chore: add vendor dependencies for kauma build
This commit is contained in:
parent
7c94e5d8fb
commit
067ef6141c
1758 changed files with 398473 additions and 0 deletions
1
vendor/openssl-sys/.cargo-checksum.json
vendored
Normal file
1
vendor/openssl-sys/.cargo-checksum.json
vendored
Normal file
File diff suppressed because one or more lines are too long
688
vendor/openssl-sys/CHANGELOG.md
vendored
Normal file
688
vendor/openssl-sys/CHANGELOG.md
vendored
Normal file
|
|
@ -0,0 +1,688 @@
|
|||
# Change Log
|
||||
|
||||
## [Unreleased]
|
||||
|
||||
## [v0.9.104] - 2024-10-15
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 4.0.x.
|
||||
* Added `EVP_KDF_*` and `EVP_KDF_CTX_*` bindings.
|
||||
* Added `EVP_DigestSqueeze`.
|
||||
* Added `OSSL_PARAM_construct_octet_string`.
|
||||
* Added `OSSL_set_max_threads` and `OSSL_get_max_threads`.
|
||||
|
||||
### Changed
|
||||
|
||||
* `openssl-sys` is now a 2021 edition crate
|
||||
* Explicitly specify the MSRV in `Cargo.toml`
|
||||
* Raised the `bindgen` (optional) dependency from 0.65 to 0.69
|
||||
|
||||
## [v0.9.103] - 2024-07-20
|
||||
|
||||
### Added
|
||||
|
||||
* Added several functions and constants for datagram `BIO`s.
|
||||
* Added `EVP_PKEY_set1_DSA`, `EVP_PKEY_set1_DH`, and `EVP_PKEY_set1_EC_KEY`.
|
||||
* Added several functions related to QUIC support.
|
||||
|
||||
## [v0.9.102] - 2024-03-28
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.9.x.
|
||||
|
||||
## [v0.9.101] - 2024-02-21
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed a bug where, when building with the `vendored` feature, this crate always needed to be rebuilt.
|
||||
|
||||
## [v0.9.100] - 2024-02-19
|
||||
|
||||
### Added
|
||||
|
||||
* Added `OSSL_PARAM`, `OSSL_PARAM_construct_uint` , `OSSL_PARAM_construct_end`.
|
||||
* Added `EVP_PKEY_CTX_set_params` and `EVP_PKEY_CTX_get_params`.
|
||||
* Added `X509_alias_get0`.
|
||||
* Added `EVP_default_properties_enable_fips`.
|
||||
|
||||
## [v0.9.99] - 2024-01-19
|
||||
|
||||
### Added
|
||||
|
||||
* On macOS added Homebrew's `openssl@3.0` to the list of candidates to build against.
|
||||
* `NID_brainpoolP256r1`, `NID_brainpoolP320r1`, `NID_brainpoolP384r1`, and `NID_brainpoolP512r1` are now available on LibreSSL.
|
||||
|
||||
### Changed
|
||||
|
||||
* `X509_PURPOSE` is now opaque on LibreSSL 3.9.0+.
|
||||
|
||||
## [v0.9.98] - 2023-12-22
|
||||
|
||||
### Added
|
||||
|
||||
* Added `RAND_priv_bytes`.
|
||||
* Added `NID_brainpoolP320r1`.
|
||||
|
||||
### Changed
|
||||
|
||||
* `X509_PURPOSE_get0` now returns a `const` pointer on LibreSSL 3.9.0+.
|
||||
* `X509V3_EXT_add_alias` is removed on LibreSSL 3.9.0+.
|
||||
|
||||
## [v0.9.97] - 2023-12-04
|
||||
|
||||
### Changed
|
||||
|
||||
* libatomic is no longer dynamically linked for 32 bit ARM targets.
|
||||
|
||||
### Added
|
||||
|
||||
* Added `SSL_read_ex`, `SSL_peek_ex`, and `SSL_write_ex`.
|
||||
|
||||
## [v0.9.96] - 2023-11-22
|
||||
|
||||
### Changed
|
||||
|
||||
* `EVP_chacha20` is now available on LibreSSL
|
||||
|
||||
### Added
|
||||
|
||||
* Added `EVP_des_ede3_ecb`, `EVP_des_ede3_cfb8`, `EVP_des_ede3_ofb`, `EVP_camellia_128_ofb`, `EVP_camellia_192_ofb`, `EVP_camellia_256_ofb`, `EVP_cast5_ofb`, `EVP_idea_ofb`
|
||||
* Added `X509_STORE_get1_all_certs`
|
||||
* Added `SSL_CTRL_GET_PEER_TMP_KEY`, `SSL_CTRL_GET_TMP_KEY`, `SSL_get_peer_tmp_key`, `SSL_get_tmp_key`
|
||||
|
||||
## [v0.9.95] - 2023-11-03
|
||||
|
||||
### Changed
|
||||
|
||||
* Fixed the availability of `EVP_PKEY_RSA_PSS` on OpenSSL
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.8.x.
|
||||
* Added `NID_chacha20_poly1305`
|
||||
|
||||
## [v0.9.94] - 2023-11-01
|
||||
|
||||
### Changed
|
||||
|
||||
* `X509_ALGOR` is now opaque on new LibreSSL releases
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for building with `OPENSSL_NO_SCRYPT`
|
||||
* Added `EVP_PKEY_RSA_PSS` and `EVP_PKEY_DHX`
|
||||
* Functions and constants for using HKDF `EVP_PKEY` are now available on LibreSSL.
|
||||
* Added `SSL_CTX_set_security_level`, `SSL_set_security_level`, `SSL_CTX_get_security_level`, `SSL_get_security_level`
|
||||
* Added `X509_check_host`, `X509_check_email`, `X509_check_ip`, `X509_check_ip_asc`
|
||||
|
||||
## [v0.9.93] - 2023-09-04
|
||||
|
||||
### Changed
|
||||
|
||||
* The `vendored` Cargo feature now builds OpenSSL 3.1, as 1.1.1 is reaching its EOL.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.8.1.
|
||||
|
||||
## [v0.9.92] - 2023-08-27
|
||||
|
||||
### Added
|
||||
|
||||
* Added `EVP_CIPHER_CTX_copy`
|
||||
* Expose `EVP_chacha20_poly1305` on LibreSSL
|
||||
* Added `X509_VERIFY_PARAM_set1_email`
|
||||
|
||||
## [v0.9.91] - 2023-08-06
|
||||
|
||||
### Added
|
||||
|
||||
* Expose `poly1305_state`, `CRYPTO_poly1305_init`, `CRYPTO_poly1305_update`, and `CRYPTO_poly1305_finish` on BoringSSL and LibreSSL.
|
||||
* Fix detection of libraries on OpenBSD.
|
||||
* Added `EC_POINT_point2hex` and `EC_POINT_hex2point`.
|
||||
* Added `EVP_PKEY_verify_recover_init`, `EVP_PKEY_verify_recover`, and `EVP_PKEY_CTX_set_signature_md`.
|
||||
* Added `EVP_CIPHER_CTX_FLAG_WRAP_ALLOW` and `EVP_CTX_set_flags`.
|
||||
* Added `BN_mod_sqrt`.
|
||||
|
||||
## [v0.9.90] - 2023-06-20
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed compilation with BoringSSL when building with the bindgen CLI.
|
||||
|
||||
## [v0.9.89] - 2023-06-20
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed compilation with recent versions of BoringSSL.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for detecting OpenSSL compiled with `OPENSSL_NO_OCB`.
|
||||
* Added `EVP_PKEY_SM2` and `NID_sm2`.
|
||||
* Added `EVP_PKEY_assign_RSA`, `EVP_PKEY_assign_DSA`, `EVP_PKEY_assign_DH`, and `EVP_PKEY_assign_EC_KEY`.
|
||||
* Added `EC_GROUP_get_asn1_flag`.
|
||||
* Expose `EC_POINT_get_affine_coordinates` on BoringSSL and LibreSSL.
|
||||
* Added `EVP_PKEY_derive_set_peer_ex`.
|
||||
|
||||
## [v0.9.88] - 2023-05-30
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for the LibreSSL 3.8.0.
|
||||
* Added support for detecting `OPENSSL_NO_RC4`.
|
||||
* Added `OBJ_dup`.
|
||||
* Added `ASN1_TYPE_new`, `ASN1_TYPE_set`, `d2i_ASN1_TYPE`, and `i2d_ASN1_TYPE`.
|
||||
* Added `SSL_bytes_to_cipher_list`, `SSL_CTX_get_num_tickets`, and `SSL_get_num_tickets`.
|
||||
* Added `GENERAL_NAME_set0_othername`.
|
||||
* Added `X509_get_pathlen`.
|
||||
|
||||
## [v0.9.87] - 2023-04-24
|
||||
|
||||
### Added
|
||||
|
||||
* Added `DH_CHECK`.
|
||||
* Added `CMAC_CTX_new`, `CMAC_CTX_free`, `CMAC_Init`, `CMAC_Update`, `CMAC_Final`, and `CMAC_CTX_copy`.
|
||||
* Added `EVP_default_properties_is_fips_enabled`.
|
||||
* Added `X509_get0_subject_key_id`, `X509_get0_authority_key_id`, `X509_get0_authority_issuer`, and `X509_get0_authority_serial`.
|
||||
* Added `NID_poly1305`.
|
||||
|
||||
|
||||
## [v0.9.86] - 2023-04-20
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed BoringSSL support with the latest bindgen release.
|
||||
|
||||
### Added
|
||||
|
||||
* Added bindings for PKCS#7 functions and more X.509 functions.
|
||||
|
||||
|
||||
## [v0.9.85] - 2023-04-09
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.7.x.
|
||||
|
||||
## [v0.9.84] - 2023-04-01
|
||||
|
||||
### Added
|
||||
|
||||
* Added `ASN1_INTEGER_dup` and `ASN1_INTEGER_cmp`.
|
||||
* Added `stack_st_X509_NAME_ENTRY`.
|
||||
* Added `DIST_POINT_NAME`, `DIST_POINT`, `stack_st_DIST_POINT`, `DIST_POINT_free`, and `DIST_POINT_NAME_free`.
|
||||
|
||||
## [v0.9.83] - 2023-03-23
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed version checks for LibreSSL.
|
||||
|
||||
### Added
|
||||
|
||||
* Added `i2d_X509_EXTENSION`.
|
||||
* Added `GENERAL_NAME_new`.
|
||||
|
||||
## [v0.9.82] - 2023-03-19
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.7.1.
|
||||
* Added support for X25519 and Ed25519 on LibreSSL and BoringSSL.
|
||||
|
||||
## [v0.9.81] - 2023-03-14
|
||||
|
||||
### Fixed
|
||||
|
||||
Fixed builds against OpenSSL built with `no-cast`.
|
||||
|
||||
### Added
|
||||
|
||||
* Added experimental bindgen support for BoringSSL.
|
||||
* Added `X509_VERIFY_PARAM_set_auth_level`, `X509_VERIFY_PARAM_get_auth_level`, and `X509_VERIFY_PARAM_set_purpose`.
|
||||
* Added `X509_PURPOSE_*` consts.
|
||||
* Added `X509_NAME_add_entry`.
|
||||
* Added `X509_load_crl_file`.
|
||||
* Added `SSL_set_cipher_list`, `SSL_set_ssl_method`, `SSL_use_PrivateKey_file`, `SSL_use_PrivateKey`, `SSL_use_certificate`, `SSL_use_certificate_chain_file`, `SSL_set_client_CA_list`, `SSL_add_client_CA`, and `SSL_set0_verify_cert_store`.
|
||||
* Added `X509_PURPOSE`, `X509_STORE_set_purpose`, and `X509_STORE_set_trust`.
|
||||
* Added `SSL_CTX_set_num_tickets`, `SSL_set_num_tickets`, `SSL_CTX_get_num_tickets`, and `SSL_get_num_tickets`.
|
||||
* Added `CMS_verify`.
|
||||
|
||||
### Removed
|
||||
|
||||
* Removed an unnecessary link to libatomic for 32-bit android targets.
|
||||
|
||||
## [v0.9.80] - 2022-12-20
|
||||
|
||||
### Fixed
|
||||
|
||||
* Added `NO_DEPRECATED_3_0` cfg checks for more APIs.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.7.0.
|
||||
* Added `SSL_CTRL_CHAIN_CERT` and `SSL_add0_chain_cert`.
|
||||
* Added `EVP_PKEY_get_security_bits` and `EVP_PKEY_security_bits`.
|
||||
* Added `OSSL_PROVIDER_set_default_search_path`.
|
||||
|
||||
## [v0.9.79] - 2022-12-06
|
||||
|
||||
### Added
|
||||
|
||||
* Added `EVP_CIPHER_CTX_num`.
|
||||
* Added `X509_LOOKUP_file` and `X509_load_cert_file`.
|
||||
|
||||
## [v0.9.78] - 2022-11-23
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.6.x.
|
||||
* Added `NID_brainpoolP256r1`, `NID_brainpoolP384r1`, and `NID_brainpool512r1`.
|
||||
* Added `EVP_camellia_128_cfb128`, `EVP_camellia_128_ecb`, `EVP_camellia_192_cfb128`, `EVP_camellia_192_ecb`,
|
||||
`EVP_camellia_256_cfb128`, and `EVP_camellia_256_ecb`.
|
||||
* Added `EVP_cast5_cfb64` and `EVP_cast5_ecb`.
|
||||
* Added `EVP_idea_cfb64` and `EVP_idea_ecb`.
|
||||
* Added `DSA_SIG`, `d2i_DSA_SIG`, `i2d_DSA_SIG`, `DSA_SIG_new`, `DSA_SIG_free`, `DSA_SIG_get0`, and `DSA_SIG_set0`.
|
||||
* Added `X509_STORE_set1_param`, `X509_VERIFY_PARAM_new`, `X509_VERIFY_PARAM_set_time`, and
|
||||
`X509_VERIFY_PARAM_set_depth`.
|
||||
|
||||
## [v0.9.77] - 2022-10-22
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.6.0
|
||||
* Added `assume_init`.
|
||||
|
||||
## [v0.9.76] - 2022-09-26
|
||||
|
||||
### Added
|
||||
|
||||
* Added `SSL_get_psk_identity_hint` and `SSL_get_psk_identity`.
|
||||
* Added SHA-3 NID constants.
|
||||
* Added `SSL_OP_PRIORITIZE_CHACHA`.
|
||||
* Added `X509_REQ_print`.
|
||||
* Added `EVP_MD_CTX_size` and `EVP_MD_CTX_get_size`
|
||||
* Added `EVP_MD_CTX_reset`.
|
||||
* Added experimental, unstable support for BoringSSL.
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed the deprecation note on `SSL_CTX_set_alpn_select_cb`.
|
||||
|
||||
## [v0.9.75] - 2022-07-09
|
||||
|
||||
### Added
|
||||
|
||||
* Added SM4 bindings.
|
||||
* Added `EC_GROUP_set_generator` and `EC_POINT_set_affine_coordinates_GFp`.
|
||||
|
||||
## [v0.9.74] - 2022-06-01
|
||||
|
||||
### Added
|
||||
|
||||
* Added `EVP_MD_block_size`.
|
||||
* Added `X509V3_EXT_add_alias`.
|
||||
* Added `X509_V_ERR_INVALID_CA` back when building against OpenSSL 3.0.
|
||||
|
||||
## [v0.9.73] - 2022-05-02
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for installations that place libraries in `$OPENSSL_DIR/lib64` in addition to `$OPENSSL_DIR/lib`.
|
||||
* Added `X509_issuer_name_hash`.
|
||||
* Added `ASN1_string_set`.
|
||||
* Added `X509_CRL_dup`, `X509_REQ_dup`, `X509_NAME_dup`, and `X509_dup`.
|
||||
* Added `X509_print`.
|
||||
* Added support for LibreSSL 3.5.x.
|
||||
|
||||
## [v0.9.72] - 2021-12-11
|
||||
|
||||
### Changed
|
||||
|
||||
* Temporarily downgraded the vendored OpenSSL back to 1.1.1 due to significant performance regressions. We will move
|
||||
back to 3.0.0 when a future release resolves those issues.
|
||||
|
||||
### Added
|
||||
|
||||
* Added `PKCS12_set_mac`.
|
||||
* Added `EVP_PKEY_sign_init`, `EVP_PKEY_sign`, `EVP_PKEY_verify_init`, and `EVP_PKEY_verify`.
|
||||
* Added support for LibreSSL 3.4.x.
|
||||
|
||||
## [v0.9.71]
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed linkage to static OpenSSL 3.0.0 libraries on some 32 bit Android targets.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.4.1.
|
||||
* Added `SSL_get_extms_support` and `SSL_CTRL_GET_EXTMS_SUPPORT`.
|
||||
* Added `OBJ_create`.
|
||||
* Added `EVP_CIPHER_CTX_get0_cipher`, `EVP_CIPHER_CTX_get_block_size`, `EVP_CIPHER_CTX_get_key_length`,
|
||||
`EVP_CIPHER_CTX_get_iv_length`, and `EVP_CIPHER_CTX_get_tag_length`.
|
||||
* Added `EVP_CIPHER_free`.
|
||||
* Added `EVP_CIPHER_CTX_rand_key`.
|
||||
* Added `OSSL_LIB_CTX_new` and `OSSL_LIB_CTX_free`.
|
||||
* Added `EVP_CIPHER_fetch`.
|
||||
* Added `EVP_MD_fetch` and `EVP_MD_free`.
|
||||
* Added `OPENSSL_malloc` and `OPENSSL_free`.
|
||||
* Added `EVP_DigestSignUpdate` and `EVP_DigestVerifyUpdate`.
|
||||
|
||||
## [v0.9.70] - 2021-10-31
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed linkage to static 3.0.0 OpenSSL libraries on some 32 bit architectures.
|
||||
|
||||
## [v0.9.69] - 2021-10-31
|
||||
|
||||
### Changed
|
||||
|
||||
* Upgraded the vendored OpenSSL to 3.0.0.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for automatic detection of Homebrew `openssl@3` installs.
|
||||
* Added `EVP_PKEY_Q_keygen` and `EVP_EC_gen`.
|
||||
|
||||
## [v0.9.68] - 2021-10-27
|
||||
|
||||
### Added
|
||||
|
||||
* Added `BN_bn2binpad`.
|
||||
* Added `i2d_X509_NAME` and `d2i_X509_NAME`.
|
||||
* Added `BN_FLG_MALLOCED`, `BN_FLG_STATIC_DATA`, `BN_FLG_CONSTTIME`, and `BN_FLG_SECURE`.
|
||||
* Added `BN_CTX_secure_new`, `BN_secure_new`, `BN_set_flags`, and `BN_get_flags`.
|
||||
|
||||
## [v0.9.67] - 2021-09-21
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.4.0
|
||||
|
||||
## [v0.9.66] - 2021-08-17
|
||||
|
||||
### Added
|
||||
|
||||
* Added `EVP_seed_cbc`, `EVP_seed_cfb128`, `EVP_seed_ecb`, and `EVP_seed_ofb`.
|
||||
* Added `OBJ_length` and `OBJ_get0_data`.
|
||||
* Added `i2d_PKCS8PrivateKey_bio`.
|
||||
|
||||
## [v0.9.65] - 2021-06-21
|
||||
|
||||
### Fixed
|
||||
|
||||
* Restored the accidentally deleted `PEM_read_bio_X509_CRL` function.
