OpenVPN
ssl_common.h
Go to the documentation of this file.
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single TCP/UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
8 * Copyright (C) 2002-2026 OpenVPN Inc <sales@openvpn.net>
9 * Copyright (C) 2010-2026 Sentyron B.V. <openvpn@sentyron.com>
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License version 2
13 * as published by the Free Software Foundation.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License along
21 * with this program; if not, see <https://www.gnu.org/licenses/>.
22 */
23
29#ifndef SSL_COMMON_H_
30#define SSL_COMMON_H_
31
32#include "session_id.h"
33#include "socket_util.h"
34#include "packet_id.h"
35#include "crypto.h"
36#include "options.h"
37
38#include "ssl_backend.h"
39
40/* passwords */
41#define UP_TYPE_AUTH "Auth"
42#define UP_TYPE_PRIVATE_KEY "Private Key"
43
77/* clang-format off */
78#define S_ERROR (-2)
79#define S_ERROR_PRE (-1)
82#define S_UNDEF 0
84#define S_INITIAL 1
87#define S_PRE_START_SKIP 2
90#define S_PRE_START 3
93#define S_START 4
95#define S_SENT_KEY 5
97#define S_GOT_KEY 6
100#define S_ACTIVE 7
105#define S_GENERATED_KEYS 8
108/* clang-format on */
109/* Note that earlier versions also had a S_OP_NORMAL state that was
110 * virtually identical with S_ACTIVE and the code still assumes everything
111 * >= S_ACTIVE to be fully operational */
121{
122 uint8_t pre_master[48];
125 uint8_t random1[32];
128 uint8_t random2[32];
130};
131
132
139{
142};
143
144
163
171
172/* key_state_test_auth_control_file return values, these specify the
173 * current status of a deferred authentication */
181
188
208{
209 int state;
212
218
223 uint32_t peer_id;
224
225 struct key_state_ssl ks_ssl; /* contains SSL object and BIOs for the control channel */
226
227 time_t initial; /* when we created this session */
228 time_t established; /* when our state went S_ACTIVE */
229 time_t must_negotiate; /* key negotiation times out if not finished before this time */
230 time_t must_die; /* this object is destroyed at this time */
231 time_t peer_last_packet; /* Last time we received a packet in this control session */
232
233 int initial_opcode; /* our initial P_ opcode */
234 struct session_id session_id_remote; /* peer's random session ID */
235 struct link_socket_actual remote_addr; /* peer's IP addr */
236
237 struct crypto_options crypto_options; /* data channel crypto options */
238
239 struct key_source2 *key_src; /* source entropy for key expansion */
240
244
245 struct reliable *send_reliable; /* holds a copy of outgoing packets until ACK received */
246 struct reliable *rec_reliable; /* order incoming ciphertext packets before we pass to TLS */
247 struct reliable_ack *rec_ack; /* buffers all packet IDs we want to ACK back to sender */
248 struct reliable_ack *lru_acks; /* keeps the most recently acked packages*/
249
253 counter_type n_bytes; /* how many bytes sent/recvd since last key exchange */
254 counter_type n_packets; /* how many packets sent/recvd since last key exchange */
255
256 /*
257 * If bad username/password, TLS connection will come up but 'authenticated' will be false.
258 */
261
262#ifdef ENABLE_MANAGEMENT
263 unsigned int mda_key_id;
265#endif
267
270
272};
273
301
302/*
303 * Our const options, obtained directly or derived from
304 * command line options.
