53f97e1e |
/*
* OpenVPN -- An application to securely tunnel IP networks
* over a single TCP/UDP port, with support for SSL/TLS-based
* session authentication and key exchange,
* packet encryption, packet authentication, and
* packet compression.
* |
49979459 |
* Copyright (C) 2002-2018 OpenVPN Inc <sales@openvpn.net>
* Copyright (C) 2010-2018 Fox Crypto B.V. <openvpn@fox-it.com> |
53f97e1e |
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
* |
caa54ac3 |
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
53f97e1e |
*/
/** |
86d8cd68 |
* @file Control Channel mbed TLS Backend |
53f97e1e |
*/
|
86d8cd68 |
#ifndef SSL_MBEDTLS_H_
#define SSL_MBEDTLS_H_ |
53f97e1e |
|
38ace48c |
#include "syshead.h"
|
86d8cd68 |
#include <mbedtls/ssl.h>
#include <mbedtls/x509_crt.h> |
53f97e1e |
#if defined(ENABLE_PKCS11) |
86d8cd68 |
#include <mbedtls/pkcs11.h> |
53f97e1e |
#endif
typedef struct _buffer_entry buffer_entry;
struct _buffer_entry {
size_t length;
uint8_t *data;
buffer_entry *next_block;
};
typedef struct {
size_t data_start;
buffer_entry *first_block;
buffer_entry *last_block;
} endless_buffer;
|
86d8cd68 |
typedef struct {
endless_buffer in;
endless_buffer out;
} bio_ctx;
|
53f97e1e |
/**
* Structure that wraps the TLS context. Contents differ depending on the
* SSL library used.
*
* Either \c priv_key_pkcs11 or \c priv_key must be filled in.
*/
struct tls_root_ctx { |
81d882d5 |
bool initialised; /**< True if the context has been initialised */ |
53f97e1e |
|
81d882d5 |
int endpoint; /**< Whether or not this is a server or a client */ |
53f97e1e |
|
81d882d5 |
mbedtls_dhm_context *dhm_ctx; /**< Diffie-Helmann-Merkle context */
mbedtls_x509_crt *crt_chain; /**< Local Certificate chain */
mbedtls_x509_crt *ca_chain; /**< CA chain for remote verification */
mbedtls_pk_context *priv_key; /**< Local private key */ |
160504a2 |
mbedtls_x509_crl *crl; /**< Certificate Revocation List */ |
f3705dd1 |
time_t crl_last_mtime; /**< CRL last modification time */ |
81d882d5 |
off_t crl_last_size; /**< size of last loaded CRL */ |
53f97e1e |
#if defined(ENABLE_PKCS11) |
81d882d5 |
mbedtls_pkcs11_context *priv_key_pkcs11; /**< PKCS11 private key */ |
53f97e1e |
#endif |
38ace48c |
#ifdef MANAGMENT_EXTERNAL_KEY
struct external_context *external_key; /**< Management external key */
#endif |
81d882d5 |
int *allowed_ciphers; /**< List of allowed ciphers for this connection */ |
aba75874 |
mbedtls_x509_crt_profile cert_profile; /**< Allowed certificate types */ |
53f97e1e |
};
struct key_state_ssl { |
81d882d5 |
mbedtls_ssl_config ssl_config; /**< mbedTLS global ssl config */
mbedtls_ssl_context *ctx; /**< mbedTLS connection context */ |
86d8cd68 |
bio_ctx bio_ctx; |
53f97e1e |
};
|
86d8cd68 |
#endif /* SSL_MBEDTLS_H_ */ |