]> git.ipfire.org Git - thirdparty/openvpn.git/blame - src/openvpn/options.h
Check PRF availability on initialisation and add --force-tls-key-material-export
[thirdparty/openvpn.git] / src / openvpn / options.h
CommitLineData
6fbf66fa
JY
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
ccf9d572 8 * Copyright (C) 2002-2023 OpenVPN Inc <sales@openvpn.net>
6fbf66fa
JY
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2
12 * as published by the Free Software Foundation.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
caa54ac3
DS
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, write to the Free Software Foundation, Inc.,
21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
6fbf66fa
JY
22 */
23
24/*
25 * 2004-01-28: Added Socks5 proxy support
26 * (Christof Meerwald, http://cmeerw.org)
27 */
28
29#ifndef OPTIONS_H
30#define OPTIONS_H
31
32#include "basic.h"
33#include "common.h"
34#include "mtu.h"
35#include "route.h"
36#include "tun.h"
37#include "socket.h"
38#include "plugin.h"
39#include "manage.h"
40#include "proxy.h"
38d96bd7 41#include "comp.h"
3eee126e 42#include "pushlist.h"
581bef87 43#include "clinat.h"
2193d7c0 44#include "crypto_backend.h"
b3e0d95d 45#include "dns.h"
2193d7c0 46
6fbf66fa
JY
47
48/*
49 * Maximum number of parameters associated with an option,
50 * including the option name itself.
51 */
52#define MAX_PARMS 16
53
54/*
55 * Max size of options line and parameter.
56 */
57#define OPTION_PARM_SIZE 256
58#define OPTION_LINE_SIZE 256
59
60extern const char title_string[];
61
6fbf66fa 62/* certain options are saved before --pull modifications are applied */
c1150e5b 63struct options_pre_connect
6fbf66fa 64{
81d882d5
DS
65 bool tuntap_options_defined;
66 struct tuntap_options tuntap_options;
6fbf66fa 67
81d882d5
DS
68 bool routes_defined;
69 struct route_option_list *routes;
6fbf66fa 70
81d882d5
DS
71 bool routes_ipv6_defined;
72 struct route_ipv6_option_list *routes_ipv6;
91402236 73
57c8d220
AS
74 const char *route_default_gateway;
75 const char *route_ipv6_default_gateway;
76
81d882d5
DS
77 bool client_nat_defined;
78 struct client_nat_option_list *client_nat;
581bef87 79
b3e0d95d
HH
80 struct dns_options dns_options;
81
abe49856
DS
82 const char *ciphername;
83 const char *authname;
7064ccb9 84
5a2ed714
AS
85 int ping_send_timeout;
86 int ping_rec_timeout;
87 int ping_rec_timeout_action;
88
81d882d5 89 int foreign_option_index;
2a414c3c 90 struct compress_options comp;
6fbf66fa
JY
91};
92
c7ca9133 93#if !defined(ENABLE_CRYPTO_OPENSSL) && !defined(ENABLE_CRYPTO_MBEDTLS)
81d882d5 94#error "At least one of OpenSSL or mbed TLS needs to be defined."
6fbf66fa
JY
95#endif
96
4e9a51d7
JY
97struct connection_entry
98{
81d882d5
DS
99 int proto;
100 sa_family_t af;
101 const char *local_port;
102 bool local_port_defined;
103 const char *remote_port;
104 const char *local;
105 const char *remote;
106 bool remote_float;
107 bool bind_defined;
108 bool bind_ipv6_only;
109 bool bind_local;
110 int connect_retry_seconds;
111 int connect_retry_seconds_max;
112 int connect_timeout;
113 struct http_proxy_options *http_proxy_options;
114 const char *socks_proxy_server;
115 const char *socks_proxy_port;
116 const char *socks_proxy_authfile;
117
118 int tun_mtu; /* MTU of tun device */
761575cb 119 int occ_mtu; /* if non-null, this is the MTU we announce to peers in OCC */
01aed6a5
AS
120 int tun_mtu_max; /* maximum MTU that can be pushed */
121
81d882d5
DS
122 bool tun_mtu_defined; /* true if user overriding parm with command line option */
123 int tun_mtu_extra;
124 bool tun_mtu_extra_defined;
125 int link_mtu; /* MTU of device over which tunnel packets pass via TCP/UDP */
126 bool link_mtu_defined; /* true if user overriding parm with command line option */
5f6ea597 127 int tls_mtu; /* Maximum MTU for the control channel messages */
81d882d5
DS
128
129 /* Advanced MTU negotiation and datagram fragmentation options */
