blob: a19b5268eccc24e16f281cf064aef4020d3ac745 [file] [log] [blame]
Michal Vasko45f298f2016-01-29 10:26:26 +01001/**
Michal Vaskoc446a382021-06-18 08:54:05 +02002 * @file session_client_ch.h
3 * @author Michal Vasko <mvasko@cesnet.cz>
4 * @brief libnetconf2 Call Home session client manipulation
Michal Vasko45f298f2016-01-29 10:26:26 +01005 *
Michal Vasko95ea9ff2021-11-09 12:29:14 +01006 * @copyright
Michal Vasko94d61402023-03-16 08:21:52 +01007 * Copyright (c) 2015 - 2023 CESNET, z.s.p.o.
Michal Vasko45f298f2016-01-29 10:26:26 +01008 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +01009 * This source code is licensed under BSD 3-Clause License (the "License").
10 * You may not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
Michal Vaskoafd416b2016-02-25 14:51:46 +010012 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +010013 * https://opensource.org/licenses/BSD-3-Clause
Michal Vasko45f298f2016-01-29 10:26:26 +010014 */
15
16#ifndef NC_SESSION_CLIENT_CH_H_
17#define NC_SESSION_CLIENT_CH_H_
18
Michal Vaskoc09730e2019-01-17 10:07:26 +010019#ifdef __cplusplus
20extern "C" {
21#endif
22
Michal Vasko45f298f2016-01-29 10:26:26 +010023#include <libyang/libyang.h>
24
roman2eab4742023-06-06 10:00:26 +020025#ifdef NC_ENABLED_SSH_TLS
Michal Vaskoc446a382021-06-18 08:54:05 +020026# include <libssh/libssh.h>
roman2eab4742023-06-06 10:00:26 +020027#endif /* NC_ENABLED_SSH_TLS */
Michal Vaskoc446a382021-06-18 08:54:05 +020028
Michal Vasko45f298f2016-01-29 10:26:26 +010029#include "messages_client.h"
Michal Vaskob83a3fa2021-05-26 09:53:42 +020030#include "netconf.h"
31#include "session.h"
Michal Vasko45f298f2016-01-29 10:26:26 +010032
roman2eab4742023-06-06 10:00:26 +020033#ifdef NC_ENABLED_SSH_TLS
Michal Vasko45f298f2016-01-29 10:26:26 +010034
35/**
Radek Krejci6799a052017-05-19 14:23:23 +020036 * @defgroup client_ch Client-side Call Home
37 * @ingroup client
38 *
39 * @brief Call Home functionality for client-side applications.
40 * @{
41 */
42
43/**
Michal Vasko45f298f2016-01-29 10:26:26 +010044 * @brief Accept a Call Home connection on any of the listening binds.
45 *
46 * @param[in] timeout Timeout for receiving a new connection in milliseconds, 0 for
Michal Vasko94d61402023-03-16 08:21:52 +010047 * non-blocking call, -1 for infinite waiting.
48 * @param[in,out] ctx Optional custom context to use for the session. If not set, a default context is created.
49 * Any YANG modules not present in the context and supported by the server are loaded using \<get-schema\>
50 * (if supported) and/or by searching the searchpath (see ::nc_client_set_schema_searchpath()).
Michal Vasko45f298f2016-01-29 10:26:26 +010051 * @param[out] session New session.
Michal Vaskof0537d82016-01-29 14:42:38 +010052 * @return 1 on success, 0 on timeout, -1 on error.
Michal Vasko45f298f2016-01-29 10:26:26 +010053 */
54int nc_accept_callhome(int timeout, struct ly_ctx *ctx, struct nc_session **session);
55
Michal Vaskoc446a382021-06-18 08:54:05 +020056/** @} Client-side Call Home */
Radek Krejci6799a052017-05-19 14:23:23 +020057
Michal Vasko45f298f2016-01-29 10:26:26 +010058/**
Radek Krejci6799a052017-05-19 14:23:23 +020059 * @defgroup client_ch_ssh Client-side Call Home on SSH
60 * @ingroup client_ch
61 *
62 * @brief SSH settings for the Call Home functionality
63 * @{
64 */
65
66/**
Radek Krejci90a84a22017-05-25 13:53:00 +020067 * @brief Set SSH Call Home authentication hostkey check (knownhosts) callback.
