OpenVPN
ssl_verify_openssl.c
Go to the documentation of this file.
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single TCP/UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
8 * Copyright (C) 2002-2026 OpenVPN Inc <sales@openvpn.net>
9 * Copyright (C) 2010-2026 Sentyron B.V. <openvpn@sentyron.com>
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License version 2
13 * as published by the Free Software Foundation.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License along
21 * with this program; if not, see <https://www.gnu.org/licenses/>.
22 */
23
29#ifdef HAVE_CONFIG_H
30#include "config.h"
31#endif
32
33#include "syshead.h"
34
35#if defined(ENABLE_CRYPTO_OPENSSL)
36
37#include "ssl_verify_openssl.h"
38
39#include "error.h"
40#include "ssl_openssl.h"
41#include "ssl_verify.h"
42#include "ssl_verify_backend.h"
43#include "openssl_compat.h"
44
45#include <openssl/bn.h>
46#include <openssl/err.h>
47#include <openssl/x509v3.h>
48
49int
50verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
51{
52 int ret = 0;
53 struct tls_session *session;
54 SSL *ssl;
55 struct gc_arena gc = gc_new();
56
57 /* get the tls_session pointer */
58 ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
59 ASSERT(ssl);
60 session = (struct tls_session *)SSL_get_ex_data(ssl, mydata_index);
62
63 X509 *current_cert = X509_STORE_CTX_get_current_cert(ctx);
66
67 /* did peer present cert which was signed by our root cert? */
68 if (!preverify_ok && !session->opt->verify_hash_no_ca)
69 {
70 /* get the X509 name */
73
74 if (!subject)
75 {
76 subject = "(Failed to retrieve certificate subject)";
77 }
78
79 /* Log and ignore missing CRL errors */
81 {
82 msg(D_TLS_DEBUG_LOW, "VERIFY WARNING: depth=%d, %s: %s",
85 ret = 1;
86 goto cleanup;
87 }
88
89 /* Remote site specified a certificate, but it's not correct */
90 msg(D_TLS_ERRORS, "VERIFY ERROR: depth=%d, error=%s: %s, serial=%s",
93 serial ? serial : "<not available>");
94
96
97 session->verified = false;
98 goto cleanup;
99 }
100
102 {
103 goto cleanup;
104 }
105
106 ret = 1;
107
108cleanup:
109 gc_free(&gc);
110
111 return ret;
112}
113
114bool
116{
117 int nid = OBJ_txt2nid(fieldname);
118 return nid == NID_subject_alt_name || nid == NID_issuer_alt_name;
119}
120
121static bool
122extract_x509_extension(X509 *cert, char *fieldname, char *out, size_t size)
123{
124 bool retval = false;
125
127 {
128 msg(D_TLS_ERRORS, "ERROR: --x509-username-field 'ext:%s' not supported", fieldname);
129 return false;
130 }
131
132 int nid = OBJ_txt2nid(fieldname);
134 if (extensions)
135 {
136 /* get amount of alternatives,
137 * RFC2459 claims there MUST be at least
138 * one, but we don't depend on it...
139 */
140
142
143 /* loop through all alternatives */
144 for (int i = 0; i < numalts; i++)
145 {
146 /* get a handle to alternative name number i */
148 char *buf = NULL;
149
150 switch (name->type)
151 {
152 case GEN_EMAIL:
153 if (ASN1_STRING_to_UTF8((unsigned char **)&buf, name->d.rfc822Name) < 0)
154 {
155 continue;
156 }
157 if ((ssize_t)strlen(buf) != ASN1_STRING_length(name->d.rfc822Name))
158 {
159 msg(D_TLS_ERRORS, "ASN1 ERROR: string contained terminating zero");
160 OPENSSL_free(buf);
161 }
162 else
163 {
164 strncpynt(out, buf, size);
165 OPENSSL_free(buf);
166 retval = true;
167 }
168 break;
169
170 default:
171 msg(D_TLS_DEBUG, "%s: ignoring general name field type %d", __func__,
172 name->type);
173 break;
174 }
175 }
177 }
178 return retval;
179}
180
181/*
182 * Extract a field from an X509 subject name.
183 *
184 * Example:
185 *
186 * /C=US/ST=CO/L=Denver/O=ORG/CN=First-CN/CN=Test-CA/Email=jim@yonan.net
187 *
188 * The common name is 'Test-CA'
189 *
190 * Return true on success, false on error (insufficient buffer size in 'out'
191 * to contain result is grounds for error).