130 int mtu_discover_type; /* used if OS supports setting Path MTU discovery options on socket */
131
132 int fragment; /* internal fragmentation size */
0d969976
AS
133 bool fragment_encap; /* true if --fragment had the "mtu" parameter to
134 * include overhead from IP and TCP/UDP encapsulation */
81d882d5 135 int mssfix; /* Upper bound on TCP MSS */
0d86da32 136 bool mssfix_default; /* true if --mssfix should use the default parameters */
0fcb7cad
AS
137 bool mssfix_encap; /* true if --mssfix had the "mtu" parameter to include
138 * overhead from IP and TCP/UDP encapsulation */
47671d6d 139 bool mssfix_fixed; /* use the mssfix value without any encapsulation adjustments */
81d882d5
DS
140
141 int explicit_exit_notification; /* Explicitly tell peer when we are exiting via OCC_EXIT or [RESTART] message */
142
143#define CE_DISABLED (1<<0)
144#define CE_MAN_QUERY_PROXY (1<<1)
145#define CE_MAN_QUERY_REMOTE_UNDEF 0
146#define CE_MAN_QUERY_REMOTE_QUERY 1
147#define CE_MAN_QUERY_REMOTE_ACCEPT 2
148#define CE_MAN_QUERY_REMOTE_MOD 3
149#define CE_MAN_QUERY_REMOTE_SKIP 4
150#define CE_MAN_QUERY_REMOTE_MASK (0x07)
151#define CE_MAN_QUERY_REMOTE_SHIFT (2)
152 unsigned int flags;
57d6f103
AQ
153
154 /* Shared secret used for TLS control channel authentication */
155 const char *tls_auth_file;
cb2e9218 156 bool tls_auth_file_inline;
57d6f103
AQ
157 int key_direction;
158
159 /* Shared secret used for TLS control channel authenticated encryption */
160 const char *tls_crypt_file;
cb2e9218 161 bool tls_crypt_file_inline;
9d59029a
SK
162
163 /* Client-specific secret or server key used for TLS control channel
164 * authenticated encryption v2 */
165 const char *tls_crypt_v2_file;
cb2e9218 166 bool tls_crypt_v2_file_inline;
e7d8c4a7
AS
167
168 /* Allow only client that support resending the wrapped client key */
169 bool tls_crypt_v2_force_cookie;
4e9a51d7
JY
170};
171
172struct remote_entry
173{
81d882d5
DS
174 const char *remote;
175 const char *remote_port;
176 int proto;
177 sa_family_t af;
4e9a51d7
JY
178};
179
4e9a51d7
JY
180#define CONNECTION_LIST_SIZE 64
181
182struct connection_list
183{
4954beb6 184 int capacity;
81d882d5
DS
185 int len;
186 int current;
4954beb6 187 struct connection_entry **array;
4e9a51d7
JY
188};
189
190struct remote_list
191{
4954beb6 192 int capacity;
81d882d5 193 int len;
4954beb6 194 struct remote_entry **array;
4e9a51d7
JY
195};
196
08081aa0
AS
197struct provider_list
198{
199 /* Names of the providers */
200 const char *names[MAX_PARMS];
201 /* Pointers to the loaded providers to unload them */
202 provider_t *providers[MAX_PARMS];
203};
204
99f28081
AQ
205enum vlan_acceptable_frames
206{
e375a5ce 207 VLAN_ONLY_TAGGED,
99f28081 208 VLAN_ONLY_UNTAGGED_OR_PRIORITY,
d626fa17 209 VLAN_ALL,
99f28081
AQ
210};
211
54561af6
JY
212struct remote_host_store
213{
81d882d5
DS
214#define RH_HOST_LEN 80
215 char host[RH_HOST_LEN];
076fd3e4 216#define RH_PORT_LEN 20
81d882d5 217 char port[RH_PORT_LEN];
54561af6 218};
54561af6 219
0d80b562
AS
220enum genkey_type {
221 GENKEY_SECRET,
222 GENKEY_TLS_CRYPTV2_CLIENT,
223 GENKEY_TLS_CRYPTV2_SERVER,
1b9a88a2 224 GENKEY_AUTH_TOKEN
0d80b562
AS
225};
226
d1fe6d52
AS
227struct verify_hash_list
228{
229 /* We support SHA256 and SHA1 fingerpint. In the case of using the
230 * deprecated SHA1, only the first 20 bytes of each list item are used */
231 uint8_t hash[SHA256_DIGEST_LENGTH];
232 struct verify_hash_list *next;
233};
234
6fbf66fa
JY
235/* Command line options */
236struct options
237{
81d882d5
DS
238 struct gc_arena gc;
239 bool gc_owned;
6fbf66fa 240
81d882d5
DS
241 /* first config file */
242 const char *config;
6fbf66fa 243
81d882d5
DS
244 /* major mode */
245#define MODE_POINT_TO_POINT 0
246#define MODE_SERVER 1
247 int mode;
6fbf66fa 248
81d882d5
DS
249 /* enable forward compatibility for post-2.1 features */
250 bool forward_compatible;