68 *
69 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
70 * freeing the private data when necessary (the private data can be obtained by
71 * nc_client_ssh_ch_get_auth_hostkey_check_clb()).
Michal Vaskoef112d72016-02-18 13:28:25 +010072 *
73 * @param[in] auth_hostkey_check Function to call, returns 0 on success, non-zero in error.
Michal Vasko94d61402023-03-16 08:21:52 +010074 * If NULL, the default callback is set.
Radek Krejci90a84a22017-05-25 13:53:00 +020075 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vaskoef112d72016-02-18 13:28:25 +010076 */
Radek Krejci90a84a22017-05-25 13:53:00 +020077void nc_client_ssh_ch_set_auth_hostkey_check_clb(int (*auth_hostkey_check)(const char *hostname, ssh_session session, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +020078 void *priv);
Michal Vaskoef112d72016-02-18 13:28:25 +010079
80/**
Radek Krejci90a84a22017-05-25 13:53:00 +020081 * @brief Get currently set SSH Call Home authentication hostkey check (knownhosts) callback and its private data
82 * previously set by nc_client_ssh_ch_set_auth_hostkey_check_clb().
83 *
84 * @param[out] auth_hostkey_check Currently set callback, NULL in case of the default callback.
85 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
86 */
87void nc_client_ssh_ch_get_auth_hostkey_check_clb(int (**auth_hostkey_check)(const char *hostname, ssh_session session, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +020088 void **priv);
Michal Vasko292c5542023-02-01 14:33:17 +010089
Radek Krejci90a84a22017-05-25 13:53:00 +020090/**
Michal Vasko30e2c872016-02-18 10:03:21 +010091 * @brief Set SSH Call Home password authentication callback.
92 *
Radek Krejci90a84a22017-05-25 13:53:00 +020093 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
94 * freeing the private data when necessary (the private data can be obtained by
95 * nc_client_ssh_ch_get_auth_password_clb()).
96 *
Michal Vaskofdfd9dd2016-02-29 10:18:46 +010097 * @param[in] auth_password Function to call, returns the password for username\@hostname.
Michal Vasko94d61402023-03-16 08:21:52 +010098 * If NULL, the default callback is set.
Radek Krejci90a84a22017-05-25 13:53:00 +020099 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +0100100 */
Radek Krejci90a84a22017-05-25 13:53:00 +0200101void nc_client_ssh_ch_set_auth_password_clb(char *(*auth_password)(const char *username, const char *hostname, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200102 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +0200103
104/**
105 * @brief Get currently set SSH Call Home password authentication callback and its private data
106 * previously set by nc_client_ssh_ch_set_auth_password_clb().
107 *
108 * @param[out] auth_password Currently set callback, NULL in case of the default callback.
109 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
110 */
111void nc_client_ssh_ch_get_auth_password_clb(char *(**auth_password)(const char *username, const char *hostname, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200112 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +0100113
114/**
115 * @brief Set SSH Call Home interactive authentication callback.
116 *
Radek Krejci90a84a22017-05-25 13:53:00 +0200117 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
118 * freeing the private data when necessary (the private data can be obtained by
119 * nc_client_ssh_ch_get_auth_interactive_clb()).
120 *
Michal Vasko30e2c872016-02-18 10:03:21 +0100121 * @param[in] auth_interactive Function to call for every question, returns the answer for
Michal Vasko94d61402023-03-16 08:21:52 +0100122 * authentication name with instruction and echoing prompt. If NULL, the default callback is set.
Radek Krejci90a84a22017-05-25 13:53:00 +0200123 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +0100124 */
125void nc_client_ssh_ch_set_auth_interactive_clb(char *(*auth_interactive)(const char *auth_name, const char *instruction,
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200126 const char *prompt, int echo, void *priv),
127 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +0200128
129/**
130 * @brief Get currently set SSH Call Home interactive authentication callback and its private data
131 * previously set by nc_client_ssh_ch_set_auth_interactive_clb().
132 *
133 * @param[out] auth_interactive Currently set callback, NULL in case of the default callback.