305 */
307{
308 /* our master TLS context from which all SSL objects are derived,
309 * this context is shared between all instances in p2pm with
310 * inherit_context_child. */
312
313 /* data channel cipher, hmac, and key lengths */
315
316 /* true if we are a TLS server, client otherwise */
317 bool server;
318
319 /* if true, don't xmit until first packet from peer is received */
321
322 /* local and remote options strings
323 * that must match between client and server */
324 const char *local_options;
325 const char *remote_options;
326
327 /* from command line */
329 int mode;
330 bool pull;
351
352 /* cert verification parms */
353 const char *verify_command;
355 const char *verify_x509_name;
356 const char *crl_file;
360 const char *remote_cert_eku;
366
367 /* struct crypto_option flags */
368 unsigned int crypto_flags;
369
370 int replay_window; /* --replay-window parm */
371 int replay_time; /* --replay-window parm */
372
373 const char *config_ciphername;
375
381
385
388
389 struct frame frame;
390
391 /* used for username/password authentication */
395 const char *tmp_dir;
399
405 unsigned int auth_token_renewal;
406
408
409 /* use the client-config-dir as a positive authenticator */
411
412 /* instance-wide environment variable set */
413 struct env_set *es;
415 const struct plugin_list *plugins;
416
417 /* compression parms */
418#ifdef USE_COMP
419 struct compress_options comp_options;
420#endif
421
422 /* configuration file SSL-related boolean and low-permutation options */
423#define SSLF_CLIENT_CERT_NOT_REQUIRED (1u << 0)
424#define SSLF_CLIENT_CERT_OPTIONAL (1u << 1)
425#define SSLF_USERNAME_AS_COMMON_NAME (1u << 2)
426#define SSLF_AUTH_USER_PASS_OPTIONAL (1u << 3)
427/* (1u << 4) free for usage */
428#define SSLF_CRL_VERIFY_DIR (1u << 5)
429#define SSLF_TLS_VERSION_MIN_SHIFT 6
430#define SSLF_TLS_VERSION_MIN_MASK 0xFu /* (uses bit positions 6 to 9) */
431#define SSLF_TLS_VERSION_MAX_SHIFT 10
432#define SSLF_TLS_VERSION_MAX_MASK 0xFu /* (uses bit positions 10 to 13) */
433#define SSLF_TLS_DEBUG_ENABLED (1u << 14)
434 unsigned int ssl_flags;
435
436#ifdef ENABLE_MANAGEMENT
438#endif
439
440 const struct x509_track *x509_track;
441
442#ifdef ENABLE_MANAGEMENT
444#endif
445
446 /* --gremlin bits */
448
449 /* Keying Material Exporter [RFC 5705] parameters */
450 const char *ekm_label;
452 size_t ekm_size;
453
455};
456
464#define KS_PRIMARY 0
465#define KS_LAME_DUCK \
466 1
468#define KS_SIZE 2
489{
490 /* const options and config info */
492
493 /* during hard reset used to control burst retransmit */
494 bool burst;
495
496 /* authenticate control packets */
498
499 /* Specific tls-crypt for renegotiations, if this is valid,
500 * tls_wrap_reneg.mode is TLS_WRAP_CRYPT, otherwise ignore it */
502
503 int initial_opcode; /* our initial P_ opcode */
504 struct session_id session_id; /* our random session ID */
505
512
514
516
518
519 bool verified; /* true if peer certificate was verified against CA */
520
521 /* not-yet-authenticated incoming client */
523
525};
526
544#define TM_ACTIVE 0
545#define TM_INITIAL \
546 1
548#define TM_LAME_DUCK 2
549#define TM_SIZE \
550 3
556/*
557 * The number of keys we will scan on encrypt or decrypt. The first
558 * is the "active" key. The second is the lame_duck or retiring key
559 * associated with the active key's session ID. The third is a detached
560 * lame duck session that only occurs in situations where a key renegotiate
561 * failed on the active key, but a lame duck key was still valid. By
562 * preserving the lame duck session, we can be assured of having a data
563 * channel key available even when network conditions are so bad that
564 * we can't negotiate a new key within the time allotted.
565 */
566#define KEY_SCAN_SIZE 3
567
568
569/* multi state (originally client authentication state (=CAS))
570 * CAS_NOT_CONNECTED must be 0 since non multi code paths still check
571 * this variable but do not explicitly initialise it and depend
572 * on zero initialisation */
573
574/* CAS_NOT_CONNECTED is the initial state for every context. When the *first*
575 * tls_session reaches S_ACTIVE, this state machine moves to CAS_PENDING (server)
576 * or CAS_CONNECT_DONE (client/p2p) as clients skip the stages associated with
577 * connect scripts/plugins */
595
596
611{
612 /* used to coordinate access between main thread and TLS thread */
613 /*MUTEX_PTR_DEFINE (mutex);*/
614
615 /* const options and config info */
617
618 /*
619 * used by tls_pre_encrypt to communicate the encrypt key
620 * to tls_post_encrypt()
621 */
622 struct key_state *save_ks; /* temporary pointer used between pre/post routines */
623
624 /*
625 * Used to return outgoing address from
626 * tls_multi_process.
