blob: 44bc20bda29009babdc89ed6d7f895b84c2b92d0 [file] [log] [blame]
Michal Vasko45f298f2016-01-29 10:26:26 +01001/**
Michal Vaskoc446a382021-06-18 08:54:05 +02002 * @file session_client_ch.h
3 * @author Michal Vasko <mvasko@cesnet.cz>
4 * @brief libnetconf2 Call Home session client manipulation
Michal Vasko45f298f2016-01-29 10:26:26 +01005 *
Michal Vasko95ea9ff2021-11-09 12:29:14 +01006 * @copyright
Michal Vasko94d61402023-03-16 08:21:52 +01007 * Copyright (c) 2015 - 2023 CESNET, z.s.p.o.
Michal Vasko45f298f2016-01-29 10:26:26 +01008 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +01009 * This source code is licensed under BSD 3-Clause License (the "License").
10 * You may not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
Michal Vaskoafd416b2016-02-25 14:51:46 +010012 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +010013 * https://opensource.org/licenses/BSD-3-Clause
Michal Vasko45f298f2016-01-29 10:26:26 +010014 */
15
16#ifndef NC_SESSION_CLIENT_CH_H_
17#define NC_SESSION_CLIENT_CH_H_
18
Michal Vaskoc09730e2019-01-17 10:07:26 +010019#ifdef __cplusplus
20extern "C" {
21#endif
22
Michal Vasko45f298f2016-01-29 10:26:26 +010023#include <libyang/libyang.h>
24
roman2eab4742023-06-06 10:00:26 +020025#ifdef NC_ENABLED_SSH_TLS
Michal Vaskoc446a382021-06-18 08:54:05 +020026# include <libssh/libssh.h>
roman2eab4742023-06-06 10:00:26 +020027#endif /* NC_ENABLED_SSH_TLS */
Michal Vaskoc446a382021-06-18 08:54:05 +020028
Michal Vasko45f298f2016-01-29 10:26:26 +010029#include "messages_client.h"
Michal Vaskob83a3fa2021-05-26 09:53:42 +020030#include "netconf.h"
31#include "session.h"
Michal Vasko45f298f2016-01-29 10:26:26 +010032
roman2eab4742023-06-06 10:00:26 +020033#ifdef NC_ENABLED_SSH_TLS
Michal Vasko45f298f2016-01-29 10:26:26 +010034
35/**
Radek Krejci6799a052017-05-19 14:23:23 +020036 * @defgroup client_ch Client-side Call Home
37 * @ingroup client
38 *
39 * @brief Call Home functionality for client-side applications.
40 * @{
41 */
42
43/**
Michal Vasko45f298f2016-01-29 10:26:26 +010044 * @brief Accept a Call Home connection on any of the listening binds.
45 *
46 * @param[in] timeout Timeout for receiving a new connection in milliseconds, 0 for
Michal Vasko94d61402023-03-16 08:21:52 +010047 * non-blocking call, -1 for infinite waiting.
48 * @param[in,out] ctx Optional custom context to use for the session. If not set, a default context is created.
49 * Any YANG modules not present in the context and supported by the server are loaded using \<get-schema\>
50 * (if supported) and/or by searching the searchpath (see ::nc_client_set_schema_searchpath()).
Michal Vasko45f298f2016-01-29 10:26:26 +010051 * @param[out] session New session.
Michal Vaskof0537d82016-01-29 14:42:38 +010052 * @return 1 on success, 0 on timeout, -1 on error.
Michal Vasko45f298f2016-01-29 10:26:26 +010053 */
54int nc_accept_callhome(int timeout, struct ly_ctx *ctx, struct nc_session **session);
55
Michal Vaskoc446a382021-06-18 08:54:05 +020056/** @} Client-side Call Home */
Radek Krejci6799a052017-05-19 14:23:23 +020057
Michal Vasko45f298f2016-01-29 10:26:26 +010058/**
Radek Krejci6799a052017-05-19 14:23:23 +020059 * @defgroup client_ch_ssh Client-side Call Home on SSH
60 * @ingroup client_ch
61 *
62 * @brief SSH settings for the Call Home functionality
63 * @{
64 */
65
66/**
Michal Vasko30e2c872016-02-18 10:03:21 +010067 * @brief Set SSH Call Home password authentication callback.
68 *
Radek Krejci90a84a22017-05-25 13:53:00 +020069 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
70 * freeing the private data when necessary (the private data can be obtained by
71 * nc_client_ssh_ch_get_auth_password_clb()).