134 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
135 */
136void nc_client_ssh_ch_get_auth_interactive_clb(char *(**auth_interactive)(const char *auth_name, const char *instruction,
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200137 const char *prompt, int echo, void *priv),
138 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +0100139
140/**
141 * @brief Set SSH Call Home publickey authentication encrypted private key passphrase callback.
142 *
Radek Krejci90a84a22017-05-25 13:53:00 +0200143 * Repetitive calling causes replacing of the previous callback and its private data. Caller is responsible for
144 * freeing the private data when necessary (the private data can be obtained by
145 * nc_client_ssh_ch_get_auth_privkey_passphrase_clb()).
146 *
Michal Vasko94d61402023-03-16 08:21:52 +0100147 * @param[in] auth_privkey_passphrase Function to call for every question, returns the passphrase for the specific
148 * private key.
Radek Krejci90a84a22017-05-25 13:53:00 +0200149 * @param[in] priv Optional private data to be passed to the callback function.
Michal Vasko30e2c872016-02-18 10:03:21 +0100150 */
Radek Krejci90a84a22017-05-25 13:53:00 +0200151void nc_client_ssh_ch_set_auth_privkey_passphrase_clb(char *(*auth_privkey_passphrase)(const char *privkey_path, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200152 void *priv);
Radek Krejci90a84a22017-05-25 13:53:00 +0200153
154/**
155 * @brief Get currently set SSH Call Home publickey authentication encrypted private key passphrase callback and its
156 * private data previously set by nc_client_ssh_ch_set_auth_privkey_passphrase_clb().
157 *
158 * @param[out] auth_privkey_passphrase Currently set callback, NULL in case of the default callback.
159 * @param[out] priv Currently set (optional) private data to be passed to the callback function.
160 */
161void nc_client_ssh_ch_get_auth_privkey_passphrase_clb(char *(**auth_privkey_passphrase)(const char *privkey_path, void *priv),
Michal Vaskob83a3fa2021-05-26 09:53:42 +0200162 void **priv);
Michal Vasko30e2c872016-02-18 10:03:21 +0100163
164/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100165 * @brief Add a new client bind and start listening on it for SSH Call Home connections.
166 *
167 * @param[in] address IP address to bind to.
168 * @param[in] port Port to bind to.
169 * @return 0 on success, -1 on error.
170 */
171int nc_client_ssh_ch_add_bind_listen(const char *address, uint16_t port);
172
173/**
174 * @brief Remove an SSH listening client bind.
175 *
176 * @param[in] address IP address the socket was bound to. NULL matches all.
177 * @param[in] port Port the socket was bound to. 0 matches all.
178 * @return 0 on success, -1 on not found.
179 */
180int nc_client_ssh_ch_del_bind(const char *address, uint16_t port);
181
182/**
183 * @brief Add an SSH public and private key pair to be used for Call Home client authentication.
184 *
185 * Private key can be encrypted, the passphrase will be asked for before using it.
186 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100187 * @param[in] pub_key Path to the public key.
188 * @param[in] priv_key Path to the private key.
Michal Vaskof0537d82016-01-29 14:42:38 +0100189 * @return 0 on success, -1 on error.
Michal Vasko45f298f2016-01-29 10:26:26 +0100190 */
191int nc_client_ssh_ch_add_keypair(const char *pub_key, const char *priv_key);
192
193/**
194 * @brief Remove an SSH public and private key pair that was used for Call Home client authentication.
195 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100196 * @param[in] idx Index of the keypair starting with 0.
Michal Vasko45f298f2016-01-29 10:26:26 +0100197 * @return 0 on success, -1 on error.
198 */
199int nc_client_ssh_ch_del_keypair(int idx);
200
201/**
202 * @brief Get the number of public an private key pairs set to be used for Call Home client authentication.
203 *
204 * @return Keypair count.
205 */
206int nc_client_ssh_ch_get_keypair_count(void);
207
208/**
209 * @brief Get a specific keypair set to be used for Call Home client authentication.
210 *
211 * @param[in] idx Index of the specific keypair.
212 * @param[out] pub_key Path to the public key.
213 * @param[out] priv_key Path to the private key.
Michal Vasko45f298f2016-01-29 10:26:26 +0100214 * @return 0 on success, -1 on error.
