forked from OpenVPN/openvpn3
-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathsslconsts.hpp
73 lines (61 loc) · 2.33 KB
/
sslconsts.hpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
// OpenVPN -- An application to securely tunnel IP networks
// over a single port, with support for SSL/TLS-based
// session authentication and key exchange,
// packet encryption, packet authentication, and
// packet compression.
//
// Copyright (C) 2012-2017 OpenVPN Inc.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License Version 3
// as published by the Free Software Foundation.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program in the COPYING file.
// If not, see <http://www.gnu.org/licenses/>.
#ifndef OPENVPN_SSL_SSLCONSTS_H
#define OPENVPN_SSL_SSLCONSTS_H
namespace openvpn {
namespace SSLConst {
// Special return values from SSL read/write methods
enum {
// Indicates that no cleartext data is available now (until
// more ciphertext is pushed into the SSL engine).
SHOULD_RETRY = -1,
// Return value from read_cleartext indicating that peer
// has sent a Close Notify message.
PEER_CLOSE_NOTIFY = -2,
};
// SSL config flags
enum {
// Show SSL status and cert chain in verify method
LOG_VERIFY_STATUS=(1<<0),
// Disable peer verification
NO_VERIFY_PEER=(1<<1),
// Enable SNI (Server Name Indication) when hostname is provided
ENABLE_SNI=(1<<2),
// [server only] Don't automatically fail connections on
// bad peer cert. Succeed the connection, but pass the
// fail status data via AuthCert so the higher layers
// can handle it.
DEFERRED_CERT_VERIFY=(1<<3),
// [server only] When running as a server, require that
// clients that connect to us have their certificate
// purpose set to server.
SERVER_TO_SERVER=(1<<4),
// last flag marker
LAST=(1<<5),
};
// filter all but SSL flags
inline unsigned int ssl_flags(const unsigned int flags)
{
return flags & (LAST-1);
}
}
}
#endif