|
||||
|
||||
## [v0.9.64] - 2021-06-18
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for OpenSSL 3.x.x.
|
||||
* Added `SSL_peek`.
|
||||
* Added `ERR_LIB_ASN1` and `ASN1_R_HEADER_TOO_LONG`.
|
||||
* Added `d2i_X509_bio`.
|
||||
* Added `OBJ_nid2obj`.
|
||||
* Added `RAND_add`.
|
||||
* Added `SSL_CTX_set_post_handshake_auth`.
|
||||
* Added `COMP_get_type`.
|
||||
* Added `X509_get_default_cert_file_env`, `X509_get_default_cert_file`, `X509_get_default_cert_dir_env`, and
|
||||
`X509_get_default_cirt_dir`.
|
||||
|
||||
## [v0.9.63] - 2021-05-06
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.3.x.
|
||||
|
||||
## [v0.9.62] - 2021-04-28
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.3.2.
|
||||
* Added `DH_set0_key`.
|
||||
* Added `EC_POINT_get_affine_coordinates`.
|
||||
|
||||
## [v0.9.61] - 2021-03-13
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for automatic detection of OpenSSL installations via pkgsrc and MacPorts on macOS.
|
||||
* Added various `V_ASN1_*` constants.
|
||||
* Added `DH_generate_parameters_ex`.
|
||||
* Added `EC_POINT_is_at_infinity` and `EC_POINT_is_on_curve`.
|
||||
* Added `EVP_CIPHER_nid`.
|
||||
* Added `EVP_sm3`.
|
||||
* Added `NID_*` constants related to SM3.
|
||||
* Added `PKCS7_get0_signers`.
|
||||
* Added `EVP_PKEY_CTX_set0_rsa_oaep_label`.
|
||||
* Added `ACCESS_DESCRIPTION` and `ACCESS_DESCRIPTION_free`.
|
||||
|
||||
## [v0.9.60] - 2020-12-24
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for the default Homebrew install directory on ARM.
|
||||
* Added `EVP_PKEY_CTX_set_rsa_oaep_md` and `EVP_PKEY_CTRL_RSA_OAEP_MD`.
|
||||
|
||||
## [v0.9.59] - 2020-12-09
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.2.x, 3.3.0, and 3.3.1.
|
||||
* Added `DH_generate_parameters`, `DH_generate_key`, `DH_compute_key`, and `DH_size`.
|
||||
* Added `NID_X25519`, `NID_X448`, `EVP_PKEY_x25519` and `EVP_PKEY_x448`.
|
||||
* Added `OBJ_txt2obj`.
|
||||
* Added `d2i_PKCS7` and `i2d_PKCS7`.
|
||||
* Added `SRTP_AEAD_AES_128_GCM` and `SRTP_AEAD_AES_256_GCM`.
|
||||
|
||||
## [v0.9.58] - 2020-06-05
|
||||
|
||||
### Added
|
||||
|
||||
* Added `SSL_set_mtu`.
|
||||
* Added support for LibreSSL 3.2.0.
|
||||
* Added `PEM_read_bio_EC_PUBKEY`, `PEM_write_bio_EC_PUBKEY`, `d2i_EC_PUBKEY`, and `i2d_EC_PUBKEY`.
|
||||
* Added `EVP_PKEY_encrypt_init`, `EVP_PKEY_encrypt`, `EVP_PKEY_decrypt_init`, `EVP_PKEY_decrypt`,
|
||||
`EVP_PKEY_get_raw_public_key`, `EVP_PKEY_new_raw_public_key`, `EVP_PKEY_get_raw_private_key`,
|
||||
and `EVP_PKEY_new_raw_private_key`.
|
||||
* Added `OBJ_sn2nid`.
|
||||
|
||||
## [v0.9.57] - 2020-05-24
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.1.x.
|
||||
|
||||
## [v0.9.56] - 2020-05-07
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed vendored builds on windows-gnu targets.
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.0.0.
|
||||
|
||||
## [v0.9.55] - 2020-04-07
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed windows-msvc library names when using OpenSSL from vcpkg.
|
||||
|
||||
### Added
|
||||
|
||||
* If the `OPENSSL_NO_VENDOR` environment variable is set, vendoring will not be used even if enabled.
|
||||
* Added `SSL_CTX_get_verify_mode` and `SSL_get_verify_mode`.
|
||||
* Added `SSL_is_init_finished`.
|
||||
* Added `SSL_CTX_set_cert_store`.
|
||||
* Added `TLS_server_method` and `TLS_client_method`.
|
||||
* Added `X509_STORE_get0_objects`.
|
||||
* Added `X509_OBJECT_free`, `X509_OBJECT_get_type`, and `X509_OBJECT_get0_X509`.
|
||||
|
||||
## [v0.9.54] - 2020-01-29
|
||||
|
||||
### Added
|
||||
|
||||
* Added `BIO_CTRL_DGRAM_QUERY_MTU`.
|
||||
* Added `EVP_EncryptInit_ex`, `EVP_EncryptFinal_ex`, `EVP_DecryptInit_ex`, and `EVP_DecryptFinal_ex`.
|
||||
* Added `EVP_md_null`.
|
||||
* Added `EVP_PKCS82PKEY`.
|
||||
* Added `PKCS8_PRIV_KEY_INFO`, `d2i_PKCS8_PRIV_KEY_INFO`, and `PKCS8_PRIV_KEY_INFO_free`.
|
||||
* Added `SSL_OP_NO_RENEGOTIATION`.
|
||||
|
||||
## [v0.9.53] - 2019-11-22
|
||||
|
||||
### Added
|
||||
|
||||
* Added `ASN1_TIME_diff`.
|
||||
* Added `EC_GROUP_order_bits`.
|
||||
* Added `EVP_EncodeBlock` and `EVP_DecodeBlock`.
|
||||
* Added `SSL_CTRL_SET_GROUPS_LIST`, `SSL_CTRL_SET_SIGALGS_LIST`, `SSL_CTX_set1_groups_list`, and
|
||||
`SSL_CTX_set1_sigalgs_list`.
|
||||
* Added `Clone` implementations to `SHA_CTX`, `SHA256_CTX`, and `SHA512_CTX`.
|
||||
|
||||
## [v0.9.52] - 2019-10-19
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.0.x.
|
||||
|
||||
## [v0.9.51] - 2019-10-02
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.0.1.
|
||||
|
||||
## [v0.9.50] - 2019-10-02
|
||||
|
||||
### Added
|
||||
|
||||
* Added `CRYPTO_LOCK_EVP_PKEY`.
|
||||
* Added `EVP_PKEY_ED25519` and `EVP_PKEY_ED448`.
|
||||
* Added `EVP_DigestSign` and `EVP_DigestVerify`.
|
||||
* Added `EVP_PKEY_up_ref`.
|
||||
* Added `NID_ED25519` and `NID_ED448`.
|
||||
|
||||
## [v0.9.49] - 2019-08-15
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for LibreSSL 3.0.0.
|
||||
|
||||
## [v0.9.48] - 2019-07-19
|
||||
|
||||
### Added
|
||||
|
||||
* Added `AES_wrap_key` and `AES_unwrap_key`.
|
||||
* Added `EC_GROUP_get_cofactor`, `EC_GROUP_get0_generator`, and `EC_POINT_dup`.
|
||||
* Added `EVP_aes_128_ofb`, `EVP_aes_192_ecb`, `EVP_aes_192_cbc`, `EVP_aes_192_cfb1`, `EVP_aes_192_cfb8`,
|
||||
`EVP_aes_192_cfb_128`, `EVP_aes_192_ctr`, `EVP_aes_192_ccm`, `EVP_aes_192_gcm`, `EVP_aes_192_ofb`, and
|
||||
`EVP_aes_256_ofb`.
|
||||
* Added `PEM_read_bio_CMS` and `PEM_write_bio_CMS`.
|
||||
|
||||
## [v0.9.47] - 2019-05-18
|
||||
|
||||
### Added
|
||||
|
||||
* Added `SSL_CTX_add_client_CA`.
|
||||
|
||||
## [v0.9.46] - 2019-05-08
|
||||
|
||||
### Added
|
||||
|
||||
* Added support for the LibreSSL 2.9.x series.
|
||||
|
||||
## [v0.9.45] - 2019-05-03
|
||||
|
||||
### Fixed
|
||||
|
||||
* Reverted a change to windows-gnu library names that caused regressions.
|
||||
|
||||
## [v0.9.44] - 2019-04-30
|
||||
|
||||
### Added
|
||||
|
||||
* The `DEP_OPENSSL_VENDORED` environment variable tells downstream build scripts if the vendored feature was enabled.
|
||||
* Added `EVP_SealInit`, `EVP_SealFinal`, `EVP_EncryptUpdate`, `EVP_OpenInit`, `EVP_OpenFinal`, and `EVP_DecryptUpdate`.
|
||||
* Added `EVP_PKEY_size`.
|
||||
|
||||
### Fixed
|
||||
|
||||
* Fixed library names when targeting windows-gnu and pkg-config fails.
|
||||
|
||||
## [v0.9.43] - 2019-03-20
|
||||
|
||||
### Added
|
||||
|
||||
* Added `d2i_CMS_ContentInfo` and `CMS_encrypt`.
|
||||
* Added `X509_verify` and `X509_REQ_verify`.
|
||||
* Added `EVP_MD_type` and `EVP_GROUP_get_curve_name`.
|
||||
|
||||
[Unreleased]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.104..master
|
||||
[v0.9.104]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.103...openssl-sys-v0.9.104
|
||||
[v0.9.103]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.102...openssl-sys-v0.9.103
|
||||
[v0.9.102]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.101...openssl-sys-v0.9.102
|
||||
[v0.9.101]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.100...openssl-sys-v0.9.101
|
||||
[v0.9.100]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.99...openssl-sys-v0.9.100
|
||||
[v0.9.99]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.98...openssl-sys-v0.9.99
|
||||
[v0.9.98]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.97...openssl-sys-v0.9.98
|
||||
[v0.9.97]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.96...openssl-sys-v0.9.97
|
||||
[v0.9.96]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.95...openssl-sys-v0.9.96
|
||||
[v0.9.95]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.94...openssl-sys-v0.9.95
|
||||
[v0.9.94]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.93...openssl-sys-v0.9.94
|
||||
[v0.9.93]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.92...openssl-sys-v0.9.93
|
||||
[v0.9.92]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.91...openssl-sys-v0.9.92
|
||||
[v0.9.91]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.90...openssl-sys-v0.9.91
|
||||
[v0.9.90]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.89...openssl-sys-v0.9.90
|
||||
[v0.9.89]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.88...openssl-sys-v0.9.89
|
||||
[v0.9.88]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.87...openssl-sys-v0.9.88
|
||||
[v0.9.87]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.86...openssl-sys-v0.9.87
|
||||
[v0.9.86]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.85...openssl-sys-v0.9.86
|
||||
[v0.9.85]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.84...openssl-sys-v0.9.85
|
||||
[v0.9.84]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.83...openssl-sys-v0.9.84
|
||||
[v0.9.83]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.82...openssl-sys-v0.9.83
|
||||
[v0.9.82]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.81...openssl-sys-v0.9.82
|
||||
[v0.9.81]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.80...openssl-sys-v0.9.81
|
||||
[v0.9.80]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.79...openssl-sys-v0.9.80
|
||||
[v0.9.79]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.78...openssl-sys-v0.9.79
|
||||
[v0.9.78]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.77...openssl-sys-v0.9.78
|
||||
[v0.9.77]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.76...openssl-sys-v0.9.77
|
||||
[v0.9.76]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.75...openssl-sys-v0.9.76
|
||||
[v0.9.75]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.74...openssl-sys-v0.9.75
|
||||
[v0.9.74]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.73...openssl-sys-v0.9.74
|
||||
[v0.9.73]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.72...openssl-sys-v0.9.73
|
||||
[v0.9.72]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.71...openssl-sys-v0.9.72
|
||||
[v0.9.71]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.70...openssl-sys-v0.9.71
|
||||
[v0.9.70]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.69...openssl-sys-v0.9.70
|
||||
[v0.9.69]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.68...openssl-sys-v0.9.69
|
||||
[v0.9.68]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.67...openssl-sys-v0.9.68
|
||||
[v0.9.67]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.66...openssl-sys-v0.9.67
|
||||
[v0.9.66]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.65...openssl-sys-v0.9.66
|
||||
[v0.9.65]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.64...openssl-sys-v0.9.65
|
||||
[v0.9.64]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.63...openssl-sys-v0.9.64
|
||||
[v0.9.63]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.62...openssl-sys-v0.9.63
|
||||
[v0.9.62]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.61...openssl-sys-v0.9.62
|
||||
[v0.9.61]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.60...openssl-sys-v0.9.61
|
||||
[v0.9.60]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.59...openssl-sys-v0.9.60
|
||||
[v0.9.59]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.58...openssl-sys-v0.9.59
|
||||
[v0.9.58]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.57...openssl-sys-v0.9.58
|
||||
[v0.9.57]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.56...openssl-sys-v0.9.57
|
||||
[v0.9.56]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.55...openssl-sys-v0.9.56
|
||||
[v0.9.55]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.54...openssl-sys-v0.9.55
|
||||
[v0.9.54]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.53...openssl-sys-v0.9.54
|
||||
[v0.9.53]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.52...openssl-sys-v0.9.53
|
||||
[v0.9.52]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.51...openssl-sys-v0.9.52
|
||||
[v0.9.51]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.50...openssl-sys-v0.9.51
|
||||
[v0.9.50]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.49...openssl-sys-v0.9.50
|
||||
[v0.9.49]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.48...openssl-sys-v0.9.49
|
||||
[v0.9.48]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.47...openssl-sys-v0.9.48
|
||||
[v0.9.47]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.46...openssl-sys-v0.9.47
|
||||
[v0.9.46]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.45...openssl-sys-v0.9.46
|
||||
[v0.9.45]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.44...openssl-sys-v0.9.45
|
||||
[v0.9.44]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.43...openssl-sys-v0.9.44
|
||||
[v0.9.43]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.42...openssl-sys-v0.9.43
|
||||
71
vendor/openssl-sys/Cargo.toml
vendored
Normal file
71
vendor/openssl-sys/Cargo.toml
vendored
Normal file
|
|
@ -0,0 +1,71 @@
|
|||
# THIS FILE IS AUTOMATICALLY GENERATED BY CARGO
|
||||
#
|
||||
# When uploading crates to the registry Cargo will automatically
|
||||
# "normalize" Cargo.toml files for maximal compatibility
|
||||
# with all versions of Cargo and also rewrite `path` dependencies
|
||||
# to registry (e.g., crates.io) dependencies.
|
||||
#
|
||||
# If you are reading this file be aware that the original Cargo.toml
|
||||
# will likely look very different (and much more reasonable).
|
||||
# See Cargo.toml.orig for the original contents.
|
||||
|
||||
[package]
|
||||
edition = "2021"
|
||||
rust-version = "1.63.0"
|
||||
name = "openssl-sys"
|
||||
version = "0.9.104"
|
||||
authors = [
|
||||
"Alex Crichton <alex@alexcrichton.com>",
|
||||
"Steven Fackler <sfackler@gmail.com>",
|
||||
]
|
||||
build = "build/main.rs"
|
||||
links = "openssl"
|
||||
autobins = false
|
||||
autoexamples = false
|
||||
autotests = false
|
||||
autobenches = false
|
||||
description = "FFI bindings to OpenSSL"
|
||||
readme = "README.md"
|
||||
categories = [
|
||||
"cryptography",
|
||||
"external-ffi-bindings",
|
||||
]
|
||||
license = "MIT"
|
||||
repository = "https://github.com/sfackler/rust-openssl"
|
||||
|
||||
[package.metadata.pkg-config]
|
||||
openssl = "1.0.1"
|
||||
|
||||
[lib]
|
||||
name = "openssl_sys"
|
||||
path = "src/lib.rs"
|
||||
|
||||
[dependencies.bssl-sys]
|
||||
version = "0.1.0"
|
||||
optional = true
|
||||
|
||||
[dependencies.libc]
|
||||
version = "0.2"
|
||||
|
||||
[build-dependencies.bindgen]
|
||||
version = "0.69.0"
|
||||
features = ["experimental"]
|
||||
optional = true
|
||||
|
||||
[build-dependencies.cc]
|
||||
version = "1.0.61"
|
||||
|
||||
[build-dependencies.openssl-src]
|
||||
version = "300.2.0"
|
||||
features = ["legacy"]
|
||||
optional = true
|
||||
|
||||
[build-dependencies.pkg-config]
|
||||
version = "0.3.9"
|
||||
|
||||
[build-dependencies.vcpkg]
|
||||
version = "0.2.8"
|
||||
|
||||
[features]
|
||||
unstable_boringssl = ["bssl-sys"]
|
||||
vendored = ["openssl-src"]
|
||||
25
vendor/openssl-sys/LICENSE-MIT
vendored
Normal file
25
vendor/openssl-sys/LICENSE-MIT
vendored
Normal file
|
|
@ -0,0 +1,25 @@
|
|||
Copyright (c) 2014 Alex Crichton
|
||||
|
||||
Permission is hereby granted, free of charge, to any
|
||||
person obtaining a copy of this software and associated
|
||||
documentation files (the "Software"), to deal in the
|
||||
Software without restriction, including without
|
||||
limitation the rights to use, copy, modify, merge,
|
||||
publish, distribute, sublicense, and/or sell copies of
|
||||
the Software, and to permit persons to whom the Software
|
||||
is furnished to do so, subject to the following
|
||||
conditions:
|
||||
|
||||
The above copyright notice and this permission notice
|
||||
shall be included in all copies or substantial portions
|
||||
of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF
|
||||
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
|
||||
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
|
||||
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
|
||||
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
||||
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR
|
||||
IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
DEALINGS IN THE SOFTWARE.
|
||||
22
vendor/openssl-sys/README.md
vendored
Normal file
22
vendor/openssl-sys/README.md
vendored
Normal file
|
|
@ -0,0 +1,22 @@
|
|||
# rust-openssl
|
||||
|
||||
[](https://crates.io/crates/openssl)
|
||||
|
||||
OpenSSL bindings for the Rust programming language.
|
||||
|
||||
[Documentation](https://docs.rs/openssl).
|
||||
|
||||
## Release Support
|
||||
|
||||
The current supported release of `openssl` is 0.10 and `openssl-sys` is 0.9.
|
||||
|
||||
New major versions will be published at most once per year. After a new
|
||||
release, the previous major version will be partially supported with bug
|
||||
fixes for 3 months, after which support will be dropped entirely.
|
||||
|
||||
### Contribution
|
||||
|
||||
Unless you explicitly state otherwise, any contribution intentionally
|
||||
submitted for inclusion in the work by you, as defined in the Apache-2.0
|
||||
license, shall be dual licensed under the terms of both the Apache License,
|
||||
Version 2.0 and the MIT license without any additional terms or conditions.