72 *
Michal Vaskofdfd9dd2016-02-29 10:18:46 +010073 * @param[in] auth_password Function to call, returns the password for username\@hostname.
Michal Vasko94d61402023-03-16 08:21:52 +010074 * If NULL, the default callback is set.
Radek Krejci90a84a22017-05-25 13:53:00 +020075 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +010076 */
Radek Krejci90a84a22017-05-25 13:53:00 +020077void nc_client_ssh_ch_set_auth_password_clb(char *(*auth_password)(const char *username, const char *hostname, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +020078 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +020079
80/**
81 * @brief Get currently set SSH Call Home password authentication callback and its private data
82 * previously set by nc_client_ssh_ch_set_auth_password_clb().
83 *
84 * @param[out] auth_password Currently set callback, NULL in case of the default callback.
85 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
86 */
87void nc_client_ssh_ch_get_auth_password_clb(char *(**auth_password)(const char *username, const char *hostname, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +020088 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +010089
90/**
91 * @brief Set SSH Call Home interactive authentication callback.
92 *
Radek Krejci90a84a22017-05-25 13:53:00 +020093 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
94 * freeing the private data when necessary (the private data can be obtained by
95 * nc_client_ssh_ch_get_auth_interactive_clb()).
96 *
Michal Vasko30e2c872016-02-18 10:03:21 +010097 * @param[in] auth_interactive Function to call for every question, returns the answer for
Michal Vasko94d61402023-03-16 08:21:52 +010098 * authentication name with instruction and echoing prompt. If NULL, the default callback is set.
Radek Krejci90a84a22017-05-25 13:53:00 +020099 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +0100100 */
101void nc_client_ssh_ch_set_auth_interactive_clb(char *(*auth_interactive)(const char *auth_name, const char *instruction,
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200102 const char *prompt, int echo, void *priv),
103 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +0200104
105/**
106 * @brief Get currently set SSH Call Home interactive authentication callback and its private data
107 * previously set by nc_client_ssh_ch_set_auth_interactive_clb().
108 *
109 * @param[out] auth_interactive Currently set callback, NULL in case of the default callback.
110 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
111 */
112void nc_client_ssh_ch_get_auth_interactive_clb(char *(**auth_interactive)(const char *auth_name, const char *instruction,
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200113 const char *prompt, int echo, void *priv),
114 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +0100115
116/**
117 * @brief Set SSH Call Home publickey authentication encrypted private key passphrase callback.
118 *
Radek Krejci90a84a22017-05-25 13:53:00 +0200119 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
120 * freeing the private data when necessary (the private data can be obtained by
121 * nc_client_ssh_ch_get_auth_privkey_passphrase_clb()).
122 *
Michal Vasko94d61402023-03-16 08:21:52 +0100123 * @param[in] auth_privkey_passphrase Function to call for every question, returns the passphrase for the specific
124 * private key.
Radek Krejci90a84a22017-05-25 13:53:00 +0200125 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +0100126 */
Radek Krejci90a84a22017-05-25 13:53:00 +0200127void nc_client_ssh_ch_set_auth_privkey_passphrase_clb(char *(*auth_privkey_passphrase)(const char *privkey_path, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200128 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +0200129
130/**
131 * @brief Get currently set SSH Call Home publickey authentication encrypted private key passphrase callback and its
132 * private data previously set by nc_client_ssh_ch_set_auth_privkey_passphrase_clb().
133 *
134 * @param[out] auth_privkey_passphrase Currently set callback, NULL in case of the default callback.
135 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
136 */
137void nc_client_ssh_ch_get_auth_privkey_passphrase_clb(char *(**auth_privkey_passphrase)(const char *privkey_path, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200138 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +0100139
140/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100141 * @brief Add a new client bind and start listening on it for SSH Call Home connections.
142 *
143 * @param[in] address IP address to bind to.
144 * @param[in] port Port to bind to.
145 * @return 0 on success, -1 on error.
146 */
147int nc_client_ssh_ch_add_bind_listen(const char *address, uint16_t port);
148
149/**
150 * @brief Remove an SSH listening client bind.
151 *
152 * @param[in] address IP address the socket was bound to. NULL matches all.
153 * @param[in] port Port the socket was bound to. 0 matches all.
154 * @return 0 on success, -1 on not found.
155 */
156int nc_client_ssh_ch_del_bind(const char *address, uint16_t port);
157
158/**
159 * @brief Add an SSH public and private key pair to be used for Call Home client authentication.
160 *
161 * Private key can be encrypted, the passphrase will be asked for before using it.