00a622f5 251 /** What version we should try to be compatible with as major * 10000 +
abe49856 252 * minor * 100 + patch, e.g. 2.4.7 => 20407 */
00a622f5
AQ
253 unsigned int backwards_compatible;
254
42d9f324 255 /* list of options that should be ignored even if unknown */
81d882d5 256 const char **ignore_unknown_option;
373faab1 257
81d882d5
DS
258 /* persist parms */
259 bool persist_config;
260 int persist_mode;
6fbf66fa 261
81d882d5
DS
262 const char *key_pass_file;
263 bool show_ciphers;
264 bool show_digests;
265 bool show_engines;
266 bool show_tls_ciphers;
267 bool show_curves;
268 bool genkey;
0d80b562 269 enum genkey_type genkey_type;
9cf7b492
AS
270 const char *genkey_filename;
271 const char *genkey_extra_data;
81d882d5
DS
272
273 /* Networking parms */
274 int connect_retry_max;
275 struct connection_entry ce;
276 struct connection_list *connection_list;
277
278 struct remote_list *remote_list;
c9474fa3 279 /* Do not advance the connection or remote addr list */
81d882d5 280 bool no_advance;
c9474fa3
AS
281 /* Advance directly to the next remote, skipping remaining addresses of the
282 * current remote */
283 bool advance_next_remote;
81d882d5
DS
284 /* Counts the number of unsuccessful connection attempts */
285 unsigned int unsuccessful_attempts;
ec5ffe35
SN
286 /* count of connection entries to advance by when no_advance is not set */
287 int ce_advance_count;
c9474fa3
AS
288 /* the server can suggest a backoff time to the client, it
289 * will still be capped by the max timeout between connections
290 * (300s by default) */
291 int server_backoff_time;
4e9a51d7 292
a4b8f653 293#if ENABLE_MANAGEMENT
81d882d5
DS
294 struct http_proxy_options *http_proxy_override;
295#endif
296
297 struct remote_host_store *rh_store;
298
b3e0d95d
HH
299 struct dns_options dns_options;
300
81d882d5
DS
301 bool remote_random;
302 const char *ipchange;
303 const char *dev;
304 const char *dev_type;
305 const char *dev_node;
306 const char *lladdr;
307 int topology; /* one of the TOP_x values from proto.h */
308 const char *ifconfig_local;
309 const char *ifconfig_remote_netmask;
310 const char *ifconfig_ipv6_local;
311 int ifconfig_ipv6_netbits;
312 const char *ifconfig_ipv6_remote;
313 bool ifconfig_noexec;
314 bool ifconfig_nowarn;
81d882d5 315 int shaper;
6fbf66fa 316
81d882d5 317 int proto_force;
51e6e5b0 318
81d882d5 319 bool mtu_test;
6fbf66fa 320
ffea644c 321#ifdef ENABLE_MEMSTATS
81d882d5 322 char *memstats_fn;
ffea644c
JY
323#endif
324
81d882d5 325 bool mlock;
6fbf66fa 326
81d882d5
DS
327 int keepalive_ping; /* a proxy for ping/ping-restart */
328 int keepalive_timeout;
6fbf66fa 329
81d882d5 330 int inactivity_timeout; /* --inactive */
cae1a7fc 331 int64_t inactivity_minimum_bytes;
838911cc 332
f96290ff
DZ
333 int session_timeout; /* Force-kill session after n seconds */
334
81d882d5
DS
335 int ping_send_timeout; /* Send a TCP/UDP ping to remote every n seconds */
336 int ping_rec_timeout; /* Expect a TCP/UDP ping from remote at least once every n seconds */
337 bool ping_timer_remote; /* Run ping timer only if we have a remote address */
6fbf66fa 338
81d882d5
DS
339#define PING_UNDEF 0
340#define PING_EXIT 1
341#define PING_RESTART 2
342 int ping_rec_timeout_action; /* What action to take on ping_rec_timeout (exit or restart)? */
6fbf66fa 343
81d882d5
DS
344 bool persist_tun; /* Don't close/reopen TUN/TAP dev on SIGUSR1 or PING_RESTART */
345 bool persist_local_ip; /* Don't re-resolve local address on SIGUSR1 or PING_RESTART */
346 bool persist_remote_ip; /* Don't re-resolve remote address on SIGUSR1 or PING_RESTART */
347 bool persist_key; /* Don't re-read key files on SIGUSR1 or PING_RESTART */
6fbf66fa 348
6fbf66fa 349#if PASSTOS_CAPABILITY
81d882d5 350 bool passtos;
6fbf66fa
JY
351#endif
352
81d882d5
DS
353 int resolve_retry_seconds; /* If hostname resolve fails, retry for n seconds */
354 bool resolve_in_advance;
355 const char *ip_remote_hint;
6fbf66fa 356
