src/openvpn/ssl_polarssl.h
53f97e1e
 /*
  *  OpenVPN -- An application to securely tunnel IP networks
  *             over a single TCP/UDP port, with support for SSL/TLS-based
  *             session authentication and key exchange,
  *             packet encryption, packet authentication, and
  *             packet compression.
  *
  *  Copyright (C) 2002-2010 OpenVPN Technologies, Inc. <sales@openvpn.net>
  *  Copyright (C) 2010 Fox Crypto B.V. <openvpn@fox-it.com>
  *
  *  This program is free software; you can redistribute it and/or modify
  *  it under the terms of the GNU General Public License version 2
  *  as published by the Free Software Foundation.
  *
  *  This program is distributed in the hope that it will be useful,
  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  *  GNU General Public License for more details.
  *
  *  You should have received a copy of the GNU General Public License
  *  along with this program (see the file COPYING included with this
  *  distribution); if not, write to the Free Software Foundation, Inc.,
  *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
  */
 
 /**
86d8cd68
  * @file Control Channel mbed TLS Backend
53f97e1e
  */
 
86d8cd68
 #ifndef SSL_MBEDTLS_H_
 #define SSL_MBEDTLS_H_
53f97e1e
 
38ace48c
 #include "syshead.h"
 
86d8cd68
 #include <mbedtls/ssl.h>
 #include <mbedtls/x509_crt.h>
53f97e1e
 
 #if defined(ENABLE_PKCS11)
86d8cd68
 #include <mbedtls/pkcs11.h>
53f97e1e
 #endif
 
 typedef struct _buffer_entry buffer_entry;
 
 struct _buffer_entry {
     size_t length;
     uint8_t *data;
     buffer_entry *next_block;
 };
 
 typedef struct {
     size_t data_start;
     buffer_entry *first_block;
     buffer_entry *last_block;
 } endless_buffer;
 
86d8cd68
 typedef struct {
     endless_buffer in;
     endless_buffer out;
 } bio_ctx;
 
53f97e1e
 /**
  * Structure that wraps the TLS context. Contents differ depending on the
  * SSL library used.
  *
  * Either \c priv_key_pkcs11 or \c priv_key must be filled in.
  */
 struct tls_root_ctx {
     bool initialised; 		/**< True if the context has been initialised */
 
     int endpoint; 		/**< Whether or not this is a server or a client */
 
86d8cd68
     mbedtls_dhm_context *dhm_ctx;	/**< Diffie-Helmann-Merkle context */
     mbedtls_x509_crt *crt_chain;	/**< Local Certificate chain */
     mbedtls_x509_crt *ca_chain;		/**< CA chain for remote verification */
     mbedtls_pk_context *priv_key;	/**< Local private key */
53f97e1e
 #if defined(ENABLE_PKCS11)
86d8cd68
     mbedtls_pkcs11_context *priv_key_pkcs11;	/**< PKCS11 private key */
53f97e1e
 #endif
38ace48c
 #ifdef MANAGMENT_EXTERNAL_KEY
     struct external_context *external_key; /**< Management external key */
 #endif
53f97e1e
     int * allowed_ciphers;	/**< List of allowed ciphers for this connection */
 };
 
 struct key_state_ssl {
86d8cd68
     mbedtls_ssl_config ssl_config;	/**< mbedTLS global ssl config */
     mbedtls_ssl_context *ctx;		/**< mbedTLS connection context */
     bio_ctx bio_ctx;
53f97e1e
 };
 
 
86d8cd68
 #endif /* SSL_MBEDTLS_H_ */