192 */
193static result_t
194extract_x509_field_ssl(const X509_NAME *x509, const char *field_name, char *out, size_t size)
195{
196 int lastpos = -1;
197 int tmp = -1;
198 unsigned char *buf = NULL;
199
201 if (field_name_obj == NULL)
202 {
203 msg(D_TLS_ERRORS, "Invalid X509 attribute name '%s'", field_name);
204 return FAILURE;
205 }
206
207 ASSERT(size > 0);
208 *out = '\0';
209 do
210 {
211 lastpos = tmp;
212#if OPENSSL_VERSION_NUMBER >= 0x30000000L
214#else
215 /* OpenSSL 1.1.x has the argument as non-const */
217#endif
218 } while (tmp > -1);
219
221
222 /* Nothing found */
223 if (lastpos == -1)
224 {
225 return FAILURE;
226 }
227
229 if (!x509ne)
230 {
231 return FAILURE;
232 }
233
235 if (!asn1)
236 {
237 return FAILURE;
238 }
239 if (ASN1_STRING_to_UTF8(&buf, asn1) < 0)
240 {
241 return FAILURE;
242 }
243
244 strncpynt(out, (char *)buf, size);
245
246 const result_t ret = (strlen((char *)buf) < size) ? SUCCESS : FAILURE;
247 OPENSSL_free(buf);
248 return ret;
249}
250
252backend_x509_get_username(char *common_name, size_t cn_len, char *x509_username_field, X509 *peer_cert)
253{
254 if (strncmp("ext:", x509_username_field, 4) == 0)
255 {
256 if (!extract_x509_extension(peer_cert, x509_username_field + 4, common_name, cn_len))
257 {
258 return FAILURE;
259 }
260 }
261 else if (strcmp(LN_serialNumber, x509_username_field) == 0)
262 {
264
266 char *serial = BN_bn2hex(bn_serial);
268
269 if (!serial || cn_len <= strlen(serial) + 2)
270 {
272 return FAILURE;
273 }
274 snprintf(common_name, cn_len, "0x%s", serial);
276 }
277 else
278 {
280 if (x509_subject_name == NULL)
281 {
282 msg(D_TLS_ERRORS, "X509 subject name is NULL");
283 return FAILURE;
284 }
285
286 if (FAILURE
287 == extract_x509_field_ssl(x509_subject_name, x509_username_field,
288 common_name, cn_len))
289 {
290 return FAILURE;
291 }
292 }
293
294 return SUCCESS;
295}
296
297char *
315
316char *
318{
322 unsigned char *buf = malloc(len_serial);
324
325 char *ret = format_hex_ex(buf, len_serial, 0, 1, ":", gc);
326 free(buf);
328
329 return ret;
330}
331
333backend_x509_write_pem(openvpn_x509_cert_t *cert, const char *filename)
334{
335 BIO *out = BIO_new_file(filename, "w");
336 if (!out)
337 {
338 goto err;
339 }
340
341 if (!PEM_write_bio_X509(out, cert))
342 {
343 goto err;
344 }
345 BIO_free(out);
346
347 return SUCCESS;
348err:
349 BIO_free(out);
350 crypto_msg(D_TLS_DEBUG_LOW, "Error writing X509 certificate to file %s", filename);
351 return FAILURE;
352}
353
354struct buffer
356{
357 const EVP_MD *sha1 = EVP_sha1();
358 struct buffer hash = alloc_buf_gc((size_t)EVP_MD_size(sha1), gc);
359 X509_digest(cert, EVP_sha1(), BPTR(&hash), NULL);
361 return hash;
362}
363
364struct buffer
366{
367 const EVP_MD *sha256 = EVP_sha256();
368 struct buffer hash = alloc_buf_gc((size_t)EVP_MD_size(sha256), gc);
369 X509_digest(cert, EVP_sha256(), BPTR(&hash), NULL);
371 return hash;
372}
373
374char *
376{
379 char *subject = NULL;
380
382 if (subject_bio == NULL)
383 {
384 goto err;
385 }
386
390
391 if (BIO_eof(subject_bio))
392 {
393 goto err;
394 }
395
397
398 subject = gc_malloc(subject_mem->length + 1, false, gc);
399
400 memcpy(subject, subject_mem->data, subject_mem->length);
401 subject[subject_mem->length] = '\0';
402
403err:
405 return subject;
406}
407
408
409/*
410 * x509-track implementation -- save X509 fields to environment,
411 * using the naming convention:
412 *
413 * X509_{cert_depth}_{name}={value}
414 *
415 * This function differs from x509_setenv below in the following ways:
416 *
417 * (1) Only explicitly named attributes in xt are saved, per usage
418 * of "x509-track" program options.