81d882d5 357 struct tuntap_options tuntap_options;
6fbf66fa 358
81d882d5
DS
359 /* Misc parms */
360 const char *username;
361 const char *groupname;
362 const char *chroot_dir;
363 const char *cd_dir;
cd5990e0 364#ifdef ENABLE_SELINUX
81d882d5 365 char *selinux_context;
99385447 366#endif
81d882d5
DS
367 const char *writepid;
368 const char *up_script;
369 const char *down_script;
370 bool user_script_used;
371 bool down_pre;
372 bool up_delay;
373 bool up_restart;
374 bool daemon;
6fbf66fa 375
81d882d5 376 int remap_sigusr1;
6fbf66fa 377
81d882d5
DS
378 bool log;
379 bool suppress_timestamps;
380 bool machine_readable_output;
381 int nice;
382 int verbosity;
383 int mute;
6fbf66fa
JY
384
385#ifdef ENABLE_DEBUG
81d882d5 386 int gremlin;
6fbf66fa
JY
387#endif
388
81d882d5
DS
389 const char *status_file;
390 int status_file_version;
391 int status_file_update_freq;
6fbf66fa 392
81d882d5
DS
393 /* optimize TUN/TAP/UDP writes */
394 bool fast_io;
6fbf66fa 395
81d882d5 396 struct compress_options comp;
81d882d5
DS
397
398 /* buffer sizes */
399 int rcvbuf;
400 int sndbuf;
401
402 /* mark value */
403 int mark;
19d3c602 404 char *bind_dev;
81d882d5
DS
405
406 /* socket flags */
407 unsigned int sockflags;
408
409 /* route management */
410 const char *route_script;
411 const char *route_predown_script;
412 const char *route_default_gateway;
d24e1b17 413 const char *route_ipv6_default_gateway;
81d882d5
DS
414 int route_default_metric;
415 bool route_noexec;
416 int route_delay;
417 int route_delay_window;
418 bool route_delay_defined;
419 struct route_option_list *routes;
420 struct route_ipv6_option_list *routes_ipv6; /* IPv6 */
e11d2d14 421 bool block_ipv6;
81d882d5
DS
422 bool route_nopull;
423 bool route_gateway_via_dhcp;
424 bool allow_pull_fqdn; /* as a client, allow server to push a FQDN for certain parameters */
425 struct client_nat_option_list *client_nat;
581bef87 426
81d882d5
DS
427 /* Enable options consistency check between peers */
428 bool occ;
6fbf66fa
JY
429
430#ifdef ENABLE_MANAGEMENT
81d882d5
DS
431 const char *management_addr;
432 const char *management_port;
433 const char *management_user_pass;
434 int management_log_history_cache;
435 int management_echo_buffer_size;
436 int management_state_buffer_size;
90efcacb 437
81d882d5
DS
438 const char *management_client_user;
439 const char *management_client_group;
bb564a59 440
81d882d5 441 const char *management_certificate;
6fbf66fa 442#endif
ff7d7989
FL
443 /* Mask of MF_ values of manage.h */
444 unsigned int management_flags;
6fbf66fa
JY
445
446#ifdef ENABLE_PLUGIN
81d882d5 447 struct plugin_option_list *plugin_list;
6fbf66fa
JY
448#endif
449
81d882d5
DS
450 /* the tmp dir is for now only used in the P2P server context */
451 const char *tmp_dir;
452 bool server_defined;
453 in_addr_t server_network;
454 in_addr_t server_netmask;
455 bool server_ipv6_defined; /* IPv6 */
456 struct in6_addr server_network_ipv6; /* IPv6 */
457 unsigned int server_netbits_ipv6; /* IPv6 */
458
459#define SF_NOPOOL (1<<0)
460#define SF_TCP_NODELAY_HELPER (1<<1)
461#define SF_NO_PUSH_ROUTE_GATEWAY (1<<2)
462 unsigned int server_flags;
463
464 bool server_bridge_proxy_dhcp;
465
466 bool server_bridge_defined;
467 in_addr_t server_bridge_ip;
468 in_addr_t server_bridge_netmask;
469 in_addr_t server_bridge_pool_start;
470 in_addr_t server_bridge_pool_end;
471
472 struct push_list push_list;
473 bool ifconfig_pool_defined;
474 in_addr_t ifconfig_pool_start;
475 in_addr_t ifconfig_pool_end;
476 in_addr_t ifconfig_pool_netmask;
477 const char *ifconfig_pool_persist_filename;
478 int ifconfig_pool_persist_refresh_freq;
479
480 bool ifconfig_ipv6_pool_defined; /* IPv6 */
481 struct in6_addr ifconfig_ipv6_pool_base; /* IPv6 */
482 int ifconfig_ipv6_pool_netbits; /* IPv6 */
483
484 int real_hash_size;
485 int virtual_hash_size;
486 const char *client_connect_script;
487 const char *client_disconnect_script;