162 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100163 * @param[in] pub_key Path to the public key.
164 * @param[in] priv_key Path to the private key.
Michal Vaskof0537d82016-01-29 14:42:38 +0100165 * @return 0 on success, -1 on error.
Michal Vasko45f298f2016-01-29 10:26:26 +0100166 */
167int nc_client_ssh_ch_add_keypair(const char *pub_key, const char *priv_key);
168
169/**
170 * @brief Remove an SSH public and private key pair that was used for Call Home client authentication.
171 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100172 * @param[in] idx Index of the keypair starting with 0.
Michal Vasko45f298f2016-01-29 10:26:26 +0100173 * @return 0 on success, -1 on error.
174 */
175int nc_client_ssh_ch_del_keypair(int idx);
176
177/**
178 * @brief Get the number of public an private key pairs set to be used for Call Home client authentication.
179 *
180 * @return Keypair count.
181 */
182int nc_client_ssh_ch_get_keypair_count(void);
183
184/**
185 * @brief Get a specific keypair set to be used for Call Home client authentication.
186 *
187 * @param[in] idx Index of the specific keypair.
188 * @param[out] pub_key Path to the public key.
189 * @param[out] priv_key Path to the private key.
Michal Vasko45f298f2016-01-29 10:26:26 +0100190 * @return 0 on success, -1 on error.
191 */
192int nc_client_ssh_ch_get_keypair(int idx, const char **pub_key, const char **priv_key);
193
194/**
195 * @brief Set SSH Call Home authentication method preference.
196 *
Radek Krejci62aa0642017-05-25 16:33:49 +0200197 * The default preference is as follows:
198 * - public key authentication (3)
199 * - password authentication (2)
200 * - interactive authentication (1)
201 *
202 * @param[in] auth_type Authentication method to modify the preference of.
Michal Vaskoc446a382021-06-18 08:54:05 +0200203 * @param[in] pref Preference of @p auth_type. Higher number increases priority, negative values disable the method.
Michal Vasko45f298f2016-01-29 10:26:26 +0100204 */
205void nc_client_ssh_ch_set_auth_pref(NC_SSH_AUTH_TYPE auth_type, int16_t pref);
206
207/**
208 * @brief Get SSH Call Home authentication method preference.
209 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100210 * @param[in] auth_type Authentication method to retrieve the prefrence of.
Michal Vaskoc446a382021-06-18 08:54:05 +0200211 * @return Preference of the @p auth_type.
Michal Vasko45f298f2016-01-29 10:26:26 +0100212 */
213int16_t nc_client_ssh_ch_get_auth_pref(NC_SSH_AUTH_TYPE auth_type);
214
215/**
216 * @brief Set client Call Home SSH username used for authentication.
217 *
218 * @param[in] username Username to use.
219 * @return 0 on success, -1 on error.
220 */
221int nc_client_ssh_ch_set_username(const char *username);
222
Michal Vaskoe22c6732016-01-29 11:03:02 +0100223/**
224 * @brief Get client Call Home SSH username used for authentication.
225 *
226 * @return Username used.
227 */
228const char *nc_client_ssh_ch_get_username(void);
229
Michal Vaskoc446a382021-06-18 08:54:05 +0200230/** @} Client-side Call Home on SSH */
Radek Krejci6799a052017-05-19 14:23:23 +0200231
Michal Vasko45f298f2016-01-29 10:26:26 +0100232/**
Radek Krejci6799a052017-05-19 14:23:23 +0200233 * @defgroup client_ch_tls Client-side Call Home on TLS
234 * @ingroup client_ch
235 *
236 * @brief TLS settings for the Call Home functionality
237 * @{
238 */
239
240/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100241 * @brief Add a new client bind and start listening on it for TLS Call Home connections.
242 *
243 * @param[in] address IP address to bind to.
244 * @param[in] port Port to bind to.
245 * @return 0 on success, -1 on error.
246 */
247int nc_client_tls_ch_add_bind_listen(const char *address, uint16_t port);
248
249/**
Michal Vasko9d4cca52022-09-07 11:19:57 +0200250 * @brief Add a new client bind and start listening on it for TLS Call Home connections coming from the specified hostname.
251 *
252 * @param[in] address IP address to bind to.
253 * @param[in] port Port to bind to.
Michal Vaskob8f1fa12022-09-07 11:47:42 +0200254 * @param[in] hostname Expected server hostname, verified by TLS when connecting to it. If NULL, the check is skipped.