627 */
629
633
634 /*
635 * Number of errors.
636 */
637 int n_hard_errors; /* errors due to TLS negotiation failure */
638 int n_soft_errors; /* errors due to unrecognized or failed-to-authenticate incoming packets */
639
645
650
654
656
661
664
667
684
686#define AUTH_TOKEN_HMAC_OK (1 << 0)
688#define AUTH_TOKEN_EXPIRED (1 << 1)
696#define AUTH_TOKEN_VALID_EMPTYUSER (1 << 2)
697
698 /* For P_DATA_V2 */
699 uint32_t peer_id;
701
705 /*
706 * Our session objects.
707 */
712
713 /* Only used when DCO is used to remember how many keys we installed
714 * for this session */
724
726};
727
731static inline struct key_state *
732get_key_scan(struct tls_multi *multi, int index)
733{
734 switch (index)
735 {
736 case 0:
737 return &multi->session[TM_ACTIVE].key[KS_PRIMARY];
738
739 case 1:
740 return &multi->session[TM_ACTIVE].key[KS_LAME_DUCK];
741
742 case 2:
743 return &multi->session[TM_LAME_DUCK].key[KS_LAME_DUCK];
744
745 default:
746 ASSERT(false);
747 return NULL; /* NOTREACHED */
748 }
749}
750
754static inline const struct key_state *
755get_primary_key(const struct tls_multi *multi)
756{
757 return &multi->session[TM_ACTIVE].key[KS_PRIMARY];
758}
759
760#endif /* SSL_COMMON_H_ */
uint64_t counter_type
Definition common.h:31
int interval_t
Definition common.h:37
Data Channel Cryptography Module.
hash_algo_type
Types referencing specific message digest hashing algorithms.
void * dco_context_t
Definition dco.h:259
#define KS_SIZE
Size of the tls_session.key array.
Definition ssl_common.h:468
#define KS_PRIMARY
Primary key state index.
Definition ssl_common.h:464
#define TM_LAME_DUCK
Old tls_session.
Definition ssl_common.h:548
#define TM_SIZE
Size of the tls_multi.session \ array.
Definition ssl_common.h:549
#define TM_ACTIVE
Active tls_session.
Definition ssl_common.h:544
#define KS_LAME_DUCK
Key state index that will retire \ soon.
Definition ssl_common.h:465
void * openvpn_net_ctx_t
Definition networking.h:38
#define ASSERT(x)
Definition error.h:219
#define MAX_PARMS
Definition options.h:51
Control Channel SSL library backend module.
auth_deferred_result
Definition ssl_common.h:175
@ ACF_PENDING
deferred auth still pending
Definition ssl_common.h:176
@ ACF_SUCCEEDED
deferred auth has suceeded
Definition ssl_common.h:177
@ ACF_FAILED
deferred auth has failed
Definition ssl_common.h:179
@ ACF_DISABLED
deferred auth is not used
Definition ssl_common.h:178
dco_key_status
Definition ssl_common.h:183
@ DCO_INSTALLED_PRIMARY
Definition ssl_common.h:185
@ DCO_INSTALLED_SECONDARY
Definition ssl_common.h:186
@ DCO_NOT_INSTALLED
Definition ssl_common.h:184
static struct key_state * get_key_scan(struct tls_multi *multi, int index)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition ssl_common.h:732
multi_status
Definition ssl_common.h:579
@ CAS_CONNECT_DONE
Definition ssl_common.h:593
@ CAS_PENDING_DEFERRED
Waiting on an async option import handler.
Definition ssl_common.h:583
@ CAS_WAITING_AUTH
Initial TLS connection established but deferred auth is not yet finished.
Definition ssl_common.h:581
@ CAS_PENDING_DEFERRED_PARTIAL
at least handler succeeded but another is still pending
Definition ssl_common.h:584
@ CAS_PENDING
Options import (Connect script/plugin, ccd,...)
Definition ssl_common.h:582
@ CAS_WAITING_OPTIONS_IMPORT
client with pull or p2p waiting for first time options import
Definition ssl_common.h:586
@ CAS_NOT_CONNECTED
Definition ssl_common.h:580
@ CAS_FAILED
Option import failed or explicitly denied the client.