419 * (2) Only the level 0 cert info is saved unless the XT_FULL_CHAIN
420 * flag is set in xt->flags (corresponds with prepending a '+'
421 * to the name when specified by "x509-track" program option).
422 * (3) This function supports both X509 subject name fields as
423 * well as X509 V3 extensions.
424 * (4) This function can return the SHA1 fingerprint of a cert, e.g.
425 * x509-track "+SHA1"
426 * will return the SHA1 fingerprint for each certificate in the
427 * peer chain.
428 */
429
430void
431x509_track_add(const struct x509_track **ll_head, const char *name, msglvl_t msglevel,
432 struct gc_arena *gc)
433{
434 struct x509_track *xt;
435 ALLOC_OBJ_CLEAR_GC(xt, struct x509_track, gc);
436 if (*name == '+')
437 {
438 xt->flags |= XT_FULL_CHAIN;
439 ++name;
440 }
441 xt->name = name;
442 xt->nid = OBJ_txt2nid(name);
443 if (xt->nid != NID_undef)
444 {
445 xt->next = *ll_head;
446 *ll_head = xt;
447 }
448 else
449 {
450 msg(msglevel, "x509_track: no such attribute '%s'", name);
451 }
452}
453
454/* worker method for setenv_x509_track */
455static void
456do_setenv_x509(struct env_set *es, const char *name, char *value, int depth)
457{
458 char *name_expand;
459 size_t name_expand_size;
460
461 string_mod(value, CC_ANY, CC_CRLF, '?');
462 msg(D_X509_ATTR, "X509 ATTRIBUTE name='%s' value='%s' depth=%d", name, value, depth);
463 name_expand_size = 64 + strlen(name);
464 name_expand = (char *)malloc(name_expand_size);
465 check_malloc_return(name_expand);
466 snprintf(name_expand, name_expand_size, "X509_%d_%s", depth, name);
467 setenv_str(es, name_expand, value);
468 free(name_expand);
469}
470
471void
472x509_setenv_track(const struct x509_track *xt, struct env_set *es, const int depth, X509 *x509)
473{
474 struct gc_arena gc = gc_new();
475#if OPENSSL_VERSION_NUMBER < 0x30000000L
476 /* OpenSSL 1.1.x APIs all take non-const arguments */
477 X509_NAME *x509_name = X509_get_subject_name(x509);
478#else
479 const X509_NAME *x509_name = X509_get_subject_name(x509);
480#endif
481 const char nullc = '\0';
482
483 while (xt)
484 {
485 if (depth == 0 || (xt->flags & XT_FULL_CHAIN))
486 {
487 switch (xt->nid)
488 {
489 case NID_sha1:
490 case NID_sha256:
491 {
492 struct buffer fp_buf;
493 char *fp_str = NULL;
494
495 if (xt->nid == NID_sha1)
496 {
498 }
499 else
500 {
502 }
503
504 fp_str = format_hex_ex(BPTR(&fp_buf), BLEN(&fp_buf), 0, 1 | FHE_CAPS, ":", &gc);
505 do_setenv_x509(es, xt->name, fp_str, depth);
506 }
507 break;
508
509 default:
510 {
511 int i = X509_NAME_get_index_by_NID(x509_name, xt->nid, -1);
512 if (i >= 0)
513 {
515 if (ent)
516 {
518 unsigned char *buf = NULL;
519 if (ASN1_STRING_to_UTF8(&buf, val) >= 0)
520 {
521 do_setenv_x509(es, xt->name, (char *)buf, depth);
522 OPENSSL_free(buf);
523 }
524 }
525 }
526 else
527 {
528 i = X509_get_ext_by_NID(x509, xt->nid, -1);
529 if (i >= 0)
530 {
531#if OPENSSL_VERSION_NUMBER < 0x40000000L
533#else
535#endif
536 if (ext)
537 {
538 BIO *bio = BIO_new(BIO_s_mem());
539 if (bio)
540 {
541 if (X509V3_EXT_print(bio, ext, 0, 0))
542 {
543 if (BIO_write(bio, &nullc, 1) == 1)
544 {
545 char *str;
547 do_setenv_x509(es, xt->name, str, depth);
548 }
549 }
550 BIO_free(bio);
551 }
552 }
553 }
554 }
555 }
556 }
557 }
558 xt = xt->next;
559 }
560 gc_free(&gc);
561}
562
563/*
564 * Save X509 fields to environment, using the naming convention:
565 *
566 * X509_{cert_depth}_{name}={value}
567 */
568void
570{
572
574 for (int i = 0; i < n; ++i)