488 const char *learn_address_script;
23eec2d2 489 const char *client_crresponse_script;
81d882d5
DS
490 const char *client_config_dir;
491 bool ccd_exclusive;
492 bool disable;
493 int n_bcast_buf;
494 int tcp_queue_limit;
495 struct iroute *iroutes;
496 struct iroute_ipv6 *iroutes_ipv6; /* IPv6 */
497 bool push_ifconfig_defined;
498 in_addr_t push_ifconfig_local;
499 in_addr_t push_ifconfig_remote_netmask;
500 in_addr_t push_ifconfig_local_alias;
501 bool push_ifconfig_constraint_defined;
502 in_addr_t push_ifconfig_constraint_network;
503 in_addr_t push_ifconfig_constraint_netmask;
6ae2f19d 504 bool push_ifconfig_ipv4_blocked; /* IPv4 */
81d882d5
DS
505 bool push_ifconfig_ipv6_defined; /* IPv6 */
506 struct in6_addr push_ifconfig_ipv6_local; /* IPv6 */
507 int push_ifconfig_ipv6_netbits; /* IPv6 */
508 struct in6_addr push_ifconfig_ipv6_remote; /* IPv6 */
509 bool push_ifconfig_ipv6_blocked; /* IPv6 */
510 bool enable_c2c;
511 bool duplicate_cn;
b520c68c 512
81d882d5
DS
513 int cf_max;
514 int cf_per;
b520c68c
AS
515
516 int cf_initial_max;
517 int cf_initial_per;
518
81d882d5
DS
519 int max_clients;
520 int max_routes_per_client;
521 int stale_routes_check_interval;
522 int stale_routes_ageing_time;
523
524 const char *auth_user_pass_verify_script;
525 bool auth_user_pass_verify_script_via_file;
526 bool auth_token_generate;
c8723aa7
AS
527 bool auth_token_call_auth;
528 int auth_token_lifetime;
9a516170 529 int auth_token_renewal;
1b9a88a2 530 const char *auth_token_secret_file;
cb2e9218 531 bool auth_token_secret_file_inline;
1b9a88a2 532
6add6b2f 533#if PORT_SHARE
81d882d5
DS
534 char *port_share_host;
535 char *port_share_port;
536 const char *port_share_journal_dir;
6fbf66fa
JY
537#endif
538
81d882d5
DS
539 bool client;
540 bool pull; /* client pull of config options from server */
541 int push_continuation;
542 unsigned int push_option_types_found;
543 const char *auth_user_pass_file;
7d48d31b 544 bool auth_user_pass_file_inline;
c1150e5b 545 struct options_pre_connect *pre_connect;
6fbf66fa 546
81d882d5 547 int scheduled_exit_interval;
6fbf66fa 548
66b9409b 549#ifdef ENABLE_MANAGEMENT
81d882d5 550 struct static_challenge_info sc_info;
6fbf66fa 551#endif
81d882d5
DS
552 /* Cipher parms */
553 const char *shared_secret_file;
cb2e9218 554 bool shared_secret_file_inline;
392da5bd 555 bool allow_deprecated_insecure_static_crypto;
81d882d5
DS
556 int key_direction;
557 const char *ciphername;
2c1d8c33 558 bool enable_ncp_fallback; /**< If defined fall back to
abe49856 559 * ciphername if NCP fails */
81d882d5
DS
560 const char *ncp_ciphers;
561 const char *authname;
81d882d5 562 const char *engine;
08081aa0 563 struct provider_list providers;
81d882d5
DS
564 bool mute_replay_warnings;
565 int replay_window;
566 int replay_time;
567 const char *packet_id_file;
81d882d5 568 bool test_crypto;
0f25d296 569#ifdef ENABLE_PREDICTION_RESISTANCE
81d882d5
DS
570 bool use_prediction_resistance;
571#endif
572
573 /* TLS (control channel) parms */
574 bool tls_server;
575 bool tls_client;
576 const char *ca_file;
cb2e9218 577 bool ca_file_inline;
81d882d5
DS
578 const char *ca_path;
579 const char *dh_file;
cb2e9218 580 bool dh_file_inline;
81d882d5 581 const char *cert_file;
cb2e9218 582 bool cert_file_inline;
81d882d5 583 const char *extra_certs_file;
cb2e9218 584 bool extra_certs_file_inline;
81d882d5 585 const char *priv_key_file;
cb2e9218 586 bool priv_key_file_inline;
81d882d5 587 const char *pkcs12_file;
cb2e9218 588 bool pkcs12_file_inline;
81d882d5 589 const char *cipher_list;
ea4ee313 590 const char *cipher_list_tls13;
8353ae80 591 const char *tls_groups;
aba75874 592 const char *tls_cert_profile;
81d882d5
DS
593 const char *ecdh_curve;
594 const char *tls_verify;
595 int verify_x509_type;
596 const char *verify_x509_name;
81d882d5 597 const char *crl_file;
cb2e9218 598 bool crl_file_inline;
81d882d5
DS
599