Definition ssl_common.h:585
@ CAS_RECONNECT_PENDING
session has already successful established (CAS_CONNECT_DONE) but has a reconnect and needs to redo s...
Definition ssl_common.h:592
ks_auth_state
This reflects the (server side) authentication state after the TLS session has been established and k...
Definition ssl_common.h:153
@ KS_AUTH_TRUE
Key state is authenticated.
Definition ssl_common.h:157
@ KS_AUTH_FALSE
Key state is not authenticated
Definition ssl_common.h:154
@ KS_AUTH_DEFERRED
Key state authentication is being deferred, by async auth.
Definition ssl_common.h:155
static const struct key_state * get_primary_key(const struct tls_multi *multi)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition ssl_common.h:755
char * auth_failed_reason_file
Definition ssl_common.h:168
unsigned int auth_control_status
Definition ssl_common.h:169
Wrapper structure for dynamically allocated memory.
Definition buffer.h:60
Structure containing the hashes for a full certificate chain.
Definition ssl_verify.h:64
Security parameter state for processing data channel packets.
Definition crypto.h:293
Packet geometry parameters.
Definition mtu.h:108
Container for bidirectional cipher and HMAC key material.
Definition crypto.h:240
Container for one set of cipher and/or HMAC contexts.
Definition crypto.h:202
Container for both halves of random material to be used in key method 2 data channel key generation.
Definition ssl_common.h:139
struct key_source client
Random provided by client.
Definition ssl_common.h:140
struct key_source server
Random provided by server.
Definition ssl_common.h:141
Container for one half of random material to be used in key method 2 data channel key generation.
Definition ssl_common.h:121
uint8_t random1[32]
Seed used for master secret generation, provided by both client and server.
Definition ssl_common.h:125
uint8_t pre_master[48]
Random used for master secret generation, provided only by client OpenVPN peer.
Definition ssl_common.h:122
uint8_t random2[32]
Seed used for key expansion, provided by both client and server.
Definition ssl_common.h:128
Security parameter state of one TLS and data channel key session.
Definition ssl_common.h:208
struct buffer_list * paybuf
Holds outgoing message for the control channel until ks->state reaches S_ACTIVE.
Definition ssl_common.h:252
unsigned int auth_token_state_flags
The state of the auth-token sent from the client.
Definition ssl_common.h:211
enum dco_key_status dco_status
Definition ssl_common.h:271
struct buffer ack_write_buf
Definition ssl_common.h:243
struct buffer plaintext_read_buf
Definition ssl_common.h:241
struct auth_deferred_status plugin_auth
Definition ssl_common.h:268
time_t must_die
Definition ssl_common.h:230
struct buffer plaintext_write_buf
Definition ssl_common.h:242
struct link_socket_actual remote_addr
Definition ssl_common.h:235
uint32_t peer_id
Key id for this key_state, inherited from struct tls_session.
Definition ssl_common.h:223
time_t established
Definition ssl_common.h:228
struct key_state_ssl ks_ssl
Definition ssl_common.h:225
time_t acf_last_mod
Definition ssl_common.h:266
time_t must_negotiate
Definition ssl_common.h:229
struct reliable_ack * rec_ack
Definition ssl_common.h:247
struct reliable * rec_reliable
Definition ssl_common.h:246
struct session_id session_id_remote
Definition ssl_common.h:234
unsigned int mda_key_id
Definition ssl_common.h:263
struct auth_deferred_status script_auth
Definition ssl_common.h:269
time_t initial
Definition ssl_common.h:227
enum auth_deferred_result mda_status
Definition ssl_common.h:264
enum ks_auth_state authenticated
Definition ssl_common.h:259
int key_id
Key id for this key_state, inherited from struct tls_session.
Definition ssl_common.h:217
time_t peer_last_packet
Definition ssl_common.h:231
struct reliable * send_reliable
Definition ssl_common.h:245
time_t auth_deferred_expire
Definition ssl_common.h:260
int initial_opcode
Definition ssl_common.h:233
struct reliable_ack * lru_acks
Definition ssl_common.h:248
struct key_source2 * key_src
Definition ssl_common.h:239
counter_type n_bytes
Definition ssl_common.h:253
counter_type n_packets
Definition ssl_common.h:254
Container for unidirectional cipher and HMAC key material.