|
||||
125
vendor/openssl-sys/build/cfgs.rs
vendored
Normal file
125
vendor/openssl-sys/build/cfgs.rs
vendored
Normal file
|
|
@ -0,0 +1,125 @@
|
|||
#[allow(clippy::unusual_byte_groupings)]
|
||||
pub fn get(openssl_version: Option<u64>, libressl_version: Option<u64>) -> Vec<&'static str> {
|
||||
let mut cfgs = vec![];
|
||||
|
||||
if let Some(libressl_version) = libressl_version {
|
||||
cfgs.push("libressl");
|
||||
|
||||
if libressl_version >= 0x2_05_01_00_0 {
|
||||
cfgs.push("libressl251");
|
||||
}
|
||||
if libressl_version >= 0x2_05_02_00_0 {
|
||||
cfgs.push("libressl252");
|
||||
}
|
||||
if libressl_version >= 0x2_06_01_00_0 {
|
||||
cfgs.push("libressl261");
|
||||
}
|
||||
if libressl_version >= 0x2_07_00_00_0 {
|
||||
cfgs.push("libressl270");
|
||||
}
|
||||
if libressl_version >= 0x2_07_01_00_0 {
|
||||
cfgs.push("libressl271");
|
||||
}
|
||||
if libressl_version >= 0x2_07_03_00_0 {
|
||||
cfgs.push("libressl273");
|
||||
}
|
||||
if libressl_version >= 0x2_08_00_00_0 {
|
||||
cfgs.push("libressl280");
|
||||
}
|
||||
if libressl_version >= 0x2_08_01_00_0 {
|
||||
cfgs.push("libressl281");
|
||||
}
|
||||
if libressl_version >= 0x2_09_01_00_0 {
|
||||
cfgs.push("libressl291");
|
||||
}
|
||||
if libressl_version >= 0x3_01_00_00_0 {
|
||||
cfgs.push("libressl310");
|
||||
}
|
||||
if libressl_version >= 0x3_02_01_00_0 {
|
||||
cfgs.push("libressl321");
|
||||
}
|
||||
if libressl_version >= 0x3_03_02_00_0 {
|
||||
cfgs.push("libressl332");
|
||||
}
|
||||
if libressl_version >= 0x3_04_00_00_0 {
|
||||
cfgs.push("libressl340");
|
||||
}
|
||||
if libressl_version >= 0x3_05_00_00_0 {
|
||||
cfgs.push("libressl350");
|
||||
}
|
||||
if libressl_version >= 0x3_06_00_00_0 {
|
||||
cfgs.push("libressl360");
|
||||
}
|
||||
if libressl_version >= 0x3_07_00_00_0 {
|
||||
cfgs.push("libressl370");
|
||||
}
|
||||
if libressl_version >= 0x3_08_00_00_0 {
|
||||
cfgs.push("libressl380");
|
||||
}
|
||||
if libressl_version >= 0x3_08_01_00_0 {
|
||||
cfgs.push("libressl381");
|
||||
}
|
||||
if libressl_version >= 0x3_08_02_00_0 {
|
||||
cfgs.push("libressl382");
|
||||
}
|
||||
if libressl_version >= 0x3_09_00_00_0 {
|
||||
cfgs.push("libressl390");
|
||||
}
|
||||
if libressl_version >= 0x4_00_00_00_0 {
|
||||
cfgs.push("libressl400");
|
||||
}
|
||||
} else {
|
||||
let openssl_version = openssl_version.unwrap();
|
||||
|
||||
if openssl_version >= 0x3_04_00_00_0 {
|
||||
cfgs.push("ossl340");
|
||||
}
|
||||
if openssl_version >= 0x3_03_00_00_0 {
|
||||
cfgs.push("ossl330");
|
||||
}
|
||||
if openssl_version >= 0x3_02_00_00_0 {
|
||||
cfgs.push("ossl320");
|
||||
}
|
||||
if openssl_version >= 0x3_00_00_00_0 {
|
||||
cfgs.push("ossl300");
|
||||
}
|
||||
if openssl_version >= 0x1_00_01_00_0 {
|
||||
cfgs.push("ossl101");
|
||||
}
|
||||
if openssl_version >= 0x1_00_02_00_0 {
|
||||
cfgs.push("ossl102");
|
||||
}
|
||||
if openssl_version >= 0x1_00_02_06_0 {
|
||||
cfgs.push("ossl102f");
|
||||
}
|
||||
if openssl_version >= 0x1_00_02_08_0 {
|
||||
cfgs.push("ossl102h");
|
||||
}
|
||||
if openssl_version >= 0x1_01_00_00_0 {
|
||||
cfgs.push("ossl110");
|
||||
}
|
||||
if openssl_version >= 0x1_01_00_06_0 {
|
||||
cfgs.push("ossl110f");
|
||||
}
|
||||
if openssl_version >= 0x1_01_00_07_0 {
|
||||
cfgs.push("ossl110g");
|
||||
}
|
||||
if openssl_version >= 0x1_01_00_08_0 {
|
||||
cfgs.push("ossl110h");
|
||||
}
|
||||
if openssl_version >= 0x1_01_01_00_0 {
|
||||
cfgs.push("ossl111");
|
||||
}
|
||||
if openssl_version >= 0x1_01_01_02_0 {
|
||||
cfgs.push("ossl111b");
|
||||
}
|
||||
if openssl_version >= 0x1_01_01_03_0 {
|
||||
cfgs.push("ossl111c");
|
||||
}
|
||||
if openssl_version >= 0x1_01_01_04_0 {
|
||||
cfgs.push("ossl111d");
|
||||
}
|
||||
}
|
||||
|
||||
cfgs
|
||||
}
|
||||
140
vendor/openssl-sys/build/expando.c
vendored
Normal file
140
vendor/openssl-sys/build/expando.c
vendored
Normal file
|
|
@ -0,0 +1,140 @@
|
|||
#include <openssl/opensslv.h>
|
||||
#include <openssl/opensslconf.h>
|
||||
|
||||
#define VERSION2(n, v) RUST_VERSION_##n##_##v
|
||||
#define VERSION(n, v) VERSION2(n, v)
|
||||
|
||||
#define NEW_VERSION2(a, b, c) RUST_VERSION_NEW_OPENSSL_##a##_##b##_##c
|
||||
#define NEW_VERSION(a, b, c) NEW_VERSION2(a, b, c)
|
||||
|
||||
#ifdef LIBRESSL_VERSION_NUMBER
|
||||
VERSION(LIBRESSL, LIBRESSL_VERSION_NUMBER)
|
||||
#elif defined OPENSSL_VERSION_MAJOR
|
||||
NEW_VERSION(OPENSSL_VERSION_MAJOR, OPENSSL_VERSION_MINOR, OPENSSL_VERSION_PATCH)
|
||||
#else
|
||||
VERSION(OPENSSL, OPENSSL_VERSION_NUMBER)
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_IS_BORINGSSL
|
||||
RUST_OPENSSL_IS_BORINGSSL
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_BF
|
||||
RUST_CONF_OPENSSL_NO_BF
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_BUF_FREELISTS
|
||||
RUST_CONF_OPENSSL_NO_BUF_FREELISTS
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_CHACHA
|
||||
RUST_CONF_OPENSSL_NO_CHACHA
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_IDEA
|
||||
RUST_CONF_OPENSSL_NO_IDEA
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_CAMELLIA
|
||||
RUST_CONF_OPENSSL_NO_CAMELLIA
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_CAST
|
||||
RUST_CONF_OPENSSL_NO_CAST
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_CMS
|
||||
RUST_CONF_OPENSSL_NO_CMS
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_COMP
|
||||
RUST_CONF_OPENSSL_NO_COMP
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_EC
|
||||
RUST_CONF_OPENSSL_NO_EC
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_EC2M
|
||||
RUST_CONF_OPENSSL_NO_EC2M
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_ENGINE
|
||||
RUST_CONF_OPENSSL_NO_ENGINE
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_KRB5
|
||||
RUST_CONF_OPENSSL_NO_KRB5
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_NEXTPROTONEG
|
||||
RUST_CONF_OPENSSL_NO_NEXTPROTONEG
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_OCSP
|
||||
RUST_CONF_OPENSSL_NO_OCSP
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_OCB
|
||||
RUST_CONF_OPENSSL_NO_OCB
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_PSK
|
||||
RUST_CONF_OPENSSL_NO_PSK
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_RC4
|
||||
RUST_CONF_OPENSSL_NO_RC4
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_RFC3779
|
||||
RUST_CONF_OPENSSL_NO_RFC3779
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_RMD160
|
||||
RUST_CONF_OPENSSL_NO_RMD160
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SHA
|
||||
RUST_CONF_OPENSSL_NO_SHA
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SRP
|
||||
RUST_CONF_OPENSSL_NO_SRP
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SSL3_METHOD
|
||||
RUST_CONF_OPENSSL_NO_SSL3_METHOD
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_TLSEXT
|
||||
RUST_CONF_OPENSSL_NO_TLSEXT
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SOCK
|
||||
RUST_CONF_OPENSSL_NO_SOCK
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_STDIO
|
||||
RUST_CONF_OPENSSL_NO_STDIO
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SM3
|
||||
RUST_CONF_OPENSSL_NO_SM3
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SM4
|
||||
RUST_CONF_OPENSSL_NO_SM4
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_DEPRECATED_3_0
|
||||
RUST_CONF_OPENSSL_NO_DEPRECATED_3_0
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SEED
|
||||
RUST_CONF_OPENSSL_NO_SEED
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_NO_SCRYPT
|
||||
RUST_CONF_OPENSSL_NO_SCRYPT
|
||||
#endif
|
||||
284
vendor/openssl-sys/build/find_normal.rs
vendored
Normal file
284
vendor/openssl-sys/build/find_normal.rs
vendored
Normal file
|
|
@ -0,0 +1,284 @@
|
|||
use std::ffi::OsString;
|
||||
use std::path::{Path, PathBuf};
|
||||
use std::process::{self, Command};
|
||||
|
||||
use super::env;
|
||||
|
||||
pub fn get_openssl(target: &str) -> (Vec<PathBuf>, PathBuf) {
|
||||
let lib_dir = env("OPENSSL_LIB_DIR").map(PathBuf::from);
|
||||
let include_dir = env("OPENSSL_INCLUDE_DIR").map(PathBuf::from);
|
||||
|
||||
match (lib_dir, include_dir) {
|
||||
(Some(lib_dir), Some(include_dir)) => (vec![lib_dir], include_dir),
|
||||
(lib_dir, include_dir) => {
|
||||
let openssl_dir = env("OPENSSL_DIR").unwrap_or_else(|| find_openssl_dir(target));
|
||||
let openssl_dir = Path::new(&openssl_dir);
|
||||
let lib_dir = lib_dir.map(|d| vec![d]).unwrap_or_else(|| {
|
||||
let mut lib_dirs = vec![];
|
||||
// OpenSSL 3.0 now puts it's libraries in lib64/ by default,
|
||||
// check for both it and lib/.
|
||||
if openssl_dir.join("lib64").exists() {
|
||||
lib_dirs.push(openssl_dir.join("lib64"));
|
||||
}
|
||||
if openssl_dir.join("lib").exists() {
|
||||
lib_dirs.push(openssl_dir.join("lib"));
|
||||
}
|
||||
lib_dirs
|
||||
});
|
||||
let include_dir = include_dir.unwrap_or_else(|| openssl_dir.join("include"));
|
||||
(lib_dir, include_dir)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn resolve_with_wellknown_homebrew_location(dir: &str) -> Option<PathBuf> {
|
||||
let versions = ["openssl@3", "openssl@3.0", "openssl@1.1"];
|
||||
|
||||
// Check up default aarch 64 Homebrew installation location first
|
||||
// for quick resolution if possible.
|
||||
// `pkg-config` on brew doesn't necessarily contain settings for openssl apparently.
|
||||
for version in &versions {
|
||||
let homebrew = Path::new(dir).join(format!("opt/{}", version));
|
||||
if homebrew.exists() {
|
||||
return Some(homebrew);
|
||||
}
|
||||
}
|
||||
|
||||
for version in &versions {
|
||||
// Calling `brew --prefix <package>` command usually slow and
|
||||
// takes seconds, and will be used only as a last resort.
|
||||
let output = execute_command_and_get_output("brew", &["--prefix", version]);
|
||||
if let Some(ref output) = output {
|
||||
let homebrew = Path::new(&output);
|
||||
if homebrew.exists() {
|
||||
return Some(homebrew.to_path_buf());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
None
|
||||
}
|
||||
|
||||
fn resolve_with_wellknown_location(dir: &str) -> Option<PathBuf> {
|
||||
let root_dir = Path::new(dir);
|
||||
let include_openssl = root_dir.join("include/openssl");
|
||||
if include_openssl.exists() {
|
||||
Some(root_dir.to_path_buf())
|
||||
} else {
|
||||
None
|
||||
}
|
||||
}
|
||||
|
||||
fn find_openssl_dir(target: &str) -> OsString {
|
||||
let host = env::var("HOST").unwrap();
|
||||
|
||||
if host == target && target.ends_with("-apple-darwin") {
|
||||
let homebrew_dir = match target {
|
||||
"aarch64-apple-darwin" => "/opt/homebrew",
|
||||
_ => "/usr/local",
|
||||
};
|
||||
|
||||
if let Some(dir) = resolve_with_wellknown_homebrew_location(homebrew_dir) {
|
||||
return dir.into();
|
||||
} else if let Some(dir) = resolve_with_wellknown_location("/opt/pkg") {
|
||||
// pkgsrc
|
||||
return dir.into();
|
||||
} else if let Some(dir) = resolve_with_wellknown_location("/opt/local") {
|
||||
// MacPorts
|
||||
return dir.into();
|
||||
}
|
||||
}
|
||||
|
||||
try_pkg_config();
|
||||
try_vcpkg();
|
||||
|
||||
// FreeBSD and OpenBSD ship with Libre|OpenSSL but don't include a pkg-config file
|
||||
if host == target && (target.contains("freebsd") || target.contains("openbsd")) {
|
||||
return OsString::from("/usr");
|
||||
}
|
||||
|
||||
// DragonFly has libressl (or openssl) in ports, but this doesn't include a pkg-config file
|
||||
if host == target && target.contains("dragonfly") {
|
||||
return OsString::from("/usr/local");
|
||||
}
|
||||
|
||||
let msg_header =
|
||||
"Could not find directory of OpenSSL installation, and this `-sys` crate cannot
|
||||
proceed without this knowledge. If OpenSSL is installed and this crate had
|
||||
trouble finding it, you can set the `OPENSSL_DIR` environment variable for the
|
||||
compilation process.";
|
||||
|
||||
println!(
|
||||
"cargo:warning={} See stderr section below for further information.",
|
||||
msg_header.replace('\n', " ")
|
||||
);
|
||||
|
||||
let mut msg = format!(
|
||||
"
|
||||
|
||||
{}
|
||||
|
||||
Make sure you also have the development packages of openssl installed.
|
||||
For example, `libssl-dev` on Ubuntu or `openssl-devel` on Fedora.
|
||||
|
||||
If you're in a situation where you think the directory *should* be found
|
||||
automatically, please open a bug at https://github.com/sfackler/rust-openssl
|
||||
and include information about your system as well as this message.
|
||||
|
||||
$HOST = {}
|
||||
$TARGET = {}
|
||||
openssl-sys = {}
|
||||
|
||||
",
|
||||
msg_header,
|
||||
host,
|
||||
target,
|
||||
env!("CARGO_PKG_VERSION")
|
||||
);
|
||||
|
||||
if host.contains("apple-darwin") && target.contains("apple-darwin") {
|
||||
let system = Path::new("/usr/lib/libssl.0.9.8.dylib");
|
||||
if system.exists() {
|
||||
msg.push_str(
|
||||
"
|
||||
|
||||
openssl-sys crate build failed: no supported version of OpenSSL found.
|
||||
|
||||
Ways to fix it:
|
||||
- Use the `vendored` feature of openssl-sys crate to build OpenSSL from source.
|
||||
- Use Homebrew to install the `openssl` package.
|
||||
|
||||
",
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
if host.contains("unknown-linux")
|
||||
&& target.contains("unknown-linux-gnu")
|
||||
&& Command::new("pkg-config").output().is_err()
|
||||
{
|
||||
msg.push_str(
|
||||
"
|
||||
It looks like you're compiling on Linux and also targeting Linux. Currently this
|
||||
requires the `pkg-config` utility to find OpenSSL but unfortunately `pkg-config`
|
||||
could not be found. If you have OpenSSL installed you can likely fix this by
|
||||
installing `pkg-config`.
|
||||
|
||||
",
|
||||
);
|
||||
}
|
||||
|
||||
if host.contains("windows") && target.contains("windows-gnu") {
|
||||
msg.push_str(
|
||||
"
|
||||
It looks like you're compiling for MinGW but you may not have either OpenSSL or
|
||||
pkg-config installed. You can install these two dependencies with:
|
||||
|
||||
pacman -S openssl-devel pkgconf
|
||||
|
||||
and try building this crate again.
|
||||
|
||||
",
|
||||
);
|
||||
}
|
||||
|
||||
if host.contains("windows") && target.contains("windows-msvc") {
|
||||
msg.push_str(
|
||||
"
|
||||
It looks like you're compiling for MSVC but we couldn't detect an OpenSSL
|
||||
installation. If there isn't one installed then you can try the rust-openssl
|
||||
README for more information about how to download precompiled binaries of
|
||||
OpenSSL:
|
||||
|
||||
https://github.com/sfackler/rust-openssl#windows
|
||||
|
||||
",
|
||||
);
|
||||
}
|
||||
|
||||
eprintln!("{}", msg);
|
||||
std::process::exit(101); // same as panic previously
|
||||
}
|
||||
|
||||
/// Attempt to find OpenSSL through pkg-config.
|
||||
///
|
||||
/// Note that if this succeeds then the function does not return as pkg-config
|
||||
/// typically tells us all the information that we need.
|
||||
fn try_pkg_config() {
|
||||
let target = env::var("TARGET").unwrap();
|
||||
let host = env::var("HOST").unwrap();
|
||||
|
||||
// FIXME we really shouldn't be automatically enabling this
|
||||
if target.contains("windows-gnu") && host.contains("windows") {
|
||||
env::set_var("PKG_CONFIG_ALLOW_CROSS", "1");
|
||||
} else if target.contains("windows-msvc") {
|
||||
// MSVC targets use vcpkg instead.
|
||||
return;
|
||||
}
|
||||
|
||||
let lib = match pkg_config::Config::new()
|
||||
.print_system_libs(false)
|
||||
.probe("openssl")
|
||||
{
|
||||
Ok(lib) => lib,
|
||||
Err(e) => {
|
||||
println!("\n\nCould not find openssl via pkg-config:\n{}\n", e);
|
||||
return;
|
||||
}
|
||||
};
|
||||
|
||||
super::postprocess(&lib.include_paths);
|
||||
|
||||
for include in lib.include_paths.iter() {
|
||||
println!("cargo:include={}", include.display());
|
||||
}
|
||||
|
||||
process::exit(0);
|
||||
}
|
||||
|
||||
/// Attempt to find OpenSSL through vcpkg.
|
||||
///
|
||||
/// Note that if this succeeds then the function does not return as vcpkg
|
||||
/// should emit all of the cargo metadata that we need.
|
||||
fn try_vcpkg() {
|
||||
let target = env::var("TARGET").unwrap();
|
||||
if !target.contains("windows") {
|
||||
return;
|
||||
}
|
||||
|
||||
// vcpkg will not emit any metadata if it can not find libraries
|
||||
// appropriate for the target triple with the desired linkage.