Michal Vasko9d4cca52022-09-07 11:19:57 +0200255 * @return 0 on success, -1 on error.
256 */
257int nc_client_tls_ch_add_bind_hostname_listen(const char *address, uint16_t port, const char *hostname);
258
259/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100260 * @brief Remove a TLS listening client bind.
261 *
262 * @param[in] address IP address the socket was bound to. NULL matches all.
263 * @param[in] port Port the socket was bound to. 0 matches all.
264 * @return 0 on success, -1 on not found.
265 */
266int nc_client_tls_ch_del_bind(const char *address, uint16_t port);
267
268/**
269 * @brief Set client Call Home authentication identity - a certificate and a private key.
270 *
Michal Vaskoe22c6732016-01-29 11:03:02 +0100271 * @param[in] client_cert Path to the file containing the client certificate.
Michal Vaskoc446a382021-06-18 08:54:05 +0200272 * @param[in] client_key Path to the file containing the private key for the @p client_cert.
Michal Vasko94d61402023-03-16 08:21:52 +0100273 * If NULL, key is expected to be stored with @p client_cert.
Michal Vasko45f298f2016-01-29 10:26:26 +0100274 * @return 0 on success, -1 on error.
275 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100276int nc_client_tls_ch_set_cert_key_paths(const char *client_cert, const char *client_key);
277
278/**
279 * @brief Get client Call Home authentication identity - a certificate and a private key.
280 *
Michal Vaskoe22c6732016-01-29 11:03:02 +0100281 * @param[out] client_cert Path to the file containing the client certificate. Can be NULL.
Michal Vasko94d61402023-03-16 08:21:52 +0100282 * @param[out] client_key Path to the file containing the private key for the @p client_cert. Can be NULL.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100283 */
284void nc_client_tls_ch_get_cert_key_paths(const char **client_cert, const char **client_key);
Michal Vasko45f298f2016-01-29 10:26:26 +0100285
286/**
287 * @brief Set client Call Home trusted CA certificates.
288 *
289 * @param[in] ca_file Location of the CA certificate file used to verify server certificates.
Michal Vasko94d61402023-03-16 08:21:52 +0100290 * For more info, see the documentation for SSL_CTX_load_verify_locations() from OpenSSL.
Michal Vasko45f298f2016-01-29 10:26:26 +0100291 * @param[in] ca_dir Location of the CA certificates directory used to verify the server certificates.
Michal Vasko94d61402023-03-16 08:21:52 +0100292 * For more info, see the documentation for SSL_CTX_load_verify_locations() from OpenSSL.
Michal Vasko45f298f2016-01-29 10:26:26 +0100293 * @return 0 on success, -1 on error.
294 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100295int nc_client_tls_ch_set_trusted_ca_paths(const char *ca_file, const char *ca_dir);
296
297/**
298 * @brief Get client Call Home trusted CA certificates.
299 *
Michal Vasko94d61402023-03-16 08:21:52 +0100300 * @param[out] ca_file Location of the CA certificate file used to verify server certificates. Can be NULL.
301 * @param[out] ca_dir Location of the CA certificates directory used to verify the server certificates. Can be NULL.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100302 */
303void nc_client_tls_ch_get_trusted_ca_paths(const char **ca_file, const char **ca_dir);
Michal Vasko45f298f2016-01-29 10:26:26 +0100304
305/**
roman15fbc592024-07-02 16:01:23 +0200306 * @brief Deprecated.
Michal Vasko45f298f2016-01-29 10:26:26 +0100307 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100308int nc_client_tls_ch_set_crl_paths(const char *crl_file, const char *crl_dir);
309
310/**
roman15fbc592024-07-02 16:01:23 +0200311 * @brief Deprecated.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100312 */
313void nc_client_tls_ch_get_crl_paths(const char **crl_file, const char **crl_dir);
Michal Vasko45f298f2016-01-29 10:26:26 +0100314
Michal Vaskoc446a382021-06-18 08:54:05 +0200315/** @} Client-side Call Home on TLS */
Radek Krejci6799a052017-05-19 14:23:23 +0200316
roman2eab4742023-06-06 10:00:26 +0200317#endif /* NC_ENABLED_SSH_TLS */
Michal Vasko45f298f2016-01-29 10:26:26 +0100318
Michal Vaskoc09730e2019-01-17 10:07:26 +0100319#ifdef __cplusplus
320}
321#endif
322
Michal Vasko45f298f2016-01-29 10:26:26 +0100323#endif /* NC_SESSION_CLIENT_CH_H_ */