summaryrefslogtreecommitdiffstats
path: root/libnetdata/socket/security.h
blob: f4771414f7de1d6ebe9cb6db78fd7a3c0803c8d7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
#ifndef NETDATA_SECURITY_H
# define NETDATA_SECURITY_H

# include <openssl/ssl.h>
# include <openssl/err.h>
# if (SSLEAY_VERSION_NUMBER >= 0x0907000L) && (OPENSSL_VERSION_NUMBER < 0x10100000L)
#  include <openssl/conf.h>
# endif

#define NETDATA_SSL_HANDSHAKE_COMPLETE 0    //All the steps were successful
#define NETDATA_SSL_START 1                 //Starting handshake, conn variable is NULL
#define NETDATA_SSL_WANT_READ 2             //The connection wanna read from socket
#define NETDATA_SSL_WANT_WRITE 4            //The connection wanna write on socket
#define NETDATA_SSL_NO_HANDSHAKE 8          //Continue without encrypt connection.
#define NETDATA_SSL_OPTIONAL 16             //Flag to define the HTTP request
#define NETDATA_SSL_FORCE 32                //We only accepts HTTPS request
#define NETDATA_SSL_INVALID_CERTIFICATE 64  //Accepts invalid certificate
#define NETDATA_SSL_VALID_CERTIFICATE 128  //Accepts invalid certificate
struct netdata_ssl{
    SSL *conn; //SSL connection
    int flags;
};

extern SSL_CTX *netdata_cli_ctx;
extern SSL_CTX *netdata_srv_ctx;
extern const char *security_key;
extern const char *security_cert;
extern int netdata_use_ssl_on_stream;
extern int netdata_use_ssl_on_http;
extern int netdata_validate_server;

void security_openssl_library();
void security_clean_openssl();
void security_start_ssl(int type);
int security_process_accept(SSL *ssl,int msg);
int security_test_certificate(SSL *ssl);

#endif //NETDATA_SECURITY_H