|
||||
|
||||
let lib = match vcpkg::Config::new()
|
||||
.emit_includes(true)
|
||||
.find_package("openssl")
|
||||
{
|
||||
Ok(lib) => lib,
|
||||
Err(e) => {
|
||||
println!("note: vcpkg did not find openssl: {}", e);
|
||||
return;
|
||||
}
|
||||
};
|
||||
|
||||
super::postprocess(&lib.include_paths);
|
||||
|
||||
println!("cargo:rustc-link-lib=user32");
|
||||
println!("cargo:rustc-link-lib=gdi32");
|
||||
println!("cargo:rustc-link-lib=crypt32");
|
||||
|
||||
process::exit(0);
|
||||
}
|
||||
|
||||
fn execute_command_and_get_output(cmd: &str, args: &[&str]) -> Option<String> {
|
||||
let out = Command::new(cmd).args(args).output();
|
||||
if let Ok(ref r1) = out {
|
||||
if r1.status.success() {
|
||||
let r2 = String::from_utf8(r1.stdout.clone());
|
||||
if let Ok(r3) = r2 {
|
||||
return Some(r3.trim().to_string());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
None
|
||||
}
|
||||
25
vendor/openssl-sys/build/find_vendored.rs
vendored
Normal file
25
vendor/openssl-sys/build/find_vendored.rs
vendored
Normal file
|
|
@ -0,0 +1,25 @@
|
|||
use openssl_src;
|
||||
use std::path::PathBuf;
|
||||
|
||||
use super::env;
|
||||
|
||||
pub fn get_openssl(_target: &str) -> (Vec<PathBuf>, PathBuf) {
|
||||
let openssl_config_dir = env("OPENSSL_CONFIG_DIR");
|
||||
|
||||
let mut openssl_src_build = openssl_src::Build::new();
|
||||
if let Some(value) = openssl_config_dir {
|
||||
openssl_src_build.openssl_dir(PathBuf::from(value));
|
||||
}
|
||||
|
||||
let artifacts = openssl_src_build.build();
|
||||
println!("cargo:vendored=1");
|
||||
println!(
|
||||
"cargo:root={}",
|
||||
artifacts.lib_dir().parent().unwrap().display()
|
||||
);
|
||||
|
||||
(
|
||||
vec![artifacts.lib_dir().to_path_buf()],
|
||||
artifacts.include_dir().to_path_buf(),
|
||||
)
|
||||
}
|
||||
508
vendor/openssl-sys/build/main.rs
vendored
Normal file
508
vendor/openssl-sys/build/main.rs
vendored
Normal file
|
|
@ -0,0 +1,508 @@
|
|||
#[cfg(feature = "bindgen")]
|
||||
extern crate bindgen;
|
||||
extern crate cc;
|
||||
#[cfg(feature = "vendored")]
|
||||
extern crate openssl_src;
|
||||
extern crate pkg_config;
|
||||
extern crate vcpkg;
|
||||
|
||||
use std::collections::HashSet;
|
||||
use std::env;
|
||||
use std::ffi::OsString;
|
||||
use std::path::PathBuf;
|
||||
mod cfgs;
|
||||
|
||||
mod find_normal;
|
||||
#[cfg(feature = "vendored")]
|
||||
mod find_vendored;
|
||||
mod run_bindgen;
|
||||
|
||||
#[derive(PartialEq)]
|
||||
enum Version {
|
||||
Openssl3xx,
|
||||
Openssl11x,
|
||||
Openssl10x,
|
||||
Libressl,
|
||||
Boringssl,
|
||||
}
|
||||
|
||||
fn env_inner(name: &str) -> Option<OsString> {
|
||||
let var = env::var_os(name);
|
||||
println!("cargo:rerun-if-env-changed={}", name);
|
||||
|
||||
match var {
|
||||
Some(ref v) => println!("{} = {}", name, v.to_string_lossy()),
|
||||
None => println!("{} unset", name),
|
||||
}
|
||||
|
||||
var
|
||||
}
|
||||
|
||||
fn env(name: &str) -> Option<OsString> {
|
||||
let prefix = env::var("TARGET").unwrap().to_uppercase().replace('-', "_");
|
||||
let prefixed = format!("{}_{}", prefix, name);
|
||||
env_inner(&prefixed).or_else(|| env_inner(name))
|
||||
}
|
||||
|
||||
fn find_openssl(target: &str) -> (Vec<PathBuf>, PathBuf) {
|
||||
#[cfg(feature = "vendored")]
|
||||
{
|
||||
// vendor if the feature is present, unless
|
||||
// OPENSSL_NO_VENDOR exists and isn't `0`
|
||||
if env("OPENSSL_NO_VENDOR").map_or(true, |s| s == "0") {
|
||||
return find_vendored::get_openssl(target);
|
||||
}
|
||||
}
|
||||
find_normal::get_openssl(target)
|
||||
}
|
||||
|
||||
fn check_ssl_kind() {
|
||||
if cfg!(feature = "unstable_boringssl") {
|
||||
println!("cargo:rustc-cfg=boringssl");
|
||||
println!("cargo:boringssl=true");
|
||||
|
||||
if let Ok(vars) = env::var("DEP_BSSL_CONF") {
|
||||
for var in vars.split(',') {
|
||||
println!("cargo:rustc-cfg=osslconf=\"{}\"", var);
|
||||
}
|
||||
println!("cargo:conf={}", vars);
|
||||
}
|
||||
|
||||
// BoringSSL does not have any build logic, exit early
|
||||
std::process::exit(0);
|
||||
}
|
||||
}
|
||||
|
||||
fn main() {
|
||||
println!("cargo:rustc-check-cfg=cfg(osslconf, values(\"OPENSSL_NO_OCB\", \"OPENSSL_NO_SM4\", \"OPENSSL_NO_SEED\", \"OPENSSL_NO_CHACHA\", \"OPENSSL_NO_CAST\", \"OPENSSL_NO_IDEA\", \"OPENSSL_NO_CAMELLIA\", \"OPENSSL_NO_RC4\", \"OPENSSL_NO_BF\", \"OPENSSL_NO_PSK\", \"OPENSSL_NO_DEPRECATED_3_0\", \"OPENSSL_NO_SCRYPT\", \"OPENSSL_NO_SM3\", \"OPENSSL_NO_RMD160\", \"OPENSSL_NO_EC2M\", \"OPENSSL_NO_OCSP\", \"OPENSSL_NO_CMS\", \"OPENSSL_NO_COMP\", \"OPENSSL_NO_SOCK\", \"OPENSSL_NO_STDIO\", \"OPENSSL_NO_EC\", \"OPENSSL_NO_SSL3_METHOD\", \"OPENSSL_NO_KRB5\", \"OPENSSL_NO_TLSEXT\", \"OPENSSL_NO_SRP\", \"OPENSSL_NO_RFC3779\", \"OPENSSL_NO_SHA\", \"OPENSSL_NO_NEXTPROTONEG\", \"OPENSSL_NO_ENGINE\", \"OPENSSL_NO_BUF_FREELISTS\"))");
|
||||
|
||||
println!("cargo:rustc-check-cfg=cfg(openssl)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl)");
|
||||
println!("cargo:rustc-check-cfg=cfg(boringssl)");
|
||||
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl250)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl251)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl252)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl261)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl270)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl271)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl273)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl280)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl281)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl291)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl310)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl321)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl332)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl340)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl350)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl360)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl361)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl370)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl380)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl381)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl382)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl390)");
|
||||
println!("cargo:rustc-check-cfg=cfg(libressl400)");
|
||||
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl101)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl102)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl102f)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl102h)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl110)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl110f)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl110g)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl110h)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl111)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl111b)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl111c)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl111d)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl300)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl310)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl320)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl330)");
|
||||
println!("cargo:rustc-check-cfg=cfg(ossl340)");
|
||||
|
||||
check_ssl_kind();
|
||||
|
||||
let target = env::var("TARGET").unwrap();
|
||||
|
||||
let (lib_dirs, include_dir) = find_openssl(&target);
|
||||
// rerun-if-changed causes openssl-sys to rebuild if the openssl include
|
||||
// dir has changed since the last build. However, this causes a rebuild
|
||||
// every time when vendoring so we disable it.
|
||||
let potential_path = include_dir.join("openssl");
|
||||
if potential_path.exists() && !cfg!(feature = "vendored") {
|
||||
if let Some(printable_include) = potential_path.to_str() {
|
||||
println!("cargo:rerun-if-changed={}", printable_include);
|
||||
}
|
||||
}
|
||||
|
||||
if !lib_dirs.iter().all(|p| p.exists()) {
|
||||
panic!("OpenSSL library directory does not exist: {:?}", lib_dirs);
|
||||
}
|
||||
if !include_dir.exists() {
|
||||
panic!(
|
||||
"OpenSSL include directory does not exist: {}",
|
||||
include_dir.to_string_lossy()
|
||||
);
|
||||
}
|
||||
|
||||
for lib_dir in lib_dirs.iter() {
|
||||
println!(
|
||||
"cargo:rustc-link-search=native={}",
|
||||
lib_dir.to_string_lossy()
|
||||
);
|
||||
}
|
||||
println!("cargo:include={}", include_dir.to_string_lossy());
|
||||
|
||||
let version = postprocess(&[include_dir]);
|
||||
|
||||
let libs_env = env("OPENSSL_LIBS");
|
||||
let libs = match libs_env.as_ref().and_then(|s| s.to_str()) {
|
||||
Some(v) => {
|
||||
if v.is_empty() {
|
||||
vec![]
|
||||
} else {
|
||||
v.split(':').collect()
|
||||
}
|
||||
}
|
||||
None => match version {
|
||||
Version::Openssl10x if target.contains("windows") => vec!["ssleay32", "libeay32"],
|
||||
Version::Openssl3xx | Version::Openssl11x if target.contains("windows-msvc") => {
|
||||
vec!["libssl", "libcrypto"]
|
||||
}
|
||||
_ => vec!["ssl", "crypto"],
|
||||
},
|
||||
};
|
||||
|
||||
let kind = determine_mode(&lib_dirs, &libs);
|
||||
for lib in libs.into_iter() {
|
||||
println!("cargo:rustc-link-lib={}={}", kind, lib);
|
||||
}
|
||||
|
||||
// libssl in BoringSSL requires the C++ runtime, and static libraries do
|
||||
// not carry dependency information. On unix-like platforms, the C++
|
||||
// runtime and standard library are typically picked up by default via the
|
||||
// C++ compiler, which has a platform-specific default. (See implementations
|
||||
// of `GetDefaultCXXStdlibType` in Clang.) Builds may also choose to
|
||||
// override this and specify their own with `-nostdinc++` and `-nostdlib++`
|
||||
// flags. Some compilers also provide options like `-stdlib=libc++`.
|
||||
//
|
||||
// Typically, such information is carried all the way up the build graph,
|
||||
// but Cargo is not an integrated cross-language build system, so it cannot
|
||||
// safely handle any of these situations. As a result, we need to make
|
||||
// guesses. Getting this wrong may result in symbol conflicts and memory
|
||||
// errors, but this unsafety is inherent to driving builds with
|
||||
// externally-built libraries using Cargo.
|
||||
//
|
||||
// For now, we guess that the build was made with the defaults. This too is
|
||||
// difficult because Rust does not expose this information from Clang, but
|
||||
// try to match the behavior for common platforms. For a more robust option,
|
||||
// this likely needs to be deferred to the caller with an environment
|
||||
// variable.
|
||||
if version == Version::Boringssl && kind == "static" && env::var("CARGO_CFG_UNIX").is_ok() {
|
||||
let cpp_lib = match env::var("CARGO_CFG_TARGET_OS").unwrap().as_ref() {
|
||||
"macos" => "c++",
|
||||
_ => "stdc++",
|
||||
};
|
||||
println!("cargo:rustc-link-lib={}", cpp_lib);
|
||||
}
|
||||
|
||||
// https://github.com/openssl/openssl/pull/15086
|
||||
if version == Version::Openssl3xx
|
||||
&& kind == "static"
|
||||
&& (env::var("CARGO_CFG_TARGET_OS").unwrap() == "linux"
|
||||
|| env::var("CARGO_CFG_TARGET_OS").unwrap() == "android")
|
||||
&& env::var("CARGO_CFG_TARGET_POINTER_WIDTH").unwrap() == "32"
|
||||
{
|
||||
println!("cargo:rustc-link-lib=atomic");
|
||||
}
|
||||
|
||||
if kind == "static" && target.contains("windows") {
|
||||
println!("cargo:rustc-link-lib=dylib=gdi32");
|
||||
println!("cargo:rustc-link-lib=dylib=user32");
|
||||
println!("cargo:rustc-link-lib=dylib=crypt32");
|
||||
println!("cargo:rustc-link-lib=dylib=ws2_32");
|
||||
println!("cargo:rustc-link-lib=dylib=advapi32");
|
||||
}
|
||||
}
|
||||
|
||||
fn postprocess(include_dirs: &[PathBuf]) -> Version {
|
||||
let version = validate_headers(include_dirs);
|
||||
|
||||
// Never run bindgen for BoringSSL, if it was needed we already ran it.
|
||||
if version != Version::Boringssl {
|
||||
#[cfg(feature = "bindgen")]
|
||||
run_bindgen::run(&include_dirs);
|
||||
}
|
||||
|
||||
version
|
||||
}
|
||||
|
||||
/// Validates the header files found in `include_dir` and then returns the
|
||||
/// version string of OpenSSL.
|
||||
#[allow(clippy::unusual_byte_groupings)]
|
||||
fn validate_headers(include_dirs: &[PathBuf]) -> Version {
|
||||
// This `*-sys` crate only works with OpenSSL 1.0.1, 1.0.2, 1.1.0, 1.1.1 and 3.0.0.
|
||||
// To correctly expose the right API from this crate, take a look at
|
||||
// `opensslv.h` to see what version OpenSSL claims to be.
|
||||
//
|
||||
// OpenSSL has a number of build-time configuration options which affect
|
||||
// various structs and such. Since OpenSSL 1.1.0 this isn't really a problem
|
||||
// as the library is much more FFI-friendly, but 1.0.{1,2} suffer this problem.
|
||||
//
|
||||
// To handle all this conditional compilation we slurp up the configuration
|
||||
// file of OpenSSL, `opensslconf.h`, and then dump out everything it defines
|
||||
// as our own #[cfg] directives. That way the `ossl10x.rs` bindings can
|
||||
// account for compile differences and such.
|
||||
println!("cargo:rerun-if-changed=build/expando.c");
|
||||
let mut gcc = cc::Build::new();
|
||||
gcc.includes(include_dirs);
|
||||
let expanded = match gcc.file("build/expando.c").try_expand() {
|
||||
Ok(expanded) => expanded,
|
||||
Err(e) => {
|
||||
panic!(
|
||||
"
|
||||
Header expansion error:
|
||||
{:?}
|
||||
|
||||
Failed to find OpenSSL development headers.
|
||||
|
||||
You can try fixing this setting the `OPENSSL_DIR` environment variable
|
||||
pointing to your OpenSSL installation or installing OpenSSL headers package
|
||||
specific to your distribution:
|
||||
|
||||
# On Ubuntu
|
||||
sudo apt-get install pkg-config libssl-dev
|
||||
# On Arch Linux
|
||||
sudo pacman -S pkgconf openssl
|
||||
# On Fedora
|
||||
sudo dnf install pkgconf perl-FindBin perl-IPC-Cmd openssl-devel
|
||||
# On Alpine Linux
|
||||
apk add pkgconf openssl-dev
|
||||
|
||||
See rust-openssl documentation for more information:
|
||||
|
||||
https://docs.rs/openssl
|
||||
",
|
||||
e
|
||||
);
|
||||
}
|
||||
};
|
||||
let expanded = String::from_utf8(expanded).unwrap();
|
||||
|
||||
let mut enabled = vec![];
|
||||
let mut openssl_version = None;
|
||||
let mut libressl_version = None;
|
||||
let mut is_boringssl = false;
|
||||
for line in expanded.lines() {
|
||||
let line = line.trim();
|
||||
|
||||
let openssl_prefix = "RUST_VERSION_OPENSSL_";
|
||||
let new_openssl_prefix = "RUST_VERSION_NEW_OPENSSL_";
|
||||
let libressl_prefix = "RUST_VERSION_LIBRESSL_";
|
||||
let boringsl_prefix = "RUST_OPENSSL_IS_BORINGSSL";
|
||||
let conf_prefix = "RUST_CONF_";
|
||||
if let Some(version) = line.strip_prefix(openssl_prefix) {
|
||||
openssl_version = Some(parse_version(version));
|
||||
} else if let Some(version) = line.strip_prefix(new_openssl_prefix) {
|
||||
openssl_version = Some(parse_new_version(version));
|
||||
} else if let Some(version) = line.strip_prefix(libressl_prefix) {
|
||||
libressl_version = Some(parse_version(version));
|
||||
} else if let Some(conf) = line.strip_prefix(conf_prefix) {
|
||||
enabled.push(conf);
|
||||
} else if line.starts_with(boringsl_prefix) {
|
||||
is_boringssl = true;
|
||||
}
|
||||
}
|
||||
|
||||
for enabled in &enabled {
|
||||
println!("cargo:rustc-cfg=osslconf=\"{}\"", enabled);
|
||||
}
|
||||
println!("cargo:conf={}", enabled.join(","));
|
||||
|
||||
if is_boringssl {
|
||||
println!("cargo:rustc-cfg=boringssl");
|
||||
println!("cargo:boringssl=true");
|
||||
run_bindgen::run_boringssl(include_dirs);
|
||||
return Version::Boringssl;
|
||||
}
|
||||
|
||||
// We set this for any non-BoringSSL lib.
