1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
|
/* An implementation of the nsd interface for Mbed TLS.
*
* Copyright 2008-2021 Adiscon GmbH.
* Copyright (C) 2023 CS Group.
*
* This file is part of the rsyslog runtime library.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
* -or-
* see COPYING.ASL20 in the source distribution
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef INCLUDED_NSD_MBEDTLS_H
#define INCLUDED_NSD_MBEDTLS_H
#include <mbedtls/net_sockets.h>
#include <mbedtls/entropy.h>
#include <mbedtls/ctr_drbg.h>
#include <mbedtls/ssl.h>
#include <mbedtls/x509_crt.h>
#include "nsd.h"
typedef nsd_if_t nsd_mbedtls_if_t; /* we just *implement* this interface */
/* the nsd_mbedtls object */
struct nsd_mbedtls_s {
BEGINobjInstance
; /* Data to implement generic object - MUST be the first data element! */
nsd_t *pTcp; /**< our aggregated nsd_ptcp data */
uchar *pszConnectHost; /**< hostname used for connect - may be used to
authenticate peer if no other name given */
const uchar *pszCAFile;
const uchar *pszCRLFile;
const uchar *pszKeyFile;
const uchar *pszCertFile;
int iMode; /* 0 - plain tcp, 1 - TLS */
int bAbortConn; /* if set, abort conncection (fatal error had happened) */
enum {
MBEDTLS_AUTH_CERTNAME = 0,
MBEDTLS_AUTH_CERTFINGERPRINT = 1,
MBEDTLS_AUTH_CERTVALID = 2,
MBEDTLS_AUTH_CERTANON = 3
} authMode;
enum {
MBEDTLS_EXPIRED_PERMIT = 0,
MBEDTLS_EXPIRED_DENY = 1,
MBEDTLS_EXPIRED_WARN = 2,
} permitExpiredCerts;
enum { MBEDTLS_NONE = 0, MBEDTLS_PURPOSE = 1 } dataTypeCheck;
int bHaveSess; /* true if a tls session is active */
int DrvrVerifyDepth; /* Verify Depth for certificate chains */
permittedPeers_t *pPermPeers; /* permitted peers */
int *anzCipherSuites; /* array of cipher suites (IANA ids) in decreasing priority order (0-terminated) */
int bSANpriority; /* if true, we do stricter checking (if any SAN present we do not check CN) */
int bReportAuthErr; /* only the first auth error is to be reported, this var triggers it. Initially, it is
* set to 1 and changed to 0 after the first report. It is changed back to 1 after
* one successful authentication. */
int sock;
mbedtls_entropy_context entropy;
mbedtls_ctr_drbg_context ctr_drbg;
mbedtls_ssl_context ssl;
mbedtls_ssl_config conf;
int bHaveCaCert;
mbedtls_x509_crt cacert;
int bHaveCrl;
mbedtls_x509_crl crl;
int bHaveKey;
mbedtls_pk_context pkey;
int bHaveCert;
mbedtls_x509_crt srvcert;
};
/* interface is defined in nsd.h, we just implement it! */
#define nsd_mbedtlsCURR_IF_VERSION nsdCURR_IF_VERSION
/* prototypes */
PROTOTYPEObj(nsd_mbedtls);
/* the name of our library binary */
#define LM_NSD_MBEDTLS_FILENAME "lmnsd_mbedtls"
#endif /* #ifndef INCLUDED_NSD_MBEDTLS_H */
|