600 int ns_cert_type; /* set to 0, NS_CERT_CHECK_SERVER, or NS_CERT_CHECK_CLIENT */
601 unsigned remote_cert_ku[MAX_PARMS];
602 const char *remote_cert_eku;
d1fe6d52 603 struct verify_hash_list *verify_hash;
2193d7c0 604 hash_algo_type verify_hash_algo;
c3a7065d 605 int verify_hash_depth;
c3746da7 606 bool verify_hash_no_ca;
81d882d5 607 unsigned int ssl_flags; /* set to SSLF_x flags from ssl.h */
bed73623
JY
608
609#ifdef ENABLE_PKCS11
81d882d5
DS
610 const char *pkcs11_providers[MAX_PARMS];
611 unsigned pkcs11_private_mode[MAX_PARMS];
612 bool pkcs11_protected_authentication[MAX_PARMS];
613 bool pkcs11_cert_private[MAX_PARMS];
614 int pkcs11_pin_cache_period;
615 const char *pkcs11_id;
616 bool pkcs11_id_management;
bed73623
JY
617#endif
618
93c22ecc 619#ifdef ENABLE_CRYPTOAPI
81d882d5 620 const char *cryptoapi_cert;
6fbf66fa 621#endif
81d882d5
DS
622 /* Per-packet timeout on control channel */
623 int tls_timeout;
6fbf66fa 624
81d882d5
DS
625 /* Data channel key renegotiation parameters */
626 int renegotiate_bytes;
627 int renegotiate_packets;
628 int renegotiate_seconds;
dd996463 629 int renegotiate_seconds_min;
6fbf66fa 630
81d882d5
DS
631 /* Data channel key handshake must finalize
632 * within n seconds of handshake initiation. */
633 int handshake_window;
6fbf66fa 634
fbd18db6 635#ifdef ENABLE_X509ALTUSERNAME
3b04c34d
VG
636 /* Field list used to be the username in X509 cert. */
637 char *x509_username_field[MAX_PARMS];
fbd18db6 638#endif
2e8337de 639
81d882d5
DS
640 /* Old key allowed to live n seconds after new key goes active */
641 int transition_window;
6fbf66fa 642
81d882d5
DS
643 /* Shared secret used for TLS control channel authentication */
644 const char *tls_auth_file;
cb2e9218 645 bool tls_auth_file_inline;
6fbf66fa 646
81d882d5
DS
647 /* Shared secret used for TLS control channel authenticated encryption */
648 const char *tls_crypt_file;
cb2e9218 649 bool tls_crypt_file_inline;
c6e24fa3 650
9d59029a
SK
651 /* Client-specific secret or server key used for TLS control channel
652 * authenticated encryption v2 */
653 const char *tls_crypt_v2_file;
cb2e9218 654 bool tls_crypt_v2_file_inline;
9d59029a 655
9d59029a
SK
656 const char *tls_crypt_v2_metadata;
657
ff931c5e
SK
658 const char *tls_crypt_v2_verify_script;
659
81d882d5
DS
660 /* Allow only one session */
661 bool single_session;
6fbf66fa 662
81d882d5 663 bool push_peer_info;
aaf72974 664
81d882d5 665 bool tls_exit;
6fbf66fa 666
81d882d5 667 const struct x509_track *x509_track;
9356bae8 668
81d882d5
DS
669 /* special state parms */
670 int foreign_option_index;
6fbf66fa 671
445b192a 672#ifdef _WIN32
81d882d5
DS
673 HANDLE msg_channel;
674 const char *exit_event_name;
675 bool exit_event_initial_state;
676 bool show_net_up;
677 int route_method;
678 bool block_outside_dns;
36215dc5 679 enum windows_driver_type windows_driver;
6fbf66fa 680#endif
65eedc35 681
81d882d5
DS
682 bool use_peer_id;
683 uint32_t peer_id;
685e486e 684
5defbba4 685#ifdef HAVE_EXPORT_KEYING_MATERIAL
81d882d5
DS
686 /* Keying Material Exporters [RFC 5705] */
687 const char *keying_material_exporter_label;
688 int keying_material_exporter_length;
685e486e 689#endif
fa796096
AS
690 /* force using TLS key material export for data channel key generation */
691 bool force_key_material_export;
7f74c27e 692
99f28081
AQ
693 bool vlan_tagging;
694 enum vlan_acceptable_frames vlan_accept;
695 uint16_t vlan_pvid;
696
81d882d5 697 struct pull_filter_list *pull_filter_list;
e8c42658 698
81d882d5
DS
699 /* Useful when packets sent by openvpn itself are not subject
700 * to the routing tables that would move packets into the tunnel. */
701 bool allow_recursive_routing;
6dc09d0d 702
9c625f4a 703 /* data channel crypto flags set by push/pull. Reuses the CO_* crypto_flags */
179b3728 704 unsigned int imported_protocol_flags;
6fbf66fa
JY
705};
706
707#define streq(x, y) (!strcmp((x), (y)))
708
709/*
710 * Option classes.