Definition crypto.h:152
The acknowledgment structure in which packet IDs are stored for later acknowledgment.
Definition reliable.h:64
The reliability layer storage structure for one VPN tunnel's control channel in one direction.
Definition reliable.h:94
Security parameter state for a single VPN tunnel.
Definition ssl_common.h:611
char * auth_token_initial
The first auth-token we sent to a client.
Definition ssl_common.h:683
int n_hard_errors
Definition ssl_common.h:637
bool remote_usescomp
remote announced comp-lzo in OCC string
Definition ssl_common.h:703
dco_context_t * dco
Definition ssl_common.h:725
struct link_socket_actual to_link_addr
Definition ssl_common.h:628
char * peer_info
A multi-line string of general-purpose info received from peer over control channel.
Definition ssl_common.h:672
struct key_state * save_ks
Definition ssl_common.h:622
char * remote_ciphername
cipher specified in peer's config file
Definition ssl_common.h:702
char * locked_username
The locked username is the username we assume the client is using.
Definition ssl_common.h:649
enum multi_status multi_state
Definition ssl_common.h:632
unsigned int tas_cache_num_updates
The number of times we updated the cache.
Definition ssl_common.h:663
struct tls_options opt
Definition ssl_common.h:616
struct tls_session session[TM_SIZE]
Array of tls_session objects representing control channel sessions with the remote peer.
Definition ssl_common.h:711
int dco_keys_installed
Definition ssl_common.h:715
struct cert_hash_set * locked_cert_hash_set
Definition ssl_common.h:655
time_t tas_cache_last_update
Time of last when we updated the cached state of tls_authentication_status deferred files.
Definition ssl_common.h:660
char * locked_cn
Our locked common name, username, and cert hashes (cannot change during the life of this tls_multi ob...
Definition ssl_common.h:644
uint32_t peer_id
Definition ssl_common.h:699
char * client_reason
An error message to send to client on AUTH_FAILED.
Definition ssl_common.h:666
char * auth_token
If server sends a generated auth-token, this is the token to use for future user/pass authentications...
Definition ssl_common.h:678
bool use_peer_id
Definition ssl_common.h:700
char * locked_original_username
The username that client initially used before being overridden by –override-user.
Definition ssl_common.h:653
int n_sessions
Number of sessions negotiated thus far.
Definition ssl_common.h:630
int dco_peer_id
This is the handle that DCO uses to identify this session with the kernel.
Definition ssl_common.h:723
int n_soft_errors
Definition ssl_common.h:638
int64_t renegotiate_bytes
Definition ssl_common.h:345
struct key_ctx auth_token_key
Definition ssl_common.h:407
unsigned int auth_token_renewal
Definition ssl_common.h:405
struct env_set * es
Definition ssl_common.h:413
unsigned int auth_token_lifetime
Definition ssl_common.h:404
struct tls_wrap_ctx tls_wrap
TLS handshake wrapping state.
Definition ssl_common.h:387
size_t ekm_label_size
Definition ssl_common.h:451
unsigned int crypto_flags
Definition ssl_common.h:368
unsigned remote_cert_ku[MAX_PARMS]
Definition ssl_common.h:359
interval_t packet_timeout
Definition ssl_common.h:344
const char * auth_user_pass_file
Definition ssl_common.h:397
uint64_t aead_usage_limit
limit for AEAD cipher when not running in epoch data key mode, this is the sum of packets + blocks th...
Definition ssl_common.h:349
const char * client_crresponse_script
Definition ssl_common.h:393
const struct static_challenge_info * sci
Definition ssl_common.h:443
openvpn_net_ctx_t * net_ctx
Definition ssl_common.h:414
const char * tmp_dir
Definition ssl_common.h:395
interval_t renegotiate_seconds
Definition ssl_common.h:350
int64_t renegotiate_packets
Definition ssl_common.h:346
bool auth_user_pass_file_inline
Definition ssl_common.h:398
int verify_hash_depth
Definition ssl_common.h:362
const struct plugin_list * plugins
Definition ssl_common.h:415
const char * client_config_dir_exclusive
Definition ssl_common.h:410
bool tls_crypt_v2
Definition ssl_common.h:382
const char * export_peer_cert_dir
Definition ssl_common.h:396
char * x509_username_field[MAX_PARMS]
Definition ssl_common.h:365
int tls_crypt_v2_max_age
Definition ssl_common.h:384
const char * verify_command
Definition ssl_common.h:353
struct verify_hash_list * verify_hash
Definition ssl_common.h:361
const char * ekm_label
Definition ssl_common.h:450
size_t ekm_size
Definition ssl_common.h:452
int transition_window
Definition ssl_common.h:342
const char * remote_options
Definition ssl_common.h:325
const char * config_ciphername
Definition ssl_common.h:373
int verify_x509_type
Definition ssl_common.h:354
bool single_session
Definition ssl_common.h:328
bool data_epoch_supported
whether our underlying data channel supports new data channel features (epoch keys with AEAD tag at t...