215 */
216int nc_client_ssh_ch_get_keypair(int idx, const char **pub_key, const char **priv_key);
217
218/**
219 * @brief Set SSH Call Home authentication method preference.
220 *
Radek Krejci62aa0642017-05-25 16:33:49 +0200221 * The default preference is as follows:
222 * - public key authentication (3)
223 * - password authentication (2)
224 * - interactive authentication (1)
225 *
226 * @param[in] auth_type Authentication method to modify the preference of.
Michal Vaskoc446a382021-06-18 08:54:05 +0200227 * @param[in] pref Preference of @p auth_type. Higher number increases priority, negative values disable the method.
Michal Vasko45f298f2016-01-29 10:26:26 +0100228 */
229void nc_client_ssh_ch_set_auth_pref(NC_SSH_AUTH_TYPE auth_type, int16_t pref);
230
231/**
232 * @brief Get SSH Call Home authentication method preference.
233 *
Michal Vasko45f298f2016-01-29 10:26:26 +0100234 * @param[in] auth_type Authentication method to retrieve the prefrence of.
Michal Vaskoc446a382021-06-18 08:54:05 +0200235 * @return Preference of the @p auth_type.
Michal Vasko45f298f2016-01-29 10:26:26 +0100236 */
237int16_t nc_client_ssh_ch_get_auth_pref(NC_SSH_AUTH_TYPE auth_type);
238
239/**
240 * @brief Set client Call Home SSH username used for authentication.
241 *
242 * @param[in] username Username to use.
243 * @return 0 on success, -1 on error.
244 */
245int nc_client_ssh_ch_set_username(const char *username);
246
Michal Vaskoe22c6732016-01-29 11:03:02 +0100247/**
248 * @brief Get client Call Home SSH username used for authentication.
249 *
250 * @return Username used.
251 */
252const char *nc_client_ssh_ch_get_username(void);
253
Michal Vaskoc446a382021-06-18 08:54:05 +0200254/** @} Client-side Call Home on SSH */
Radek Krejci6799a052017-05-19 14:23:23 +0200255
Michal Vasko45f298f2016-01-29 10:26:26 +0100256/**
Radek Krejci6799a052017-05-19 14:23:23 +0200257 * @defgroup client_ch_tls Client-side Call Home on TLS
258 * @ingroup client_ch
259 *
260 * @brief TLS settings for the Call Home functionality
261 * @{
262 */
263
264/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100265 * @brief Add a new client bind and start listening on it for TLS Call Home connections.
266 *
267 * @param[in] address IP address to bind to.
268 * @param[in] port Port to bind to.
269 * @return 0 on success, -1 on error.
270 */
271int nc_client_tls_ch_add_bind_listen(const char *address, uint16_t port);
272
273/**
Michal Vasko9d4cca52022-09-07 11:19:57 +0200274 * @brief Add a new client bind and start listening on it for TLS Call Home connections coming from the specified hostname.
275 *
276 * @param[in] address IP address to bind to.
277 * @param[in] port Port to bind to.
Michal Vaskob8f1fa12022-09-07 11:47:42 +0200278 * @param[in] hostname Expected server hostname, verified by TLS when connecting to it. If NULL, the check is skipped.
Michal Vasko9d4cca52022-09-07 11:19:57 +0200279 * @return 0 on success, -1 on error.
280 */
281int nc_client_tls_ch_add_bind_hostname_listen(const char *address, uint16_t port, const char *hostname);
282
283/**
Michal Vasko45f298f2016-01-29 10:26:26 +0100284 * @brief Remove a TLS listening client bind.
285 *
286 * @param[in] address IP address the socket was bound to. NULL matches all.
287 * @param[in] port Port the socket was bound to. 0 matches all.
288 * @return 0 on success, -1 on not found.
289 */
290int nc_client_tls_ch_del_bind(const char *address, uint16_t port);
291
292/**
293 * @brief Set client Call Home authentication identity - a certificate and a private key.
294 *
Michal Vaskoe22c6732016-01-29 11:03:02 +0100295 * @param[in] client_cert Path to the file containing the client certificate.
