| /* |
| * OpenVPN -- An application to securely tunnel IP networks |
| * over a single TCP/UDP port, with support for SSL/TLS-based |
| * session authentication and key exchange, |
| * packet encryption, packet authentication, and |
| * packet compression. |
| * |
| * Copyright (C) 2002-2018 OpenVPN Inc <sales@openvpn.net> |
| * Copyright (C) 2010-2018 Fox Crypto B.V. <openvpn@fox-it.com> |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License version 2 |
| * as published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with this program; if not, write to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| */ |
| |
| /** |
| * @file Control Channel mbed TLS Backend |
| */ |
| |
| #ifndef SSL_MBEDTLS_H_ |
| #define SSL_MBEDTLS_H_ |
| |
| #include "syshead.h" |
| |
| #include <mbedtls/ssl.h> |
| #include <mbedtls/x509_crt.h> |
| |
| #if defined(ENABLE_PKCS11) |
| #include <mbedtls/pkcs11.h> |
| #endif |
| |
| typedef struct _buffer_entry buffer_entry; |
| |
| struct _buffer_entry { |
| size_t length; |
| uint8_t *data; |
| buffer_entry *next_block; |
| }; |
| |
| typedef struct { |
| size_t data_start; |
| buffer_entry *first_block; |
| buffer_entry *last_block; |
| } endless_buffer; |
| |
| typedef struct { |
| endless_buffer in; |
| endless_buffer out; |
| } bio_ctx; |
| |
| /** |
| * Structure that wraps the TLS context. Contents differ depending on the |
| * SSL library used. |
| * |
| * Either \c priv_key_pkcs11 or \c priv_key must be filled in. |
| */ |
| struct tls_root_ctx { |
| bool initialised; /**< True if the context has been initialised */ |
| |
| int endpoint; /**< Whether or not this is a server or a client */ |
| |
| mbedtls_dhm_context *dhm_ctx; /**< Diffie-Helmann-Merkle context */ |
| mbedtls_x509_crt *crt_chain; /**< Local Certificate chain */ |
| mbedtls_x509_crt *ca_chain; /**< CA chain for remote verification */ |
| mbedtls_pk_context *priv_key; /**< Local private key */ |
| mbedtls_x509_crl *crl; /**< Certificate Revocation List */ |
| time_t crl_last_mtime; /**< CRL last modification time */ |
| off_t crl_last_size; /**< size of last loaded CRL */ |
| #if defined(ENABLE_PKCS11) |
| mbedtls_pkcs11_context *priv_key_pkcs11; /**< PKCS11 private key */ |
| #endif |
| #ifdef MANAGMENT_EXTERNAL_KEY |
| struct external_context *external_key; /**< Management external key */ |
| #endif |
| int *allowed_ciphers; /**< List of allowed ciphers for this connection */ |
| mbedtls_x509_crt_profile cert_profile; /**< Allowed certificate types */ |
| }; |
| |
| struct key_state_ssl { |
| mbedtls_ssl_config *ssl_config; /**< mbedTLS global ssl config */ |
| mbedtls_ssl_context *ctx; /**< mbedTLS connection context */ |
| bio_ctx *bio_ctx; |
| }; |
| |
| |
| #endif /* SSL_MBEDTLS_H_ */ |