Definition ssl_common.h:380
const char * verify_x509_name
Definition ssl_common.h:355
bool crl_file_inline
Definition ssl_common.h:357
const struct x509_track * x509_track
Definition ssl_common.h:440
bool verify_hash_no_ca
Definition ssl_common.h:363
struct man_def_auth_context * mda_context
Definition ssl_common.h:437
const char * tls_crypt_v2_verify_script
Definition ssl_common.h:383
bool auth_user_pass_verify_script_via_file
Definition ssl_common.h:394
const char * config_ncp_ciphers
Definition ssl_common.h:374
const char * local_options
Definition ssl_common.h:324
unsigned int ssl_flags
Definition ssl_common.h:434
bool auth_token_generate
Generate auth-tokens on successful user/pass auth,seet via options->auth_token_generate.
Definition ssl_common.h:400
int push_peer_info_detail
The detail of info we push in peer info.
Definition ssl_common.h:341
struct tls_root_ctx * ssl_ctx
Definition ssl_common.h:311
hash_algo_type verify_hash_algo
Definition ssl_common.h:364
bool auth_token_call_auth
always call normal authentication
Definition ssl_common.h:403
const char * crl_file
Definition ssl_common.h:356
int handshake_window
Definition ssl_common.h:343
bool dco_enabled
Whether keys have to be installed in DCO or not.
Definition ssl_common.h:454
const char * auth_user_pass_verify_script
Definition ssl_common.h:392
const char * remote_cert_eku
Definition ssl_common.h:360
int replay_window
Definition ssl_common.h:370
Structure that wraps the TLS context.
Security parameter state of a single session within a VPN tunnel.
Definition ssl_common.h:489
int key_id
The current active key id, used to keep track of renegotiations.
Definition ssl_common.h:511
struct tls_wrap_ctx tls_wrap_reneg
Definition ssl_common.h:501
struct key_state key[KS_SIZE]
Definition ssl_common.h:524
struct cert_hash_set * cert_hash_set
Definition ssl_common.h:517
struct tls_options * opt
Definition ssl_common.h:491
char * common_name
Definition ssl_common.h:515
struct tls_wrap_ctx tls_wrap
Definition ssl_common.h:497
int verify_maxlevel
Definition ssl_common.h:513
struct link_socket_actual untrusted_addr
Definition ssl_common.h:522
int initial_opcode
Definition ssl_common.h:503
Control channel wrapping (–tls-auth/–tls-crypt) context.
Definition ssl_common.h:276
struct buffer tls_crypt_v2_metadata
Received from client.
Definition ssl_common.h:288
bool cleanup_key_ctx
opt.key_ctx_bi is owned by this context
Definition ssl_common.h:289
struct crypto_options opt
Crypto state.
Definition ssl_common.h:283
enum tls_wrap_ctx::@28 mode
Control channel wrapping mode.
@ TLS_WRAP_CRYPT
Control channel encryption and authentication.
Definition ssl_common.h:281
@ TLS_WRAP_NONE
No control channel wrapping.
Definition ssl_common.h:279
@ TLS_WRAP_AUTH
Control channel authentication.
Definition ssl_common.h:280
struct buffer work
Work buffer (only for –tls-crypt)
Definition ssl_common.h:284
struct key_ctx tls_crypt_v2_server_key
Decrypts client keys.
Definition ssl_common.h:285
const struct buffer * tls_crypt_v2_wkc
Wrapped client key, sent to server.
Definition ssl_common.h:286
struct key2 original_wrap_keydata
original key data to be xored in to the key for dynamic tls-crypt.
Definition ssl_common.h:299