Michal Vaskoc446a382021-06-18 08:54:05 +0200296 * @param[in] client_key Path to the file containing the private key for the @p client_cert.
Michal Vasko94d61402023-03-16 08:21:52 +0100297 * If NULL, key is expected to be stored with @p client_cert.
Michal Vasko45f298f2016-01-29 10:26:26 +0100298 * @return 0 on success, -1 on error.
299 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100300int nc_client_tls_ch_set_cert_key_paths(const char *client_cert, const char *client_key);
301
302/**
303 * @brief Get client Call Home authentication identity - a certificate and a private key.
304 *
Michal Vaskoe22c6732016-01-29 11:03:02 +0100305 * @param[out] client_cert Path to the file containing the client certificate. Can be NULL.
Michal Vasko94d61402023-03-16 08:21:52 +0100306 * @param[out] client_key Path to the file containing the private key for the @p client_cert. Can be NULL.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100307 */
308void nc_client_tls_ch_get_cert_key_paths(const char **client_cert, const char **client_key);
Michal Vasko45f298f2016-01-29 10:26:26 +0100309
310/**
311 * @brief Set client Call Home trusted CA certificates.
312 *
313 * @param[in] ca_file Location of the CA certificate file used to verify server certificates.
Michal Vasko94d61402023-03-16 08:21:52 +0100314 * For more info, see the documentation for SSL_CTX_load_verify_locations() from OpenSSL.
Michal Vasko45f298f2016-01-29 10:26:26 +0100315 * @param[in] ca_dir Location of the CA certificates directory used to verify the server certificates.
Michal Vasko94d61402023-03-16 08:21:52 +0100316 * For more info, see the documentation for SSL_CTX_load_verify_locations() from OpenSSL.
Michal Vasko45f298f2016-01-29 10:26:26 +0100317 * @return 0 on success, -1 on error.
318 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100319int nc_client_tls_ch_set_trusted_ca_paths(const char *ca_file, const char *ca_dir);
320
321/**
322 * @brief Get client Call Home trusted CA certificates.
323 *
Michal Vasko94d61402023-03-16 08:21:52 +0100324 * @param[out] ca_file Location of the CA certificate file used to verify server certificates. Can be NULL.
325 * @param[out] ca_dir Location of the CA certificates directory used to verify the server certificates. Can be NULL.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100326 */
327void nc_client_tls_ch_get_trusted_ca_paths(const char **ca_file, const char **ca_dir);
Michal Vasko45f298f2016-01-29 10:26:26 +0100328
329/**
330 * @brief Set client Call Home Certificate Revocation Lists.
331 *
332 * @param[in] crl_file Location of the CRL certificate file used to check for revocated certificates.
333 * @param[in] crl_dir Location of the CRL certificate directory used to check for revocated certificates.
334 * @return 0 on success, -1 on error.
335 */
Michal Vaskoe22c6732016-01-29 11:03:02 +0100336int nc_client_tls_ch_set_crl_paths(const char *crl_file, const char *crl_dir);
337
338/**
339 * @brief Get client Call Home Certificate Revocation Lists.
340 *
Michal Vasko94d61402023-03-16 08:21:52 +0100341 * @param[out] crl_file Location of the CRL certificate file used to check for revocated certificates. Can be NULL.
342 * @param[out] crl_dir Location of the CRL certificate directory used to check for revocated certificates. Can be NULL.
Michal Vaskoe22c6732016-01-29 11:03:02 +0100343 */
344void nc_client_tls_ch_get_crl_paths(const char **crl_file, const char **crl_dir);
Michal Vasko45f298f2016-01-29 10:26:26 +0100345
Michal Vaskoc446a382021-06-18 08:54:05 +0200346/** @} Client-side Call Home on TLS */
Radek Krejci6799a052017-05-19 14:23:23 +0200347
roman2eab4742023-06-06 10:00:26 +0200348#endif /* NC_ENABLED_SSH_TLS */
Michal Vasko45f298f2016-01-29 10:26:26 +0100349
Michal Vaskoc09730e2019-01-17 10:07:26 +0100350#ifdef __cplusplus
351}
352#endif
353
Michal Vasko45f298f2016-01-29 10:26:26 +0100354#endif /* NC_SESSION_CLIENT_CH_H_ */