|
||||
println!("cargo:rustc-cfg=openssl");
|
||||
|
||||
for cfg in cfgs::get(openssl_version, libressl_version) {
|
||||
println!("cargo:rustc-cfg={}", cfg);
|
||||
}
|
||||
|
||||
if let Some(libressl_version) = libressl_version {
|
||||
println!("cargo:libressl_version_number={:x}", libressl_version);
|
||||
|
||||
let major = (libressl_version >> 28) as u8;
|
||||
let minor = (libressl_version >> 20) as u8;
|
||||
let fix = (libressl_version >> 12) as u8;
|
||||
let (major, minor, fix) = match (major, minor, fix) {
|
||||
(2, 5, 0) => ('2', '5', '0'),
|
||||
(2, 5, 1) => ('2', '5', '1'),
|
||||
(2, 5, 2) => ('2', '5', '2'),
|
||||
(2, 5, _) => ('2', '5', 'x'),
|
||||
(2, 6, 0) => ('2', '6', '0'),
|
||||
(2, 6, 1) => ('2', '6', '1'),
|
||||
(2, 6, 2) => ('2', '6', '2'),
|
||||
(2, 6, _) => ('2', '6', 'x'),
|
||||
(2, 7, _) => ('2', '7', 'x'),
|
||||
(2, 8, 0) => ('2', '8', '0'),
|
||||
(2, 8, 1) => ('2', '8', '1'),
|
||||
(2, 8, _) => ('2', '8', 'x'),
|
||||
(2, 9, 0) => ('2', '9', '0'),
|
||||
(2, 9, _) => ('2', '9', 'x'),
|
||||
(3, 0, 0) => ('3', '0', '0'),
|
||||
(3, 0, 1) => ('3', '0', '1'),
|
||||
(3, 0, _) => ('3', '0', 'x'),
|
||||
(3, 1, 0) => ('3', '1', '0'),
|
||||
(3, 1, _) => ('3', '1', 'x'),
|
||||
(3, 2, 0) => ('3', '2', '0'),
|
||||
(3, 2, 1) => ('3', '2', '1'),
|
||||
(3, 2, _) => ('3', '2', 'x'),
|
||||
(3, 3, 0) => ('3', '3', '0'),
|
||||
(3, 3, 1) => ('3', '3', '1'),
|
||||
(3, 3, _) => ('3', '3', 'x'),
|
||||
(3, 4, 0) => ('3', '4', '0'),
|
||||
(3, 4, _) => ('3', '4', 'x'),
|
||||
(3, 5, _) => ('3', '5', 'x'),
|
||||
(3, 6, 0) => ('3', '6', '0'),
|
||||
(3, 6, _) => ('3', '6', 'x'),
|
||||
(3, 7, 0) => ('3', '7', '0'),
|
||||
(3, 7, 1) => ('3', '7', '1'),
|
||||
(3, 7, _) => ('3', '7', 'x'),
|
||||
(3, 8, 0) => ('3', '8', '0'),
|
||||
(3, 8, 1) => ('3', '8', '1'),
|
||||
(3, 8, _) => ('3', '8', 'x'),
|
||||
(3, 9, 0) => ('3', '9', '0'),
|
||||
(3, 9, _) => ('3', '9', 'x'),
|
||||
(4, 0, 0) => ('4', '0', '0'),
|
||||
(4, 0, _) => ('4', '0', 'x'),
|
||||
_ => version_error(),
|
||||
};
|
||||
|
||||
println!("cargo:libressl=true");
|
||||
println!("cargo:libressl_version={}{}{}", major, minor, fix);
|
||||
println!("cargo:version=101");
|
||||
Version::Libressl
|
||||
} else {
|
||||
let openssl_version = openssl_version.unwrap();
|
||||
println!("cargo:version_number={:x}", openssl_version);
|
||||
|
||||
if openssl_version >= 0x4_00_00_00_0 {
|
||||
version_error()
|
||||
} else if openssl_version >= 0x3_00_00_00_0 {
|
||||
Version::Openssl3xx
|
||||
} else if openssl_version >= 0x1_01_01_00_0 {
|
||||
println!("cargo:version=111");
|
||||
Version::Openssl11x
|
||||
} else if openssl_version >= 0x1_01_00_06_0 {
|
||||
println!("cargo:version=110");
|
||||
println!("cargo:patch=f");
|
||||
Version::Openssl11x
|
||||
} else if openssl_version >= 0x1_01_00_00_0 {
|
||||
println!("cargo:version=110");
|
||||
Version::Openssl11x
|
||||
} else if openssl_version >= 0x1_00_02_00_0 {
|
||||
println!("cargo:version=102");
|
||||
Version::Openssl10x
|
||||
} else if openssl_version >= 0x1_00_01_00_0 {
|
||||
println!("cargo:version=101");
|
||||
Version::Openssl10x
|
||||
} else {
|
||||
version_error()
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn version_error() -> ! {
|
||||
panic!(
|
||||
"
|
||||
|
||||
This crate is only compatible with OpenSSL (version 1.0.1 through 1.1.1, or 3), or LibreSSL 2.5
|
||||
through 4.0.x, but a different version of OpenSSL was found. The build is now aborting
|
||||
due to this version mismatch.
|
||||
|
||||
"
|
||||
);
|
||||
}
|
||||
|
||||
// parses a string that looks like "0x100020cfL"
|
||||
fn parse_version(version: &str) -> u64 {
|
||||
// cut off the 0x prefix
|
||||
assert!(version.starts_with("0x"));
|
||||
let version = &version[2..];
|
||||
|
||||
// and the type specifier suffix
|
||||
let version = version.trim_end_matches(|c: char| !c.is_ascii_hexdigit());
|
||||
|
||||
u64::from_str_radix(version, 16).unwrap()
|
||||
}
|
||||
|
||||
// parses a string that looks like 3_0_0
|
||||
fn parse_new_version(version: &str) -> u64 {
|
||||
println!("version: {}", version);
|
||||
let mut it = version.split('_');
|
||||
let major = it.next().unwrap().parse::<u64>().unwrap();
|
||||
let minor = it.next().unwrap().parse::<u64>().unwrap();
|
||||
let patch = it.next().unwrap().parse::<u64>().unwrap();
|
||||
|
||||
(major << 28) | (minor << 20) | (patch << 4)
|
||||
}
|
||||
|
||||
/// Given a libdir for OpenSSL (where artifacts are located) as well as the name
|
||||
/// of the libraries we're linking to, figure out whether we should link them
|
||||
/// statically or dynamically.
|
||||
fn determine_mode(libdirs: &[PathBuf], libs: &[&str]) -> &'static str {
|
||||
// First see if a mode was explicitly requested
|
||||
let kind = env("OPENSSL_STATIC");
|
||||
match kind.as_ref().and_then(|s| s.to_str()) {
|
||||
Some("0") => return "dylib",
|
||||
Some(_) => return "static",
|
||||
None => {}
|
||||
}
|
||||
|
||||
// Next, see what files we actually have to link against, and see what our
|
||||
// possibilities even are.
|
||||
let mut files = HashSet::new();
|
||||
for dir in libdirs {
|
||||
for path in dir
|
||||
.read_dir()
|
||||
.unwrap()
|
||||
.map(|e| e.unwrap())
|
||||
.map(|e| e.file_name())
|
||||
.filter_map(|e| e.into_string().ok())
|
||||
{
|
||||
files.insert(path);
|
||||
}
|
||||
}
|
||||
let can_static = libs
|
||||
.iter()
|
||||
.all(|l| files.contains(&format!("lib{}.a", l)) || files.contains(&format!("{}.lib", l)));
|
||||
let can_dylib = libs.iter().all(|l| {
|
||||
files.contains(&format!("lib{}.so", l))
|
||||
|| files.contains(&format!("{}.dll", l))
|
||||
|| files.contains(&format!("lib{}.dylib", l))
|
||||
});
|
||||
match (can_static, can_dylib) {
|
||||
(true, false) => return "static",
|
||||
(false, true) => return "dylib",
|
||||
(false, false) => {
|
||||
panic!(
|
||||
"OpenSSL libdir at `{:?}` does not contain the required files \
|
||||
to either statically or dynamically link OpenSSL",
|
||||
libdirs
|
||||
);
|
||||
}
|
||||
(true, true) => {}
|
||||
}
|
||||
|
||||
// Ok, we've got not explicit preference and can *either* link statically or
|
||||
// link dynamically. In the interest of "security upgrades" and/or "best
|
||||
// practices with security libs", let's link dynamically.
|
||||
"dylib"
|
||||
}
|
||||
253
vendor/openssl-sys/build/run_bindgen.rs
vendored
Normal file
253
vendor/openssl-sys/build/run_bindgen.rs
vendored
Normal file
|
|
@ -0,0 +1,253 @@
|
|||
#[cfg(feature = "bindgen")]
|
||||
use bindgen::callbacks::{MacroParsingBehavior, ParseCallbacks};
|
||||
#[cfg(feature = "bindgen")]
|
||||
use bindgen::{MacroTypeVariation, RustTarget};
|
||||
use std::io::Write;
|
||||
use std::path::PathBuf;
|
||||
#[cfg(not(feature = "bindgen"))]
|
||||
use std::process;
|
||||
use std::{env, fs};
|
||||
|
||||
const INCLUDES: &str = "
|
||||
#include <openssl/aes.h>
|
||||
#include <openssl/asn1.h>
|
||||
#include <openssl/bio.h>
|
||||
#include <openssl/cmac.h>
|
||||
#include <openssl/conf.h>
|
||||
#include <openssl/crypto.h>
|
||||
#include <openssl/dh.h>
|
||||
#include <openssl/dsa.h>
|
||||
#include <openssl/ec.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/hmac.h>
|
||||
#include <openssl/objects.h>
|
||||
#include <openssl/opensslv.h>
|
||||
#include <openssl/pem.h>
|
||||
#include <openssl/pkcs12.h>
|
||||
#include <openssl/pkcs7.h>
|
||||
#include <openssl/rand.h>
|
||||
#include <openssl/rsa.h>
|
||||
#include <openssl/safestack.h>
|
||||
#include <openssl/sha.h>
|
||||
#include <openssl/ssl.h>
|
||||
#include <openssl/stack.h>
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/x509_vfy.h>
|
||||
#include <openssl/x509v3.h>
|
||||
|
||||
// this must be included after ssl.h for libressl!
|
||||
#include <openssl/srtp.h>
|
||||
|
||||
#if !defined(LIBRESSL_VERSION_NUMBER) && !defined(OPENSSL_IS_BORINGSSL)
|
||||
#include <openssl/cms.h>
|
||||
#endif
|
||||
|
||||
#if !defined(OPENSSL_IS_BORINGSSL)
|
||||
#include <openssl/comp.h>
|
||||
#include <openssl/ocsp.h>
|
||||
#endif
|
||||
|
||||
#if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000
|
||||
#include <openssl/kdf.h>
|
||||
#endif
|
||||
|
||||
#if OPENSSL_VERSION_NUMBER >= 0x30000000
|
||||
#include <openssl/provider.h>
|
||||
#endif
|
||||
|
||||
#if OPENSSL_VERSION_NUMBER >= 0x30200000
|
||||
#include <openssl/quic.h>
|
||||
#endif
|
||||
|
||||
#if defined(LIBRESSL_VERSION_NUMBER) || defined(OPENSSL_IS_BORINGSSL)
|
||||
#include <openssl/poly1305.h>
|
||||
#endif
|
||||
|
||||
#if OPENSSL_VERSION_NUMBER >= 0x30200000
|
||||
#include <openssl/thread.h>
|
||||
#endif
|
||||
";
|
||||
|
||||
#[cfg(feature = "bindgen")]
|
||||
pub fn run(include_dirs: &[PathBuf]) {
|
||||
let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
|
||||
|
||||
let mut builder = bindgen::builder()
|
||||
.parse_callbacks(Box::new(OpensslCallbacks))
|
||||
.rust_target(RustTarget::Stable_1_47)
|
||||
.ctypes_prefix("::libc")
|
||||
.raw_line("use libc::*;")
|
||||
.raw_line("#[cfg(windows)] use std::os::windows::raw::HANDLE;")
|
||||
.raw_line("type evp_pkey_st = EVP_PKEY;")
|
||||
.allowlist_file(".*[/\\\\]openssl/[^/\\\\]+\\.h")
|
||||
.allowlist_recursively(false)
|
||||
// libc is missing pthread_once_t on macOS
|
||||
.blocklist_type("CRYPTO_ONCE")
|
||||
.blocklist_function("CRYPTO_THREAD_run_once")
|
||||
// we don't want to mess with va_list
|
||||
.blocklist_function("BIO_vprintf")
|
||||
.blocklist_function("BIO_vsnprintf")
|
||||
.blocklist_function("ERR_vset_error")
|
||||
.blocklist_function("ERR_add_error_vdata")
|
||||
.blocklist_function("EVP_KDF_vctrl")
|
||||
.blocklist_type("OSSL_FUNC_core_vset_error_fn")
|
||||
.blocklist_type("OSSL_FUNC_BIO_vprintf_fn")
|
||||
.blocklist_type("OSSL_FUNC_BIO_vsnprintf_fn")
|
||||
// struct hostent * does not exist on Windows
|
||||
.blocklist_function("BIO_gethostbyname")
|
||||
// Maintain compatibility for existing enum definitions
|
||||
.rustified_enum("point_conversion_form_t")
|
||||
// Maintain compatibility for pre-union definitions
|
||||
.blocklist_type("GENERAL_NAME")
|
||||
.blocklist_type("GENERAL_NAME_st")
|
||||
.blocklist_type("EVP_PKEY")
|
||||
.blocklist_type("evp_pkey_st")
|
||||
.layout_tests(false)
|
||||
.header_contents("includes.h", INCLUDES);
|
||||
|
||||
for include_dir in include_dirs {
|
||||
builder = builder
|
||||
.clang_arg("-I")
|
||||
.clang_arg(include_dir.display().to_string());
|
||||
}
|
||||
|
||||
builder
|
||||
.generate()
|
||||
.unwrap()
|
||||
.write_to_file(out_dir.join("bindgen.rs"))
|
||||
.unwrap();
|
||||
}
|
||||
|
||||
#[cfg(feature = "bindgen")]
|
||||
pub fn run_boringssl(include_dirs: &[PathBuf]) {
|
||||
let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
|
||||
|
||||
fs::File::create(out_dir.join("boring_static_wrapper.h"))
|
||||
.expect("Failed to create boring_static_wrapper.h")
|
||||
.write_all(INCLUDES.as_bytes())
|
||||
.expect("Failed to write contents to boring_static_wrapper.h");
|
||||
|
||||
let mut builder = bindgen::builder()
|
||||
.rust_target(RustTarget::Stable_1_47)
|
||||
.ctypes_prefix("::libc")
|
||||
.raw_line("use libc::*;")
|
||||
.derive_default(false)
|
||||
.enable_function_attribute_detection()
|
||||
.default_macro_constant_type(MacroTypeVariation::Signed)
|
||||
.rustified_enum("point_conversion_form_t")
|
||||
.allowlist_file(".*[/\\\\]openssl/[^/]+\\.h")
|
||||
.allowlist_recursively(false)
|
||||
.blocklist_function("BIO_vsnprintf")
|
||||
.blocklist_function("OPENSSL_vasprintf")
|
||||
.wrap_static_fns(true)
|
||||
.wrap_static_fns_path(out_dir.join("boring_static_wrapper").display().to_string())
|
||||
.layout_tests(false)
|
||||
.header(
|
||||
out_dir
|
||||
.join("boring_static_wrapper.h")
|
||||
.display()
|
||||
.to_string(),
|
||||
);
|
||||
|
||||
for include_dir in include_dirs {
|
||||
builder = builder
|
||||
.clang_arg("-I")
|
||||
.clang_arg(include_dir.display().to_string());
|
||||
}
|
||||
|
||||
builder
|
||||
.generate()
|
||||
.unwrap()
|
||||
.write_to_file(out_dir.join("bindgen.rs"))
|
||||
.unwrap();
|
||||
|
||||
cc::Build::new()
|
||||
.file(out_dir.join("boring_static_wrapper.c"))
|
||||
.includes(include_dirs)
|
||||
.compile("boring_static_wrapper");
|
||||
}
|
||||
|
||||
#[cfg(not(feature = "bindgen"))]
|
||||
pub fn run_boringssl(include_dirs: &[PathBuf]) {
|
||||
let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
|
||||
|
||||
fs::File::create(out_dir.join("boring_static_wrapper.h"))
|
||||
.expect("Failed to create boring_static_wrapper.h")
|
||||
.write_all(INCLUDES.as_bytes())
|
||||
.expect("Failed to write contents to boring_static_wrapper.h");
|
||||
|
||||
let mut bindgen_cmd = process::Command::new("bindgen");
|
||||
bindgen_cmd
|
||||
.arg("-o")
|
||||
.arg(out_dir.join("bindgen.rs"))
|
||||
// Must be a valid version from
|
||||
// https://docs.rs/bindgen/latest/bindgen/enum.RustTarget.html
|
||||
.arg("--rust-target=1.47")
|
||||
.arg("--ctypes-prefix=::libc")
|
||||
.arg("--raw-line=use libc::*;")
|
||||
.arg("--no-derive-default")
|
||||
.arg("--enable-function-attribute-detection")
|
||||
.arg("--default-macro-constant-type=signed")
|
||||
.arg("--rustified-enum=point_conversion_form_t")
|
||||
.arg("--allowlist-file=.*[/\\\\]openssl/[^/]+\\.h")
|
||||
.arg("--no-recursive-allowlist")
|
||||
.arg("--blocklist-function=BIO_vsnprintf")
|
||||
.arg("--blocklist-function=OPENSSL_vasprintf")
|
||||
.arg("--experimental")
|
||||
.arg("--wrap-static-fns")
|
||||
.arg("--wrap-static-fns-path")
|
||||
.arg(out_dir.join("boring_static_wrapper").display().to_string())
|
||||
.arg("--no-layout-tests")
|
||||
.arg(out_dir.join("boring_static_wrapper.h"))
|
||||
.arg("--")
|
||||
.arg(format!("--target={}", env::var("TARGET").unwrap()));
|
||||
|
||||
for include_dir in include_dirs {
|
||||
bindgen_cmd.arg("-I").arg(include_dir.display().to_string());
|
||||
}
|
||||
|
||||
let result = bindgen_cmd.status().expect("bindgen failed to execute");
|
||||
assert!(result.success());
|
||||
|
||||
cc::Build::new()
|
||||
.file(out_dir.join("boring_static_wrapper.c"))
|
||||
.includes(include_dirs)
|
||||
.compile("boring_static_wrapper");
|
||||
}
|
||||
|
||||
#[cfg(feature = "bindgen")]
|
||||
#[derive(Debug)]
|
||||
struct OpensslCallbacks;
|
||||
|
||||
#[cfg(feature = "bindgen")]
|
||||
impl ParseCallbacks for OpensslCallbacks {
|
||||
// for now we'll continue hand-writing constants
|
||||
fn will_parse_macro(&self, _name: &str) -> MacroParsingBehavior {
|
||||
MacroParsingBehavior::Ignore
|
||||
}
|
||||
|
||||
fn item_name(&self, original_item_name: &str) -> Option<String> {
|
||||
match original_item_name {
|
||||
// Our original definitions of these are wrong, so rename to avoid breakage
|
||||
"CRYPTO_EX_new"
|
||||
| "CRYPTO_EX_dup"
|
||||
| "CRYPTO_EX_free"
|
||||
| "BIO_meth_set_write"
|
||||
| "BIO_meth_set_read"
|
||||
| "BIO_meth_set_puts"
|
||||
| "BIO_meth_set_ctrl"
|
||||
| "BIO_meth_set_create"
|
||||
| "BIO_meth_set_destroy"
|
||||
| "CRYPTO_set_locking_callback"
|
||||
| "CRYPTO_set_id_callback"
|
||||
| "SSL_CTX_set_tmp_dh_callback"
|
||||
| "SSL_set_tmp_dh_callback"
|
||||
| "SSL_CTX_set_tmp_ecdh_callback"
|
||||
| "SSL_set_tmp_ecdh_callback"
|
||||
| "SSL_CTX_callback_ctrl"
|
||||
| "SSL_CTX_set_alpn_select_cb" => Some(format!("{}__fixed_rust", original_item_name)),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
}
|
||||
7
vendor/openssl-sys/src/aes.rs
vendored
Normal file
7
vendor/openssl-sys/src/aes.rs
vendored
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
use libc::*;
|
||||
|
||||
pub const AES_ENCRYPT: c_int = 1;
|
||||
pub const AES_DECRYPT: c_int = 0;
|
||||
|
||||
pub const AES_MAXNR: c_int = 14;
|
||||
pub const AES_BLOCK_SIZE: c_int = 16;
|
||||
39
vendor/openssl-sys/src/asn1.rs
vendored
Normal file
39
vendor/openssl-sys/src/asn1.rs
vendored
Normal file
|
|
@ -0,0 +1,39 @@
|
|||
use libc::*;
|
||||
|
||||
use super::*;
|
||||
|
||||
// ASN.1 tag values
|
||||
pub const V_ASN1_EOC: c_int = 0;
|
||||
pub const V_ASN1_BOOLEAN: c_int = 1;