575 {
577 if (!ent)
578 {
579 continue;
580 }
582 if (!fn)
583 {
584 continue;
585 }
587 if (!val)
588 {
589 continue;
590 }
591 int fn_nid = OBJ_obj2nid(fn);
592 if (fn_nid == NID_undef)
593 {
594 continue;
595 }
596 const char *objbuf = OBJ_nid2sn(fn_nid);
597 if (!objbuf)
598 {
599 continue;
600 }
601 unsigned char *buf = NULL;
602 if (ASN1_STRING_to_UTF8(&buf, val) < 0)
603 {
604 continue;
605 }
606 size_t name_expand_size = 64 + strlen(objbuf);
611 string_mod((char *)buf, CC_PRINT, CC_CRLF, '_');
612 setenv_str_incr(es, name_expand, (char *)buf);
613 free(name_expand);
614 OPENSSL_free(buf);
615 }
616}
617
620{
622 {
623 return SUCCESS;
624 }
626 {
627 /*
628 * Unfortunately, X509_check_purpose() before OpenSSL 4.0 does some weird thing that
629 * prevent it to take a const argument
630 */
633 /*
634 * Note that we did not check for netscape certificate type here but
635 * instead a general SSL/TLS client purpose. These nscert attributes
636 * might stop being accepted by TLS libraries in the future.
637 * Currently, OpenSSL 4.0 and aws-lc 1.9.0 still consider nscert client
638 * as acceptable.
639 *
640 * So in case that this check failed, we now check if this is caused
641 * by the check above no longer recognising nscert attributes.
642 */
643 if (result == FAILURE)
644 {
647 // bit 0 is to check if certificate is the client certificate
649 if (result == SUCCESS)
650 {
651 msg(M_WARN, "X509: Certificate is a client certificate yet it's purpose "
652 "cannot be verified (check may fail in the future)");
653 }
655 }
656 return result;
657 }
659 {
660 /*
661 * Unfortunately, X509_check_purpose() before OpenSSL 4.0 does some weird thing that
662 * prevent it to take a const argument
663 */
666
667 /*
668 * Note that we did not check for netscape certificate type here but
669 * instead a general SSL/TLS server purpose. These nscert attributes
670 * might stop being accepted by TLS libraries in the future.
671 * Currently, OpenSSL 4.0 and aws-lc 1.9.0 still consider nscert server
672 * as acceptable.
673 *
674 * So in case that this check failed, we now check if this is caused
675 * by the check above no longer recognising nscert attributes.
676 */
677 if (result == FAILURE)
678 {
680 // Server bit is 1 for ASN1_BIT_STRING_get_bit
682 if (result == SUCCESS)
683 {
684 msg(M_WARN, "X509: Certificate is a server certificate yet it's purpose "
685 "cannot be verified (check may fail in the future)");
686 }
688 }
689 return result;
690 }
691
692 return FAILURE;
693}
694
696x509_verify_cert_ku(X509 *x509, const unsigned int *const expected_ku, size_t expected_len)
697{
699
700 if (ku == NULL)
701 {
702 msg(D_TLS_ERRORS, "Certificate does not have key usage extension");
703 return FAILURE;
704 }
705
707 {
708 /* Extension required, value checked by TLS library */
710 return SUCCESS;
711 }
712
713 unsigned int nku = 0;
714 for (int i = 0; i < 8; i++)
715 {
717 {
718 nku |= 1 << (7 - i);
719 }
720 }
721
722 /*
723 * Fixup if no LSB bits
724 */
725 if ((nku & 0xff) == 0)
726 {
727 nku >>= 8;
728 }
729
730 msg(D_HANDSHAKE, "Validating certificate key usage");
732 for (size_t i = 0; fFound != SUCCESS && i < expected_len; i++)
733 {
734 if (expected_ku[i] != 0 && (nku & expected_ku[i]) == expected_ku[i])
735 {
736 fFound = SUCCESS;
737 }
738 }
739
740 if (fFound != SUCCESS)
741 {
742 msg(D_TLS_ERRORS, "ERROR: Certificate has key usage %04x, expected one of:", nku);