711 */
712#define OPT_P_GENERAL (1<<0)
713#define OPT_P_UP (1<<1)
714#define OPT_P_ROUTE (1<<2)
8a7d0005 715#define OPT_P_DHCPDNS (1<<3) /* includes ip windows options like */
6fbf66fa
JY
716#define OPT_P_SCRIPT (1<<4)
717#define OPT_P_SETENV (1<<5)
718#define OPT_P_SHAPER (1<<6)
719#define OPT_P_TIMER (1<<7)
720#define OPT_P_PERSIST (1<<8)
721#define OPT_P_PERSIST_IP (1<<9)
722#define OPT_P_COMP (1<<10) /* TODO */
723#define OPT_P_MESSAGES (1<<11)
d728ebed 724#define OPT_P_NCP (1<<12) /**< Negotiable crypto parameters */
6fbf66fa
JY
725#define OPT_P_TLS_PARMS (1<<13) /* TODO */
726#define OPT_P_MTU (1<<14) /* TODO */
727#define OPT_P_NICE (1<<15)
728#define OPT_P_PUSH (1<<16)
6168f53d 729#define OPT_P_INSTANCE (1<<17) /**< allowed in ccd, client-connect etc*/
6fbf66fa
JY
730#define OPT_P_CONFIG (1<<18)
731#define OPT_P_EXPLICIT_NOTIFY (1<<19)
732#define OPT_P_ECHO (1<<20)
733#define OPT_P_INHERIT (1<<21)
3c7f2f55
JY
734#define OPT_P_ROUTE_EXTRAS (1<<22)
735#define OPT_P_PULL_MODE (1<<23)
736#define OPT_P_PLUGIN (1<<24)
00d39170
JY
737#define OPT_P_SOCKBUF (1<<25)
738#define OPT_P_SOCKFLAGS (1<<26)
4e9a51d7 739#define OPT_P_CONNECTION (1<<27)
65eedc35 740#define OPT_P_PEER_ID (1<<28)
cb2e9218 741#define OPT_P_INLINE (1<<29)
01aed6a5 742#define OPT_P_PUSH_MTU (1<<30)
6fbf66fa 743
3c7f2f55 744#define OPT_P_DEFAULT (~(OPT_P_INSTANCE|OPT_P_PULL_MODE))
6fbf66fa 745
6fbf66fa 746#define PULL_DEFINED(opt) ((opt)->pull)
6fbf66fa 747#define PUSH_DEFINED(opt) ((opt)->push_list)
6fbf66fa
JY
748
749#ifndef PULL_DEFINED
750#define PULL_DEFINED(opt) (false)
751#endif
752
753#ifndef PUSH_DEFINED
754#define PUSH_DEFINED(opt) (false)
755#endif
756
445b192a 757#ifdef _WIN32
6fbf66fa
JY
758#define ROUTE_OPTION_FLAGS(o) ((o)->route_method & ROUTE_METHOD_MASK)
759#else
760#define ROUTE_OPTION_FLAGS(o) (0)
761#endif
762
6fbf66fa 763#define SHAPER_DEFINED(opt) ((opt)->shaper)
6fbf66fa
JY
764
765#ifdef ENABLE_PLUGIN
766#define PLUGIN_OPTION_LIST(opt) ((opt)->plugin_list)
767#else
768#define PLUGIN_OPTION_LIST(opt) (NULL)
769#endif
770
99d217b2 771#ifdef ENABLE_MANAGEMENT
90efcacb
JY
772#define MAN_CLIENT_AUTH_ENABLED(opt) ((opt)->management_flags & MF_CLIENT_AUTH)
773#else
774#define MAN_CLIENT_AUTH_ENABLED(opt) (false)
775#endif
776
81d882d5
DS
777void parse_argv(struct options *options,
778 const int argc,
779 char *argv[],
780 const int msglevel,
781 const unsigned int permission_mask,
782 unsigned int *option_types_found,
783 struct env_set *es);
6fbf66fa 784
81d882d5 785void notnull(const char *arg, const char *description);
6fbf66fa 786
81d882d5 787void usage_small(void);
6fbf66fa 788
5b17803e
JY
789void show_library_versions(const unsigned int flags);
790
445b192a 791#ifdef _WIN32
cdc65ea0 792void show_windows_version(const unsigned int flags);
81d882d5 793
cdc65ea0
LS
794#endif
795
3da238e6
AQ
796void show_dco_version(const unsigned int flags);
797
81d882d5
DS
798void init_options(struct options *o, const bool init_gc);
799
800void uninit_options(struct options *o);
6fbf66fa 801
81d882d5 802void setenv_settings(struct env_set *es, const struct options *o);
6fbf66fa 803
81d882d5
DS
804void show_settings(const struct options *o);
805
806bool string_defined_equal(const char *s1, const char *s2);
6fbf66fa 807
81d882d5
DS
808const char *options_string_version(const char *s, struct gc_arena *gc);
809
810char *options_string(const struct options *o,