|
||||
pub const V_ASN1_INTEGER: c_int = 2;
|
||||
pub const V_ASN1_BIT_STRING: c_int = 3;
|
||||
pub const V_ASN1_OCTET_STRING: c_int = 4;
|
||||
pub const V_ASN1_NULL: c_int = 5;
|
||||
pub const V_ASN1_OBJECT: c_int = 6;
|
||||
pub const V_ASN1_OBJECT_DESCRIPTOR: c_int = 7;
|
||||
pub const V_ASN1_EXTERNAL: c_int = 8;
|
||||
pub const V_ASN1_REAL: c_int = 9;
|
||||
pub const V_ASN1_ENUMERATED: c_int = 10;
|
||||
pub const V_ASN1_UTF8STRING: c_int = 12;
|
||||
pub const V_ASN1_SEQUENCE: c_int = 16;
|
||||
pub const V_ASN1_SET: c_int = 17;
|
||||
pub const V_ASN1_NUMERICSTRING: c_int = 18;
|
||||
pub const V_ASN1_PRINTABLESTRING: c_int = 19;
|
||||
pub const V_ASN1_T61STRING: c_int = 20;
|
||||
pub const V_ASN1_TELETEXSTRING: c_int = 20; // alias
|
||||
pub const V_ASN1_VIDEOTEXSTRING: c_int = 21;
|
||||
pub const V_ASN1_IA5STRING: c_int = 22;
|
||||
pub const V_ASN1_UTCTIME: c_int = 23;
|
||||
pub const V_ASN1_GENERALIZEDTIME: c_int = 24;
|
||||
pub const V_ASN1_GRAPHICSTRING: c_int = 25;
|
||||
pub const V_ASN1_ISO64STRING: c_int = 26;
|
||||
pub const V_ASN1_VISIBLESTRING: c_int = 26; // alias
|
||||
pub const V_ASN1_GENERALSTRING: c_int = 27;
|
||||
pub const V_ASN1_UNIVERSALSTRING: c_int = 28;
|
||||
pub const V_ASN1_BMPSTRING: c_int = 30;
|
||||
|
||||
pub const MBSTRING_FLAG: c_int = 0x1000;
|
||||
pub const MBSTRING_UTF8: c_int = MBSTRING_FLAG;
|
||||
pub const MBSTRING_ASC: c_int = MBSTRING_FLAG | 1;
|
||||
pub const MBSTRING_BMP: c_int = MBSTRING_FLAG | 2;
|
||||
pub const MBSTRING_UNIV: c_int = MBSTRING_FLAG | 4;
|
||||
116
vendor/openssl-sys/src/bio.rs
vendored
Normal file
116
vendor/openssl-sys/src/bio.rs
vendored
Normal file
|
|
@ -0,0 +1,116 @@
|
|||
use libc::*;
|
||||
|
||||
use super::*;
|
||||
|
||||
pub const BIO_TYPE_NONE: c_int = 0;
|
||||
|
||||
pub const BIO_CTRL_EOF: c_int = 2;
|
||||
pub const BIO_CTRL_INFO: c_int = 3;
|
||||
pub const BIO_CTRL_FLUSH: c_int = 11;
|
||||
pub const BIO_CTRL_DGRAM_QUERY_MTU: c_int = 40;
|
||||
pub const BIO_C_SET_BUF_MEM_EOF_RETURN: c_int = 130;
|
||||
|
||||
pub unsafe fn BIO_set_retry_read(b: *mut BIO) {
|
||||
BIO_set_flags(b, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY)
|
||||
}
|
||||
|
||||
pub unsafe fn BIO_set_retry_write(b: *mut BIO) {
|
||||
BIO_set_flags(b, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY)
|
||||
}
|
||||
|
||||
pub unsafe fn BIO_clear_retry_flags(b: *mut BIO) {
|
||||
BIO_clear_flags(b, BIO_FLAGS_RWS | BIO_FLAGS_SHOULD_RETRY)
|
||||
}
|
||||
|
||||
pub const BIO_FLAGS_READ: c_int = 0x01;
|
||||
pub const BIO_FLAGS_WRITE: c_int = 0x02;
|
||||
pub const BIO_FLAGS_IO_SPECIAL: c_int = 0x04;
|
||||
pub const BIO_FLAGS_RWS: c_int = BIO_FLAGS_READ | BIO_FLAGS_WRITE | BIO_FLAGS_IO_SPECIAL;
|
||||
pub const BIO_FLAGS_SHOULD_RETRY: c_int = 0x08;
|
||||
|
||||
pub unsafe fn BIO_get_mem_data(b: *mut BIO, pp: *mut *mut c_char) -> c_long {
|
||||
BIO_ctrl(b, BIO_CTRL_INFO, 0, pp as *mut c_void)
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[deprecated(note = "use BIO_meth_set_write__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_write(
|
||||
biom: *mut BIO_METHOD,
|
||||
write: unsafe extern "C" fn(*mut BIO, *const c_char, c_int) -> c_int,
|
||||
) -> c_int;
|
||||
#[deprecated(note = "use BIO_meth_set_read__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_read(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: unsafe extern "C" fn(*mut BIO, *mut c_char, c_int) -> c_int,
|
||||
) -> c_int;
|
||||
#[deprecated(note = "use BIO_meth_set_puts__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_puts(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: unsafe extern "C" fn(*mut BIO, *const c_char) -> c_int,
|
||||
) -> c_int;
|
||||
#[deprecated(note = "use BIO_meth_set_ctrl__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_ctrl(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: unsafe extern "C" fn(*mut BIO, c_int, c_long, *mut c_void) -> c_long,
|
||||
) -> c_int;
|
||||
#[deprecated(note = "use BIO_meth_set_create__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_create(
|
||||
biom: *mut BIO_METHOD,
|
||||
create: unsafe extern "C" fn(*mut BIO) -> c_int,
|
||||
) -> c_int;
|
||||
#[deprecated(note = "use BIO_meth_set_destroy__fixed_rust instead")]
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_set_destroy(
|
||||
biom: *mut BIO_METHOD,
|
||||
destroy: unsafe extern "C" fn(*mut BIO) -> c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl320)] {
|
||||
use std::ptr;
|
||||
|
||||
pub const BIO_CTRL_DGRAM_GET_MTU: c_int = 41;
|
||||
pub const BIO_CTRL_DGRAM_SET_MTU: c_int = 42;
|
||||
pub const BIO_CTRL_DGRAM_GET_LOCAL_ADDR_CAP: c_int = 82;
|
||||
pub const BIO_CTRL_DGRAM_GET_LOCAL_ADDR_ENABLE: c_int = 83;
|
||||
pub const BIO_CTRL_DGRAM_SET_LOCAL_ADDR_ENABLE: c_int = 84;
|
||||
pub const BIO_CTRL_DGRAM_GET_CAPS: c_int = 86;
|
||||
pub const BIO_CTRL_DGRAM_SET_CAPS: c_int = 87;
|
||||
pub const BIO_CTRL_DGRAM_GET_NO_TRUNC: c_int = 88;
|
||||
pub const BIO_CTRL_DGRAM_SET_NO_TRUNC: c_int = 89;
|
||||
|
||||
pub unsafe fn BIO_dgram_get_no_trunc(bio: *mut BIO) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_GET_NO_TRUNC, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_set_no_trunc(bio: *mut BIO, enable: c_int) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_SET_NO_TRUNC, enable as c_long, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_get_cap(bio: *mut BIO) -> u32 {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_GET_CAPS, 0, ptr::null_mut()) as u32
|
||||
}
|
||||
pub unsafe fn BIO_dgram_set_cap(bio: *mut BIO, cap: u32) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_SET_CAPS, cap as c_long, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_get_local_addr_cap(bio: *mut BIO) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_GET_LOCAL_ADDR_CAP, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_get_local_addr_enable(bio: *mut BIO, enable: *mut c_int) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_GET_LOCAL_ADDR_ENABLE, 0, enable as *mut c_void) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_set_local_addr_enable(bio: *mut BIO, enable: c_int) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_SET_LOCAL_ADDR_ENABLE, enable as c_long, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn BIO_dgram_get_mtu(bio: *mut BIO) -> c_uint {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_GET_MTU, 0, ptr::null_mut()) as c_uint
|
||||
}
|
||||
pub unsafe fn BIO_dgram_set_mtu(bio: *mut BIO, mtu: c_uint) -> c_int {
|
||||
BIO_ctrl(bio, BIO_CTRL_DGRAM_SET_MTU, mtu as c_long, ptr::null_mut()) as c_int
|
||||
}
|
||||
}
|
||||
}
|
||||
15
vendor/openssl-sys/src/bn.rs
vendored
Normal file
15
vendor/openssl-sys/src/bn.rs
vendored
Normal file
|
|
@ -0,0 +1,15 @@
|
|||
use libc::*;
|
||||
|
||||
#[cfg(target_pointer_width = "64")]
|
||||
pub type BN_ULONG = c_ulonglong;
|
||||
#[cfg(target_pointer_width = "32")]
|
||||
pub type BN_ULONG = c_uint;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub const BN_FLG_MALLOCED: c_int = 0x01;
|
||||
#[cfg(ossl110)]
|
||||
pub const BN_FLG_STATIC_DATA: c_int = 0x02;
|
||||
#[cfg(ossl110)]
|
||||
pub const BN_FLG_CONSTTIME: c_int = 0x04;
|
||||
#[cfg(ossl110)]
|
||||
pub const BN_FLG_SECURE: c_int = 0x08;
|
||||
46
vendor/openssl-sys/src/cms.rs
vendored
Normal file
46
vendor/openssl-sys/src/cms.rs
vendored
Normal file
|
|
@ -0,0 +1,46 @@
|
|||
use libc::*;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_TEXT: c_uint = 0x1;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOCERTS: c_uint = 0x2;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NO_CONTENT_VERIFY: c_uint = 0x4;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NO_ATTR_VERIFY: c_uint = 0x8;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOSIGS: c_uint = 0x4 | 0x8;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOINTERN: c_uint = 0x10;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NO_SIGNER_CERT_VERIFY: c_uint = 0x20;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOVERIFY: c_uint = 0x20;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_DETACHED: c_uint = 0x40;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_BINARY: c_uint = 0x80;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOATTR: c_uint = 0x100;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOSMIMECAP: c_uint = 0x200;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOOLDMIMETYPE: c_uint = 0x400;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_CRLFEOL: c_uint = 0x800;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_STREAM: c_uint = 0x1000;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_NOCRL: c_uint = 0x2000;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_PARTIAL: c_uint = 0x4000;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_REUSE_DIGEST: c_uint = 0x8000;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_USE_KEYID: c_uint = 0x10000;
|
||||
#[cfg(ossl101)]
|
||||
pub const CMS_DEBUG_DECRYPT: c_uint = 0x20000;
|
||||
#[cfg(ossl102)]
|
||||
pub const CMS_KEY_PARAM: c_uint = 0x40000;
|
||||
#[cfg(ossl110)]
|
||||
pub const CMS_ASCIICRLF: c_uint = 0x80000;
|
||||
134
vendor/openssl-sys/src/crypto.rs
vendored
Normal file
134
vendor/openssl-sys/src/crypto.rs
vendored
Normal file
|
|
@ -0,0 +1,134 @@
|
|||
use super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
#[deprecated(note = "use CRYPTO_set_locking_callback__fixed_rust instead")]
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn CRYPTO_set_locking_callback(
|
||||
func: unsafe extern "C" fn(mode: c_int, n: c_int, file: *const c_char, line: c_int),
|
||||
);
|
||||
|
||||
#[deprecated(note = "use CRYPTO_set_id_callback__fixed_rust instead")]
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn CRYPTO_set_id_callback(func: unsafe extern "C" fn() -> c_ulong);
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
type CRYPTO_EX_new_ret = ();
|
||||
type CRYPTO_EX_dup_from = *const CRYPTO_EX_DATA;
|
||||
} else {
|
||||
type CRYPTO_EX_new_ret = c_int;
|
||||
type CRYPTO_EX_dup_from = *mut CRYPTO_EX_DATA;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
type CRYPTO_EX_dup_from_d = *mut *mut c_void;
|
||||
} else {
|
||||
type CRYPTO_EX_dup_from_d = *mut c_void;
|
||||
}
|
||||
}
|
||||
|
||||
// FIXME should be options
|
||||
pub type CRYPTO_EX_new = unsafe extern "C" fn(
|
||||
parent: *mut c_void,
|
||||
ptr: *mut c_void,
|
||||
ad: *mut CRYPTO_EX_DATA,
|
||||
idx: c_int,
|
||||
argl: c_long,
|
||||
argp: *mut c_void,
|
||||
) -> CRYPTO_EX_new_ret;
|
||||
pub type CRYPTO_EX_dup = unsafe extern "C" fn(
|
||||
to: *mut CRYPTO_EX_DATA,
|
||||
from: CRYPTO_EX_dup_from,
|
||||
from_d: CRYPTO_EX_dup_from_d,
|
||||
idx: c_int,
|
||||
argl: c_long,
|
||||
argp: *mut c_void,
|
||||
) -> c_int;
|
||||
pub type CRYPTO_EX_free = unsafe extern "C" fn(
|
||||
parent: *mut c_void,
|
||||
ptr: *mut c_void,
|
||||
ad: *mut CRYPTO_EX_DATA,
|
||||
idx: c_int,
|
||||
argl: c_long,
|
||||
argp: *mut c_void,
|
||||
);
|
||||
|
||||
#[cfg(any(ossl110, libressl390))]
|
||||
#[inline]
|
||||
#[track_caller]
|
||||
pub unsafe fn OPENSSL_malloc(num: usize) -> *mut c_void {
|
||||
CRYPTO_malloc(
|
||||
num,
|
||||
concat!(file!(), "\0").as_ptr() as *const _,
|
||||
line!() as _,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(not(any(ossl110, libressl390)))]
|
||||
#[inline]
|
||||
#[track_caller]
|
||||
pub unsafe fn OPENSSL_malloc(num: c_int) -> *mut c_void {
|
||||
CRYPTO_malloc(
|
||||
num,
|
||||
concat!(file!(), "\0").as_ptr() as *const _,
|
||||
line!() as _,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(ossl110, libressl390))]
|
||||
#[inline]
|
||||
#[track_caller]
|
||||
pub unsafe fn OPENSSL_free(addr: *mut c_void) {
|
||||
CRYPTO_free(
|
||||
addr,
|
||||
concat!(file!(), "\0").as_ptr() as *const _,
|
||||
line!() as _,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(not(any(ossl110, libressl390)))]
|
||||
#[inline]
|
||||
pub unsafe fn OPENSSL_free(addr: *mut c_void) {
|
||||
CRYPTO_free(addr)
|
||||
}
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub const CRYPTO_LOCK_X509: c_int = 3;
|
||||
#[cfg(not(ossl110))]
|
||||
pub const CRYPTO_LOCK_EVP_PKEY: c_int = 10;
|
||||
#[cfg(not(ossl110))]
|
||||
pub const CRYPTO_LOCK_SSL_CTX: c_int = 12;
|
||||
#[cfg(not(ossl110))]
|
||||
pub const CRYPTO_LOCK_SSL_SESSION: c_int = 14;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl381))] {
|
||||
pub const CRYPTO_EX_INDEX_SSL: c_int = 0;
|
||||
pub const CRYPTO_EX_INDEX_SSL_CTX: c_int = 1;
|
||||
} else if #[cfg(libressl)] {
|
||||
pub const CRYPTO_EX_INDEX_SSL: c_int = 1;
|
||||
pub const CRYPTO_EX_INDEX_SSL_CTX: c_int = 2;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl271))] {
|
||||
pub const OPENSSL_VERSION: c_int = 0;
|
||||
pub const OPENSSL_CFLAGS: c_int = 1;
|
||||
pub const OPENSSL_BUILT_ON: c_int = 2;
|
||||
pub const OPENSSL_PLATFORM: c_int = 3;
|
||||
pub const OPENSSL_DIR: c_int = 4;
|
||||
} else {
|
||||
pub const SSLEAY_VERSION: c_int = 0;
|
||||
pub const SSLEAY_CFLAGS: c_int = 2;
|
||||
pub const SSLEAY_BUILT_ON: c_int = 3;
|
||||
pub const SSLEAY_PLATFORM: c_int = 4;
|
||||
pub const SSLEAY_DIR: c_int = 5;
|
||||
}
|
||||
}
|
||||
|
||||
pub const CRYPTO_LOCK: c_int = 1;
|
||||
9
vendor/openssl-sys/src/dtls1.rs
vendored
Normal file
9
vendor/openssl-sys/src/dtls1.rs
vendored
Normal file
|
|
@ -0,0 +1,9 @@
|
|||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub const DTLS1_COOKIE_LENGTH: c_uint = 255;
|
||||
} else {
|
||||
pub const DTLS1_COOKIE_LENGTH: c_uint = 256;
|
||||
}
|
||||
}
|
||||
16
vendor/openssl-sys/src/ec.rs
vendored
Normal file
16
vendor/openssl-sys/src/ec.rs
vendored
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
use libc::*;
|
||||
use std::ptr;
|
||||
|
||||
use super::*;
|
||||
|
||||
pub const OPENSSL_EC_NAMED_CURVE: c_int = 1;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub unsafe fn EVP_EC_gen(curve: *const c_char) -> *mut EVP_PKEY {
|
||||
EVP_PKEY_Q_keygen(
|
||||
ptr::null_mut(),
|
||||
ptr::null_mut(),
|
||||
"EC\0".as_ptr().cast(),
|
||||
curve,
|
||||
)
|
||||
}
|
||||
66
vendor/openssl-sys/src/err.rs
vendored
Normal file
66
vendor/openssl-sys/src/err.rs
vendored
Normal file
|
|
@ -0,0 +1,66 @@
|
|||
use libc::*;
|
||||
|
||||
pub const ERR_TXT_MALLOCED: c_int = 0x01;
|
||||
pub const ERR_TXT_STRING: c_int = 0x02;
|
||||
|
||||
pub const ERR_LIB_SYS: c_int = 2;
|
||||
pub const ERR_LIB_PEM: c_int = 9;
|
||||
pub const ERR_LIB_ASN1: c_int = 13;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub const ERR_SYSTEM_FLAG: c_ulong = c_int::MAX as c_ulong + 1;
|
||||
pub const ERR_SYSTEM_MASK: c_ulong = c_int::MAX as c_ulong;
|
||||
|
||||
pub const ERR_LIB_OFFSET: c_ulong = 23;
|
||||
pub const ERR_LIB_MASK: c_ulong = 0xff;
|
||||
pub const ERR_RFLAGS_OFFSET: c_ulong = 18;
|
||||
pub const ERR_RFLAGS_MASK: c_ulong = 0x1f;
|
||||
pub const ERR_REASON_MASK: c_ulong = 0x7FFFFF;
|
||||
|
||||
pub const ERR_RFLAG_FATAL: c_ulong = 0x1 << ERR_RFLAGS_OFFSET;
|
||||
|
||||
pub const fn ERR_SYSTEM_ERROR(errcode: c_ulong) -> bool {
|
||||
errcode & ERR_SYSTEM_FLAG != 0
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_LIB(errcode: c_ulong) -> c_int {
|
||||
// hacks since `if` isn't yet stable in const functions :(
|
||||
((ERR_LIB_SYS as c_ulong * (ERR_SYSTEM_ERROR(errcode) as c_ulong)) |
|
||||
(((errcode >> ERR_LIB_OFFSET) & ERR_LIB_MASK) * (!ERR_SYSTEM_ERROR(errcode) as c_ulong))) as c_int
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_FUNC(_errcode: c_ulong) -> c_int {
|
||||
0
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_REASON(errcode: c_ulong) -> c_int {
|
||||
// hacks since `if` isn't yet stable in const functions :(
|
||||
((ERR_LIB_SYS as c_ulong * (ERR_SYSTEM_ERROR(errcode) as c_ulong)) |
|
||||
((errcode & ERR_REASON_MASK) * (!ERR_SYSTEM_ERROR(errcode) as c_ulong))) as c_int
|
||||
}
|
||||
|
||||
pub const fn ERR_PACK(lib: c_int, _func: c_int, reason: c_int) -> c_ulong {
|
||||
((lib as c_ulong & ERR_LIB_MASK) << ERR_LIB_OFFSET) |
|
||||
