH_H_ */