811 const struct frame *frame,
812 struct tuntap *tt,
dc7fcd71 813 openvpn_net_ctx_t *ctx,
81d882d5
DS
814 bool remote,
815 struct gc_arena *gc);
816
817bool options_cmp_equal_safe(char *actual, const char *expected, size_t actual_n);
6fbf66fa 818
81d882d5 819void options_warning_safe(char *actual, const char *expected, size_t actual_n);
6fbf66fa 820
81d882d5
DS
821bool options_cmp_equal(char *actual, const char *expected);
822
823void options_warning(char *actual, const char *expected);
6fbf66fa 824
6e5ad2fa
SK
825/**
826 * Given an OpenVPN options string, extract the value of an option.
827 *
81d882d5
DS
828 * @param options_string Zero-terminated, comma-separated options string
829 * @param opt_name The name of the option to extract
830 * @param gc The gc to allocate the return value
6e5ad2fa
SK
831 *
832 * @return gc-allocated value of option with name opt_name if option was found,
833 * or NULL otherwise.
834 */
81d882d5
DS
835char *options_string_extract_option(const char *options_string,
836 const char *opt_name, struct gc_arena *gc);
837
6e5ad2fa 838
dac85fff 839void options_postprocess(struct options *options, struct env_set *es);
6e5ad2fa 840
b3e0d95d
HH
841bool options_postprocess_pull(struct options *o, struct env_set *es);
842
c1150e5b 843void pre_connect_restore(struct options *o, struct gc_arena *gc);
6fbf66fa 844
81d882d5
DS
845bool apply_push_options(struct options *options,
846 struct buffer *buf,
847 unsigned int permission_mask,
848 unsigned int *option_types_found,
849 struct env_set *es);
6fbf66fa 850
81d882d5 851void options_detach(struct options *o);
6fbf66fa 852
81d882d5
DS
853void options_server_import(struct options *o,
854 const char *filename,
855 int msglevel,
856 unsigned int permission_mask,
857 unsigned int *option_types_found,
858 struct env_set *es);
6fbf66fa 859
81d882d5 860void pre_pull_default(struct options *o);
6fbf66fa 861
81d882d5 862void rol_check_alloc(struct options *options);
6fbf66fa 863
81d882d5
DS
864int parse_line(const char *line,
865 char *p[],
866 const int n,
867 const char *file,
868 const int line_num,
869 int msglevel,
870 struct gc_arena *gc);
6fbf66fa 871
3c7f2f55
JY
872/*
873 * parse/print topology coding
874 */
875
81d882d5
DS
876int parse_topology(const char *str, const int msglevel);
877
878const char *print_topology(const int topology);
3c7f2f55 879
6fbf66fa
JY
880/*
881 * Manage auth-retry variable
882 */
883
6fbf66fa
JY
884#define AR_NONE 0
885#define AR_INTERACT 1
886#define AR_NOINTERACT 2
887
81d882d5
DS
888int auth_retry_get(void);
889
890bool auth_retry_set(const int msglevel, const char *option);
891
892const char *auth_retry_print(void);
6fbf66fa 893
81d882d5
DS
894void options_string_import(struct options *options,
895 const char *config,
896 const int msglevel,
897 const unsigned int permission_mask,
898 unsigned int *option_types_found,
899 struct env_set *es);
3c7f2f55 900
4b85c488
SN
901bool key_is_external(const struct options *options);
902
4f1671fa
AQ
903/**
904 * Returns whether the current configuration has dco enabled.
905 */
906static inline bool
907dco_enabled(const struct options *o)
908{
e9a156a1 909#ifdef ENABLE_DCO
4f1671fa 910 return !o->tuntap_options.disable_dco;
3adbc5c6 911#else
4f1671fa 912 return false;
e9a156a1 913#endif /* ENABLE_DCO */
4f1671fa
AQ
914}
915
81d882d5 916#endif /* ifndef OPTIONS_H */