(reason as c_ulong & ERR_REASON_MASK)
|
||||
}
|
||||
} else {
|
||||
pub const fn ERR_PACK(l: c_int, f: c_int, r: c_int) -> c_ulong {
|
||||
((l as c_ulong & 0x0FF) << 24) |
|
||||
((f as c_ulong & 0xFFF) << 12) |
|
||||
(r as c_ulong & 0xFFF)
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_LIB(l: c_ulong) -> c_int {
|
||||
((l >> 24) & 0x0FF) as c_int
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_FUNC(l: c_ulong) -> c_int {
|
||||
((l >> 12) & 0xFFF) as c_int
|
||||
}
|
||||
|
||||
pub const fn ERR_GET_REASON(l: c_ulong) -> c_int {
|
||||
(l & 0xFFF) as c_int
|
||||
}
|
||||
}
|
||||
}
|
||||
342
vendor/openssl-sys/src/evp.rs
vendored
Normal file
342
vendor/openssl-sys/src/evp.rs
vendored
Normal file
|
|
@ -0,0 +1,342 @@
|
|||
use super::*;
|
||||
use libc::*;
|
||||
|
||||
pub const EVP_MAX_MD_SIZE: c_uint = 64;
|
||||
|
||||
pub const PKCS5_SALT_LEN: c_int = 8;
|
||||
pub const PKCS12_DEFAULT_ITER: c_int = 2048;
|
||||
|
||||
pub const EVP_PKEY_RSA: c_int = NID_rsaEncryption;
|
||||
#[cfg(any(ossl111, libressl310, boringssl))]
|
||||
pub const EVP_PKEY_RSA_PSS: c_int = NID_rsassaPss;
|
||||
pub const EVP_PKEY_DSA: c_int = NID_dsa;
|
||||
pub const EVP_PKEY_DH: c_int = NID_dhKeyAgreement;
|
||||
#[cfg(ossl110)]
|
||||
pub const EVP_PKEY_DHX: c_int = NID_dhpublicnumber;
|
||||
pub const EVP_PKEY_EC: c_int = NID_X9_62_id_ecPublicKey;
|
||||
#[cfg(ossl111)]
|
||||
pub const EVP_PKEY_SM2: c_int = NID_sm2;
|
||||
#[cfg(any(ossl111, libressl370))]
|
||||
pub const EVP_PKEY_X25519: c_int = NID_X25519;
|
||||
#[cfg(any(ossl111, libressl370))]
|
||||
pub const EVP_PKEY_ED25519: c_int = NID_ED25519;
|
||||
#[cfg(ossl111)]
|
||||
pub const EVP_PKEY_X448: c_int = NID_X448;
|
||||
#[cfg(ossl111)]
|
||||
pub const EVP_PKEY_ED448: c_int = NID_ED448;
|
||||
pub const EVP_PKEY_HMAC: c_int = NID_hmac;
|
||||
pub const EVP_PKEY_CMAC: c_int = NID_cmac;
|
||||
#[cfg(ossl111)]
|
||||
pub const EVP_PKEY_POLY1305: c_int = NID_poly1305;
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub const EVP_PKEY_HKDF: c_int = NID_hkdf;
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub const EVP_CIPHER_CTX_FLAG_WRAP_ALLOW: c_int = 0x1;
|
||||
|
||||
pub const EVP_CTRL_GCM_SET_IVLEN: c_int = 0x9;
|
||||
pub const EVP_CTRL_GCM_GET_TAG: c_int = 0x10;
|
||||
pub const EVP_CTRL_GCM_SET_TAG: c_int = 0x11;
|
||||
|
||||
pub unsafe fn EVP_get_digestbynid(type_: c_int) -> *const EVP_MD {
|
||||
EVP_get_digestbyname(OBJ_nid2sn(type_))
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_CTX_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD {
|
||||
EVP_MD_CTX_get0_md(ctx)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_CTX_get_size(ctx: *const EVP_MD_CTX) -> c_int {
|
||||
EVP_MD_get_size(EVP_MD_CTX_get0_md(ctx))
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_CTX_size(ctx: *const EVP_MD_CTX) -> c_int {
|
||||
EVP_MD_CTX_get_size(ctx)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_block_size(md: *const EVP_MD) -> c_int {
|
||||
EVP_MD_get_block_size(md)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_size(md: *const EVP_MD) -> c_int {
|
||||
EVP_MD_get_size(md)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_MD_type(md: *const EVP_MD) -> c_int {
|
||||
EVP_MD_get_type(md)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_key_length(cipher: *const EVP_CIPHER) -> c_int {
|
||||
EVP_CIPHER_get_key_length(cipher)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_block_size(cipher: *const EVP_CIPHER) -> c_int {
|
||||
EVP_CIPHER_get_block_size(cipher)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_iv_length(cipher: *const EVP_CIPHER) -> c_int {
|
||||
EVP_CIPHER_get_iv_length(cipher)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_nid(cipher: *const EVP_CIPHER) -> c_int {
|
||||
EVP_CIPHER_get_nid(cipher)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_CTX_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int {
|
||||
EVP_CIPHER_CTX_get_block_size(ctx)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_CTX_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int {
|
||||
EVP_CIPHER_CTX_get_key_length(ctx)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_CTX_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int {
|
||||
EVP_CIPHER_CTX_get_iv_length(ctx)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_CIPHER_CTX_num(ctx: *const EVP_CIPHER_CTX) -> c_int {
|
||||
EVP_CIPHER_CTX_get_num(ctx)
|
||||
}
|
||||
} else {
|
||||
pub unsafe fn EVP_MD_CTX_size(ctx: *const EVP_MD_CTX) -> c_int {
|
||||
EVP_MD_size(EVP_MD_CTX_md(ctx))
|
||||
}
|
||||
}
|
||||
}
|
||||
#[cfg(not(ossl300))]
|
||||
#[inline]
|
||||
pub unsafe fn EVP_DigestSignUpdate(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
data: *const c_void,
|
||||
dsize: size_t,
|
||||
) -> c_int {
|
||||
EVP_DigestUpdate(ctx, data, dsize)
|
||||
}
|
||||
#[cfg(not(ossl300))]
|
||||
#[inline]
|
||||
pub unsafe fn EVP_DigestVerifyUpdate(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
data: *const c_void,
|
||||
dsize: size_t,
|
||||
) -> c_int {
|
||||
EVP_DigestUpdate(ctx, data, dsize)
|
||||
}
|
||||
#[cfg(ossl300)]
|
||||
#[inline]
|
||||
pub unsafe fn EVP_PKEY_size(pkey: *const EVP_PKEY) -> c_int {
|
||||
EVP_PKEY_get_size(pkey)
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
#[inline]
|
||||
pub unsafe fn EVP_PKEY_id(pkey: *const EVP_PKEY) -> c_int {
|
||||
EVP_PKEY_get_id(pkey)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_PKEY_bits(pkey: *const EVP_PKEY) -> c_int {
|
||||
EVP_PKEY_get_bits(pkey)
|
||||
}
|
||||
|
||||
#[inline]
|
||||
pub unsafe fn EVP_PKEY_security_bits(pkey: *const EVP_PKEY) -> c_int {
|
||||
EVP_PKEY_get_security_bits(pkey)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub const EVP_PKEY_OP_KEYGEN: c_int = 1 << 2;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub const EVP_PKEY_OP_SIGN: c_int = 1 << 4;
|
||||
pub const EVP_PKEY_OP_VERIFY: c_int = 1 << 5;
|
||||
pub const EVP_PKEY_OP_VERIFYRECOVER: c_int = 1 << 6;
|
||||
pub const EVP_PKEY_OP_SIGNCTX: c_int = 1 << 7;
|
||||
pub const EVP_PKEY_OP_VERIFYCTX: c_int = 1 << 8;
|
||||
pub const EVP_PKEY_OP_ENCRYPT: c_int = 1 << 9;
|
||||
pub const EVP_PKEY_OP_DECRYPT: c_int = 1 << 10;
|
||||
pub const EVP_PKEY_OP_DERIVE: c_int = 1 << 11;
|
||||
} else {
|
||||
pub const EVP_PKEY_OP_SIGN: c_int = 1 << 3;
|
||||
pub const EVP_PKEY_OP_VERIFY: c_int = 1 << 4;
|
||||
pub const EVP_PKEY_OP_VERIFYRECOVER: c_int = 1 << 5;
|
||||
pub const EVP_PKEY_OP_SIGNCTX: c_int = 1 << 6;
|
||||
pub const EVP_PKEY_OP_VERIFYCTX: c_int = 1 << 7;
|
||||
pub const EVP_PKEY_OP_ENCRYPT: c_int = 1 << 8;
|
||||
pub const EVP_PKEY_OP_DECRYPT: c_int = 1 << 9;
|
||||
pub const EVP_PKEY_OP_DERIVE: c_int = 1 << 10;
|
||||
}
|
||||
}
|
||||
#[cfg(ossl340)]
|
||||
pub const EVP_PKEY_OP_SIGNMSG: c_int = 1 << 14;
|
||||
#[cfg(ossl340)]
|
||||
pub const EVP_PKEY_OP_VERIFYMSG: c_int = 1 << 15;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl340)] {
|
||||
pub const EVP_PKEY_OP_TYPE_SIG: c_int = EVP_PKEY_OP_SIGN
|
||||
| EVP_PKEY_OP_SIGNMSG
|
||||
| EVP_PKEY_OP_VERIFY
|
||||
| EVP_PKEY_OP_VERIFYMSG
|
||||
| EVP_PKEY_OP_VERIFYRECOVER
|
||||
| EVP_PKEY_OP_SIGNCTX
|
||||
| EVP_PKEY_OP_VERIFYCTX;
|
||||
} else {
|
||||
pub const EVP_PKEY_OP_TYPE_SIG: c_int = EVP_PKEY_OP_SIGN
|
||||
| EVP_PKEY_OP_VERIFY
|
||||
| EVP_PKEY_OP_VERIFYRECOVER
|
||||
| EVP_PKEY_OP_SIGNCTX
|
||||
| EVP_PKEY_OP_VERIFYCTX;
|
||||
}
|
||||
}
|
||||
|
||||
pub const EVP_PKEY_OP_TYPE_CRYPT: c_int = EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT;
|
||||
|
||||
pub const EVP_PKEY_CTRL_MD: c_int = 1;
|
||||
|
||||
pub const EVP_PKEY_CTRL_SET_MAC_KEY: c_int = 6;
|
||||
|
||||
pub const EVP_PKEY_CTRL_CIPHER: c_int = 12;
|
||||
|
||||
pub const EVP_PKEY_ALG_CTRL: c_int = 0x1000;
|
||||
|
||||
#[cfg(any(ossl111, libressl360))]
|
||||
pub const EVP_PKEY_HKDEF_MODE_EXTRACT_AND_EXPAND: c_int = 0;
|
||||
|
||||
#[cfg(any(ossl111, libressl360))]
|
||||
pub const EVP_PKEY_HKDEF_MODE_EXTRACT_ONLY: c_int = 1;
|
||||
|
||||
#[cfg(any(ossl111, libressl360))]
|
||||
pub const EVP_PKEY_HKDEF_MODE_EXPAND_ONLY: c_int = 2;
|
||||
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub const EVP_PKEY_CTRL_HKDF_MD: c_int = EVP_PKEY_ALG_CTRL + 3;
|
||||
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub const EVP_PKEY_CTRL_HKDF_SALT: c_int = EVP_PKEY_ALG_CTRL + 4;
|
||||
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub const EVP_PKEY_CTRL_HKDF_KEY: c_int = EVP_PKEY_ALG_CTRL + 5;
|
||||
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub const EVP_PKEY_CTRL_HKDF_INFO: c_int = EVP_PKEY_ALG_CTRL + 6;
|
||||
|
||||
#[cfg(any(ossl111, libressl360))]
|
||||
pub const EVP_PKEY_CTRL_HKDF_MODE: c_int = EVP_PKEY_ALG_CTRL + 7;
|
||||
|
||||
#[cfg(any(all(ossl111, not(ossl300)), libressl360))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set_hkdf_mode(ctx: *mut EVP_PKEY_CTX, mode: c_int) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
-1,
|
||||
EVP_PKEY_OP_DERIVE,
|
||||
EVP_PKEY_CTRL_HKDF_MODE,
|
||||
mode,
|
||||
std::ptr::null_mut(),
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(all(ossl110, not(ossl300)), libressl360))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set_hkdf_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
-1,
|
||||
EVP_PKEY_OP_DERIVE,
|
||||
EVP_PKEY_CTRL_HKDF_MD,
|
||||
0,
|
||||
md as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(all(ossl110, not(ossl300)), libressl360))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set1_hkdf_salt(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
salt: *const u8,
|
||||
saltlen: c_int,
|
||||
) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
-1,
|
||||
EVP_PKEY_OP_DERIVE,
|
||||
EVP_PKEY_CTRL_HKDF_SALT,
|
||||
saltlen,
|
||||
salt as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(all(ossl110, not(ossl300)), libressl360))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set1_hkdf_key(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
key: *const u8,
|
||||
keylen: c_int,
|
||||
) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
-1,
|
||||
EVP_PKEY_OP_DERIVE,
|
||||
EVP_PKEY_CTRL_HKDF_KEY,
|
||||
keylen,
|
||||
key as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(all(ossl110, not(ossl300)), libressl360))]
|
||||
pub unsafe fn EVP_PKEY_CTX_add1_hkdf_info(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
info: *const u8,
|
||||
infolen: c_int,
|
||||
) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
-1,
|
||||
EVP_PKEY_OP_DERIVE,
|
||||
EVP_PKEY_CTRL_HKDF_INFO,
|
||||
infolen,
|
||||
info as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(all(not(ossl300), not(boringssl)))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set_signature_md(cxt: *mut EVP_PKEY_CTX, md: *mut EVP_MD) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
cxt,
|
||||
-1,
|
||||
EVP_PKEY_OP_TYPE_SIG,
|
||||
EVP_PKEY_CTRL_MD,
|
||||
0,
|
||||
md as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_assign_RSA(pkey: *mut EVP_PKEY, rsa: *mut RSA) -> c_int {
|
||||
EVP_PKEY_assign(pkey, EVP_PKEY_RSA, rsa as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_assign_DSA(pkey: *mut EVP_PKEY, dsa: *mut DSA) -> c_int {
|
||||
EVP_PKEY_assign(pkey, EVP_PKEY_DSA, dsa as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_assign_DH(pkey: *mut EVP_PKEY, dh: *mut DH) -> c_int {
|
||||
EVP_PKEY_assign(pkey, EVP_PKEY_DH, dh as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_assign_EC_KEY(pkey: *mut EVP_PKEY, ec_key: *mut EC_KEY) -> c_int {
|
||||
EVP_PKEY_assign(pkey, EVP_PKEY_EC, ec_key as *mut c_void)
|
||||
}
|
||||
40
vendor/openssl-sys/src/handwritten/aes.rs
vendored
Normal file
40
vendor/openssl-sys/src/handwritten/aes.rs
vendored
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[repr(C)]
|
||||
pub struct AES_KEY {
|
||||
// There is some business with AES_LONG which is there to ensure the values here are 32 bits
|
||||
rd_key: [u32; 4 * (AES_MAXNR as usize + 1)],
|
||||
rounds: c_int,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn AES_set_encrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
|
||||
pub fn AES_set_decrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub fn AES_ige_encrypt(
|
||||
in_: *const c_uchar,
|
||||
out: *mut c_uchar,
|
||||
length: size_t,
|
||||
key: *const AES_KEY,
|
||||
ivec: *mut c_uchar,
|
||||
enc: c_int,
|
||||
);
|
||||
|
||||
pub fn AES_wrap_key(
|
||||
key: *mut AES_KEY,
|
||||
iv: *const c_uchar,
|
||||
out: *mut c_uchar,
|
||||
in_: *const c_uchar,
|
||||
inlen: c_uint,
|
||||
) -> c_int;
|
||||
|
||||
pub fn AES_unwrap_key(
|
||||
key: *mut AES_KEY,
|
||||
iv: *const c_uchar,
|
||||
out: *mut c_uchar,
|
||||
in_: *const c_uchar,
|
||||
inlen: c_uint,
|
||||
) -> c_int;
|
||||
}
|
||||
115
vendor/openssl-sys/src/handwritten/asn1.rs
vendored
Normal file
115
vendor/openssl-sys/src/handwritten/asn1.rs
vendored
Normal file
|
|
@ -0,0 +1,115 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[repr(C)]
|
||||
pub struct ASN1_ENCODING {
|
||||
pub enc: *mut c_uchar,
|
||||
pub len: c_long,
|
||||
pub modified: c_int,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn ASN1_OBJECT_free(x: *mut ASN1_OBJECT);
|
||||
pub fn OBJ_dup(x: *const ASN1_OBJECT) -> *mut ASN1_OBJECT;
|
||||
}
|
||||
|
||||
stack!(stack_st_ASN1_OBJECT);
|
||||
|
||||
#[repr(C)]
|
||||
pub struct ASN1_TYPE {
|
||||
pub type_: c_int,
|
||||
pub value: ASN1_TYPE_value,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub union ASN1_TYPE_value {
|
||||
pub ptr: *mut c_char,
|
||||
pub boolean: ASN1_BOOLEAN,
|
||||
pub asn1_string: *mut ASN1_STRING,
|
||||
pub object: *mut ASN1_OBJECT,
|
||||
pub integer: *mut ASN1_INTEGER,
|
||||
pub enumerated: *mut ASN1_ENUMERATED,
|
||||
pub bit_string: *mut ASN1_BIT_STRING,
|
||||
pub octet_string: *mut ASN1_OCTET_STRING,
|
||||
pub printablestring: *mut ASN1_PRINTABLESTRING,
|
||||
pub t61string: *mut ASN1_T61STRING,
|
||||
pub ia5string: *mut ASN1_IA5STRING,
|
||||
pub generalstring: *mut ASN1_GENERALSTRING,
|
||||
pub bmpstring: *mut ASN1_BMPSTRING,
|
||||
pub universalstring: *mut ASN1_UNIVERSALSTRING,
|
||||
pub utctime: *mut ASN1_UTCTIME,
|
||||
pub generalizedtime: *mut ASN1_GENERALIZEDTIME,
|
||||
pub visiblestring: *mut ASN1_VISIBLESTRING,
|
||||
pub utf8string: *mut ASN1_UTF8STRING,
|
||||
pub set: *mut ASN1_STRING,
|
||||
pub sequence: *mut ASN1_STRING,
|
||||
pub asn1_value: *mut ASN1_VALUE,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn ASN1_STRING_type_new(ty: c_int) -> *mut ASN1_STRING;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn ASN1_STRING_get0_data(x: *const ASN1_STRING) -> *const c_uchar;
|
||||
#[cfg(any(all(ossl101, not(ossl110)), libressl))]
|
||||
pub fn ASN1_STRING_data(x: *mut ASN1_STRING) -> *mut c_uchar;
|
||||
pub fn ASN1_STRING_new() -> *mut ASN1_STRING;
|
||||
pub fn ASN1_OCTET_STRING_new() -> *mut ASN1_OCTET_STRING;
|
||||
pub fn ASN1_STRING_free(x: *mut ASN1_STRING);
|
||||
pub fn ASN1_STRING_length(x: *const ASN1_STRING) -> c_int;
|
||||
pub fn ASN1_STRING_set(x: *mut ASN1_STRING, data: *const c_void, len_in: c_int) -> c_int;
|
||||
pub fn ASN1_OCTET_STRING_set(
|
||||
x: *mut ASN1_OCTET_STRING,
|
||||
data: *const c_uchar,
|
||||
len_in: c_int,
|
||||
) -> c_int;
|
||||
|
||||
pub fn ASN1_BIT_STRING_free(x: *mut ASN1_BIT_STRING);
|
||||
pub fn ASN1_OCTET_STRING_free(x: *mut ASN1_OCTET_STRING);
|
||||
|
||||
pub fn ASN1_GENERALIZEDTIME_free(tm: *mut ASN1_GENERALIZEDTIME);
|
||||
pub fn ASN1_GENERALIZEDTIME_print(b: *mut BIO, tm: *const ASN1_GENERALIZEDTIME) -> c_int;
|
||||
pub fn ASN1_TIME_new() -> *mut ASN1_TIME;
|
||||
#[cfg(ossl102)]
|
||||
pub fn ASN1_TIME_diff(
|
||||
pday: *mut c_int,
|
||||
psec: *mut c_int,
|
||||
from: *const ASN1_TIME,
|
||||
to: *const ASN1_TIME,
|
||||
) -> c_int;
|
||||
pub fn ASN1_TIME_free(tm: *mut ASN1_TIME);
|
||||
pub fn ASN1_TIME_print(b: *mut BIO, tm: *const ASN1_TIME) -> c_int;
|
||||
pub fn ASN1_TIME_set(from: *mut ASN1_TIME, to: time_t) -> *mut ASN1_TIME;
|
||||
|
||||
pub fn ASN1_INTEGER_free(x: *mut ASN1_INTEGER);
|
||||
pub fn ASN1_INTEGER_dup(a: *const ASN1_INTEGER) -> *mut ASN1_INTEGER;