743 for (size_t i = 0; i < expected_len && expected_ku[i]; i++)
744 {
745 msg(D_TLS_ERRORS, " * %04x", expected_ku[i]);
746 }
747 }
748
750
751 return fFound;
752}
753
756{
759
761 {
762 msg(D_HANDSHAKE, "Certificate does not have extended key usage extension");
763 }
764 else
765 {
766 int i;
767
768 msg(D_HANDSHAKE, "Validating certificate extended key usage");
769 for (i = 0; SUCCESS != fFound && i < sk_ASN1_OBJECT_num(eku); i++)
770 {
772 char szOid[1024];
773
774 if (SUCCESS != fFound && OBJ_obj2txt(szOid, sizeof(szOid), oid, 0) != -1)
775 {
776 msg(D_HANDSHAKE, "++ Certificate has EKU (str) %s, expects %s", szOid,
779 {
780 fFound = SUCCESS;
781 }
782 }
783 if (SUCCESS != fFound && OBJ_obj2txt(szOid, sizeof(szOid), oid, 1) != -1)
784 {
785 msg(D_HANDSHAKE, "++ Certificate has EKU (oid) %s, expects %s", szOid,
788 {
789 fFound = SUCCESS;
790 }
791 }
792 }
793 }
794
795 if (eku != NULL)
796 {
798 }
799
800 return fFound;
801}
802
803bool
805{
806 if (!opt->crl_file || (opt->ssl_flags & SSLF_CRL_VERIFY_DIR))
807 {
808 return false;
809 }
810
812 if (!store)
813 {
814 crypto_msg(M_FATAL, "Cannot get certificate store");
815 }
816
818 for (int i = 0; i < sk_X509_OBJECT_num(objs); i++)
819 {
821 ASSERT(obj);
823 {
824 return false;
825 }
826 }
827 return true;
828}
829
830#endif /* defined(ENABLE_CRYPTO_OPENSSL) */
void * gc_malloc(size_t size, bool clear, struct gc_arena *a)
Definition buffer.c:336
struct buffer alloc_buf_gc(size_t size, struct gc_arena *gc)
Definition buffer.c:89
char * format_hex_ex(const uint8_t *data, size_t size, size_t maxoutput, unsigned int space_break_flags, const char *separator, struct gc_arena *gc)
Definition buffer.c:483
bool string_mod(char *str, const unsigned int inclusive, const unsigned int exclusive, const char replace)
Modifies a string in place by replacing certain classes of characters of it with a specified characte...
Definition buffer.c:1054
char * string_alloc(const char *str, struct gc_arena *gc)
Definition buffer.c:648
#define CC_ANY
any character
Definition buffer.h:878
#define BPTR(buf)
Definition buffer.h:123
static bool buf_inc_len(struct buffer *buf, int inc)
Definition buffer.h:589
#define CC_CRLF
carriage return or newline
Definition buffer.h:915
#define ALLOC_OBJ_CLEAR_GC(dptr, type, gc)
Definition buffer.h:1125
#define BLEN(buf)
Definition buffer.h:126
static void strncpynt(char *dest, const char *src, size_t maxlen)
Definition buffer.h:362
static void check_malloc_return(void *p)
Definition buffer.h:1131
static void gc_free(struct gc_arena *a)
Definition buffer.h:1049
#define CC_PRINT
printable (>= 32, != 127)
Definition buffer.h:886
#define FHE_CAPS
Definition buffer.h:499
static struct gc_arena gc_new(void)
Definition buffer.h:1041
#define crypto_msg(flags,...)
Retrieve any OpenSSL errors, then print the supplied error message.
void setenv_str(struct env_set *es, const char *name, const char *value)
Definition env_set.c:307
void setenv_str_incr(struct env_set *es, const char *name, const char *value)
Store the supplied name value pair in the env_set.
Definition env_set.c:329
#define D_TLS_DEBUG_LOW
Definition errlevel.h:76
#define D_X509_ATTR
Definition errlevel.h:102
#define D_HANDSHAKE
Definition errlevel.h:71
#define D_TLS_ERRORS
Definition errlevel.h:58
#define D_TLS_DEBUG
Definition errlevel.h:164
int verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
Verify that the remote OpenVPN peer's certificate allows setting up a VPN tunnel.
OpenSSL compatibility stub.
#define M_FATAL
Definition error.h:90
#define msg(flags,...)
Definition error.h:152
unsigned int msglvl_t
Definition error.h:77
#define ASSERT(x)
Definition error.h:219
#define M_WARN
Definition error.h:92
void usage(void)
Definition options.c:4844
#define SSLF_CRL_VERIFY_DIR
Definition ssl_common.h:429
int mydata_index
Allocate space in SSL objects in which to store a struct tls_session pointer back to parent.
Definition ssl_openssl.c:88
Control Channel OpenSSL Backend.
result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth)
Definition ssl_verify.c:577
void cert_hash_remember(struct tls_session *session, const int error_depth, const struct buffer *cert_hash)
Definition ssl_verify.c:194
Control Channel Verification Module.
#define OPENVPN_KU_REQUIRED
Require keyUsage to be present in cert (0xFFFF is an invalid KU value)
Definition ssl_verify.h:257
#define XT_FULL_CHAIN
Definition ssl_verify.h:241
#define NS_CERT_CHECK_CLIENT
Do not perform Netscape certificate type verification.
Definition ssl_verify.h:254
#define NS_CERT_CHECK_NONE
Do not perform Netscape certificate type verification.
Definition ssl_verify.h:250
#define NS_CERT_CHECK_SERVER
Do not perform Netscape certificate type verification.
Definition ssl_verify.h:252
Control Channel Verification Module library-specific backend interface.
result_t
Result of verification function.
@ FAILURE
@ SUCCESS
mbedtls_x509_crt openvpn_x509_cert_t
char * x509_get_subject(X509 *cert, struct gc_arena *gc)
struct buffer x509_get_sha1_fingerprint(X509 *cert, struct gc_arena *gc)
result_t x509_verify_cert_ku(X509 *x509, const unsigned int *const expected_ku, size_t expected_len)
bool tls_verify_crl_missing(const struct tls_options *opt)
Return true iff a CRL is configured, but is not loaded.
static result_t extract_x509_field_ssl(const X509_NAME *x509, const char *field_name, char *out, size_t size)
result_t backend_x509_write_pem(openvpn_x509_cert_t *cert, const char *filename)
struct buffer x509_get_sha256_fingerprint(X509 *cert, struct gc_arena *gc)
result_t x509_verify_cert_eku(X509 *x509, const char *const expected_oid)
static void do_setenv_x509(struct env_set *es, const char *name, char *value, int depth)
static bool extract_x509_extension(X509 *cert, char *fieldname, char *out, size_t size)
bool x509_username_field_ext_supported(const char *fieldname)
Return true iff the supplied extension field is supported by the –x509-username-field option.
char * backend_x509_get_serial_hex(openvpn_x509_cert_t *cert, struct gc_arena *gc)
result_t x509_verify_ns_cert_type(openvpn_x509_cert_t *peer_cert, const int usage)
void x509_setenv_track(const struct x509_track *xt, struct env_set *es, const int depth, X509 *x509)
char * backend_x509_get_serial(openvpn_x509_cert_t *cert, struct gc_arena *gc)
void x509_track_add(const struct x509_track **ll_head, const char *name, msglvl_t msglevel, struct gc_arena *gc)
void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert)
result_t backend_x509_get_username(char *common_name, size_t cn_len, char *x509_username_field, X509 *peer_cert)
Control Channel Verification Module OpenSSL backend.
Wrapper structure for dynamically allocated memory.
Definition buffer.h:60
int len
Length in bytes of the actual content within the allocated memory.
Definition buffer.h:65
Structure containing the hash for a single certificate.
Definition ssl_verify.h:58
Garbage collection arena used to keep track of dynamically allocated memory.
Definition buffer.h:116
Definition list.h:53
unsigned int ssl_flags
Definition ssl_common.h:435
struct tls_root_ctx * ssl_ctx
Definition ssl_common.h:311
const char * crl_file
Definition ssl_common.h:356
SSL_CTX * ctx
Definition ssl_openssl.h:41
Security parameter state of a single session within a VPN tunnel.
Definition ssl_common.h:490
unsigned int flags
Definition ssl_verify.h:242
const struct x509_track * next
Definition ssl_verify.h:239
const char * name
Definition ssl_verify.h:240
struct env_set * es
static int cleanup(void **state)
struct gc_arena gc
Definition test_ssl.c:133