|
||||
pub fn ASN1_INTEGER_get(dest: *const ASN1_INTEGER) -> c_long;
|
||||
pub fn ASN1_INTEGER_set(dest: *mut ASN1_INTEGER, value: c_long) -> c_int;
|
||||
pub fn ASN1_INTEGER_cmp(a: *const ASN1_INTEGER, b: *const ASN1_INTEGER) -> c_int;
|
||||
pub fn BN_to_ASN1_INTEGER(bn: *const BIGNUM, ai: *mut ASN1_INTEGER) -> *mut ASN1_INTEGER;
|
||||
pub fn ASN1_INTEGER_to_BN(ai: *const ASN1_INTEGER, bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
|
||||
pub fn ASN1_TIME_set_string(s: *mut ASN1_TIME, str: *const c_char) -> c_int;
|
||||
#[cfg(ossl111)]
|
||||
pub fn ASN1_TIME_set_string_X509(s: *mut ASN1_TIME, str: *const c_char) -> c_int;
|
||||
|
||||
pub fn ASN1_ENUMERATED_free(a: *mut ASN1_ENUMERATED);
|
||||
#[cfg(ossl110)]
|
||||
pub fn ASN1_ENUMERATED_get_int64(pr: *mut i64, a: *const ASN1_ENUMERATED) -> c_int;
|
||||
|
||||
pub fn ASN1_TYPE_new() -> *mut ASN1_TYPE;
|
||||
pub fn ASN1_TYPE_set(a: *mut ASN1_TYPE, type_: c_int, value: *mut c_void);
|
||||
pub fn ASN1_TYPE_free(x: *mut ASN1_TYPE);
|
||||
pub fn d2i_ASN1_TYPE(
|
||||
k: *mut *mut ASN1_TYPE,
|
||||
buf: *mut *const u8,
|
||||
len: c_long,
|
||||
) -> *mut ASN1_TYPE;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn ASN1_STRING_to_UTF8(out: *mut *mut c_uchar, s: #[const_ptr_if(any(ossl110, libressl280))] ASN1_STRING) -> c_int;
|
||||
pub fn ASN1_STRING_type(x: #[const_ptr_if(any(ossl110, libressl280))] ASN1_STRING) -> c_int;
|
||||
pub fn ASN1_generate_v3(str: #[const_ptr_if(any(ossl110, libressl280))] c_char, cnf: *mut X509V3_CTX) -> *mut ASN1_TYPE;
|
||||
pub fn i2d_ASN1_TYPE(a: #[const_ptr_if(ossl300)] ASN1_TYPE, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
165
vendor/openssl-sys/src/handwritten/bio.rs
vendored
Normal file
165
vendor/openssl-sys/src/handwritten/bio.rs
vendored
Normal file
|
|
@ -0,0 +1,165 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn BIO_set_flags(b: *mut BIO, flags: c_int);
|
||||
pub fn BIO_clear_flags(b: *mut BIO, flags: c_int);
|
||||
}
|
||||
|
||||
pub type bio_info_cb =
|
||||
Option<unsafe extern "C" fn(*mut BIO, c_int, *const c_char, c_int, c_long, c_long)>;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl280))] {
|
||||
pub enum BIO_METHOD {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct BIO_METHOD {
|
||||
pub type_: c_int,
|
||||
pub name: *const c_char,
|
||||
pub bwrite: Option<unsafe extern "C" fn(*mut BIO, *const c_char, c_int) -> c_int>,
|
||||
pub bread: Option<unsafe extern "C" fn(*mut BIO, *mut c_char, c_int) -> c_int>,
|
||||
pub bputs: Option<unsafe extern "C" fn(*mut BIO, *const c_char) -> c_int>,
|
||||
pub bgets: Option<unsafe extern "C" fn(*mut BIO, *mut c_char, c_int) -> c_int>,
|
||||
pub ctrl: Option<unsafe extern "C" fn(*mut BIO, c_int, c_long, *mut c_void) -> c_long>,
|
||||
pub create: Option<unsafe extern "C" fn(*mut BIO) -> c_int>,
|
||||
pub destroy: Option<unsafe extern "C" fn(*mut BIO) -> c_int>,
|
||||
pub callback_ctrl: Option<unsafe extern "C" fn(*mut BIO, c_int, bio_info_cb) -> c_long>,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn BIO_s_file() -> #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD;
|
||||
pub fn BIO_new(type_: #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD) -> *mut BIO;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_STDIO"))]
|
||||
pub fn BIO_new_fp(stream: *mut FILE, close_flag: c_int) -> *mut BIO;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_set_data(a: *mut BIO, data: *mut c_void);
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_get_data(a: *mut BIO) -> *mut c_void;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_set_init(a: *mut BIO, init: c_int);
|
||||
pub fn BIO_write(b: *mut BIO, buf: *const c_void, len: c_int) -> c_int;
|
||||
pub fn BIO_read(b: *mut BIO, buf: *mut c_void, len: c_int) -> c_int;
|
||||
pub fn BIO_ctrl(b: *mut BIO, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
|
||||
pub fn BIO_free_all(b: *mut BIO);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn BIO_s_mem() -> #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD;
|
||||
pub fn BIO_new_mem_buf(buf: #[const_ptr_if(any(ossl102, libressl280))] c_void, len: c_int) -> *mut BIO;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_SOCK"))]
|
||||
pub fn BIO_new_socket(sock: c_int, close_flag: c_int) -> *mut BIO;
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_new(type_: c_int, name: *const c_char) -> *mut BIO_METHOD;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn BIO_meth_free(biom: *mut BIO_METHOD);
|
||||
}
|
||||
|
||||
#[allow(clashing_extern_declarations)]
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_write"]
|
||||
pub fn BIO_meth_set_write__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
write: Option<unsafe extern "C" fn(*mut BIO, *const c_char, c_int) -> c_int>,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_read"]
|
||||
pub fn BIO_meth_set_read__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: Option<unsafe extern "C" fn(*mut BIO, *mut c_char, c_int) -> c_int>,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_puts"]
|
||||
pub fn BIO_meth_set_puts__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: Option<unsafe extern "C" fn(*mut BIO, *const c_char) -> c_int>,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_ctrl"]
|
||||
pub fn BIO_meth_set_ctrl__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
read: Option<unsafe extern "C" fn(*mut BIO, c_int, c_long, *mut c_void) -> c_long>,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_create"]
|
||||
pub fn BIO_meth_set_create__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
create: Option<unsafe extern "C" fn(*mut BIO) -> c_int>,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
#[link_name = "BIO_meth_set_destroy"]
|
||||
pub fn BIO_meth_set_destroy__fixed_rust(
|
||||
biom: *mut BIO_METHOD,
|
||||
destroy: Option<unsafe extern "C" fn(*mut BIO) -> c_int>,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
#[cfg(ossl320)]
|
||||
extern "C" {
|
||||
pub fn BIO_meth_set_sendmmsg(
|
||||
biom: *mut BIO_METHOD,
|
||||
f: Option<
|
||||
unsafe extern "C" fn(
|
||||
arg1: *mut BIO,
|
||||
arg2: *mut BIO_MSG,
|
||||
arg3: usize,
|
||||
arg4: usize,
|
||||
arg5: u64,
|
||||
arg6: *mut usize,
|
||||
) -> c_int,
|
||||
>,
|
||||
) -> c_int;
|
||||
pub fn BIO_meth_set_recvmmsg(
|
||||
biom: *mut BIO_METHOD,
|
||||
f: Option<
|
||||
unsafe extern "C" fn(
|
||||
arg1: *mut BIO,
|
||||
arg2: *mut BIO_MSG,
|
||||
arg3: usize,
|
||||
arg4: usize,
|
||||
arg5: u64,
|
||||
arg6: *mut usize,
|
||||
) -> c_int,
|
||||
>,
|
||||
) -> c_int;
|
||||
pub fn BIO_new_bio_dgram_pair(
|
||||
bio1: *mut *mut BIO,
|
||||
writebuf1: usize,
|
||||
bio2: *mut *mut BIO,
|
||||
writebuf2: usize,
|
||||
) -> c_int;
|
||||
pub fn BIO_s_dgram_pair() -> *const BIO_METHOD;
|
||||
pub fn BIO_s_datagram() -> *const BIO_METHOD;
|
||||
pub fn BIO_get_rpoll_descriptor(b: *mut BIO, desc: *mut BIO_POLL_DESCRIPTOR) -> c_int;
|
||||
pub fn BIO_get_wpoll_descriptor(b: *mut BIO, desc: *mut BIO_POLL_DESCRIPTOR) -> c_int;
|
||||
pub fn BIO_sendmmsg(
|
||||
b: *mut BIO,
|
||||
msg: *mut BIO_MSG,
|
||||
stride: usize,
|
||||
num_msg: usize,
|
||||
flags: u64,
|
||||
msgs_processed: *mut usize,
|
||||
) -> c_int;
|
||||
pub fn BIO_recvmmsg(
|
||||
b: *mut BIO,
|
||||
msg: *mut BIO_MSG,
|
||||
stride: usize,
|
||||
num_msg: usize,
|
||||
flags: u64,
|
||||
msgs_processed: *mut usize,
|
||||
) -> c_int;
|
||||
pub fn BIO_err_is_non_fatal(errcode: c_uint) -> c_int;
|
||||
}
|
||||
176
vendor/openssl-sys/src/handwritten/bn.rs
vendored
Normal file
176
vendor/openssl-sys/src/handwritten/bn.rs
vendored
Normal file
|
|
@ -0,0 +1,176 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn BN_CTX_new() -> *mut BN_CTX;
|
||||
#[cfg(ossl110)]
|
||||
pub fn BN_CTX_secure_new() -> *mut BN_CTX;
|
||||
pub fn BN_CTX_free(ctx: *mut BN_CTX);
|
||||
pub fn BN_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub fn BN_pseudo_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
|
||||
pub fn BN_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub fn BN_pseudo_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
|
||||
pub fn BN_new() -> *mut BIGNUM;
|
||||
#[cfg(ossl110)]
|
||||
pub fn BN_secure_new() -> *mut BIGNUM;
|
||||
#[cfg(ossl110)]
|
||||
pub fn BN_set_flags(b: *mut BIGNUM, n: c_int);
|
||||
#[cfg(ossl110)]
|
||||
pub fn BN_get_flags(b: *const BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_num_bits(bn: *const BIGNUM) -> c_int;
|
||||
pub fn BN_clear_free(bn: *mut BIGNUM);
|
||||
pub fn BN_bin2bn(s: *const u8, size: c_int, ret: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_bn2bin(a: *const BIGNUM, to: *mut u8) -> c_int;
|
||||
#[cfg(any(ossl110, libressl340))]
|
||||
pub fn BN_bn2binpad(a: *const BIGNUM, to: *mut u8, tolen: c_int) -> c_int;
|
||||
pub fn BN_sub(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
|
||||
pub fn BN_add(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
|
||||
pub fn BN_mul(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
|
||||
pub fn BN_sqr(r: *mut BIGNUM, a: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
|
||||
pub fn BN_set_negative(bn: *mut BIGNUM, n: c_int);
|
||||
#[cfg(any(ossl110, libressl350))]
|
||||
pub fn BN_is_negative(b: *const BIGNUM) -> c_int;
|
||||
#[cfg(any(ossl110, libressl350))]
|
||||
pub fn BN_is_odd(b: *const BIGNUM) -> c_int;
|
||||
|
||||
pub fn BN_div(
|
||||
dv: *mut BIGNUM,
|
||||
rem: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_nnmod(
|
||||
rem: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_mod_add(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_mod_sub(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_mod_mul(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_mod_sqr(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
pub fn BN_mod_sqrt(
|
||||
ret: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
p: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut BIGNUM;
|
||||
|
||||
pub fn BN_mod_word(r: *const BIGNUM, w: BN_ULONG) -> BN_ULONG;
|
||||
pub fn BN_div_word(r: *mut BIGNUM, w: BN_ULONG) -> BN_ULONG;
|
||||
pub fn BN_mul_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
|
||||
pub fn BN_add_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
|
||||
pub fn BN_sub_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
|
||||
pub fn BN_set_word(bn: *mut BIGNUM, n: BN_ULONG) -> c_int;
|
||||
|
||||
pub fn BN_cmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
|
||||
pub fn BN_free(bn: *mut BIGNUM);
|
||||
pub fn BN_is_bit_set(a: *const BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_lshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_lshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
|
||||
pub fn BN_exp(r: *mut BIGNUM, a: *const BIGNUM, p: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
|
||||
|
||||
pub fn BN_mod_exp(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
p: *const BIGNUM,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn BN_mask_bits(a: *mut BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_rshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_rshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
|
||||
pub fn BN_bn2hex(a: *const BIGNUM) -> *mut c_char;
|
||||
pub fn BN_bn2dec(a: *const BIGNUM) -> *mut c_char;
|
||||
pub fn BN_hex2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
|
||||
pub fn BN_dec2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
|
||||
pub fn BN_gcd(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
|
||||
pub fn BN_mod_inverse(
|
||||
r: *mut BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
n: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut BIGNUM;
|
||||
pub fn BN_clear(bn: *mut BIGNUM);
|
||||
pub fn BN_dup(n: *const BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_ucmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
|
||||
pub fn BN_set_bit(a: *mut BIGNUM, n: c_int) -> c_int;
|
||||
pub fn BN_clear_bit(a: *mut BIGNUM, n: c_int) -> c_int;
|
||||
|
||||
pub fn BN_generate_prime_ex(
|
||||
r: *mut BIGNUM,
|
||||
bits: c_int,
|
||||
safe: c_int,
|
||||
add: *const BIGNUM,
|
||||
rem: *const BIGNUM,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub fn BN_is_prime_ex(
|
||||
p: *const BIGNUM,
|
||||
checks: c_int,
|
||||
ctx: *mut BN_CTX,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub fn BN_is_prime_fasttest_ex(
|
||||
p: *const BIGNUM,
|
||||
checks: c_int,
|
||||
ctx: *mut BN_CTX,
|
||||
do_trial_division: c_int,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
extern "C" {
|
||||
pub fn BN_get_rfc2409_prime_768(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc2409_prime_1024(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_1536(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_2048(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_3072(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_4096(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_6144(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn BN_get_rfc3526_prime_8192(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn get_rfc2409_prime_768(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc2409_prime_1024(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_1536(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_2048(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_3072(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_4096(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_6144(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
pub fn get_rfc3526_prime_8192(bn: *mut BIGNUM) -> *mut BIGNUM;
|
||||
}
|
||||
}
|
||||
}
|
||||
18
vendor/openssl-sys/src/handwritten/cmac.rs
vendored
Normal file
18
vendor/openssl-sys/src/handwritten/cmac.rs
vendored
Normal file
|
|
@ -0,0 +1,18 @@
|
|||
use libc::*;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn CMAC_CTX_new() -> *mut CMAC_CTX;
|
||||
pub fn CMAC_CTX_free(ctx: *mut CMAC_CTX);
|
||||
pub fn CMAC_Init(
|
||||
ctx: *mut CMAC_CTX,
|
||||
key: *const c_void,
|
||||
len: size_t,
|
||||
cipher: *const EVP_CIPHER,
|
||||
impl_: *mut ENGINE,
|
||||
) -> c_int;
|
||||
pub fn CMAC_Update(ctx: *mut CMAC_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn CMAC_Final(ctx: *mut CMAC_CTX, out: *mut c_uchar, len: *mut size_t) -> c_int;
|
||||
pub fn CMAC_CTX_copy(dst: *mut CMAC_CTX, src: *const CMAC_CTX) -> c_int;
|
||||
}
|
||||
65
vendor/openssl-sys/src/handwritten/cms.rs
vendored
Normal file
65
vendor/openssl-sys/src/handwritten/cms.rs
vendored
Normal file
|
|
@ -0,0 +1,65 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
pub enum CMS_ContentInfo {}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(ossl101)]
|
||||
pub fn CMS_ContentInfo_free(cms: *mut CMS_ContentInfo);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
#[cfg(ossl101)]
|
||||
pub fn i2d_CMS_ContentInfo(a: #[const_ptr_if(ossl300)] CMS_ContentInfo, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(ossl101)]
|
||||
pub fn d2i_CMS_ContentInfo(
|
||||
a: *mut *mut CMS_ContentInfo,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut CMS_ContentInfo;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn SMIME_read_CMS(bio: *mut BIO, bcont: *mut *mut BIO) -> *mut CMS_ContentInfo;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn CMS_sign(
|
||||
signcert: *mut X509,
|
||||
pkey: *mut EVP_PKEY,
|
||||
certs: *mut stack_st_X509,
|
||||
data: *mut BIO,
|
||||
flags: c_uint,
|
||||
) -> *mut CMS_ContentInfo;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn CMS_verify(
|
||||
cms: *mut CMS_ContentInfo,
|
||||
certs: *mut stack_st_X509,
|
||||
store: *mut X509_STORE,
|
||||
detached_data: *mut BIO,
|
||||
out: *mut BIO,
|
||||
flags: c_uint,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn CMS_encrypt(
|
||||
certs: *mut stack_st_X509,
|
||||
data: *mut BIO,
|
||||
cipher: *const EVP_CIPHER,
|
||||
flags: c_uint,
|
||||
) -> *mut CMS_ContentInfo;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn CMS_decrypt(
|
||||
cms: *mut CMS_ContentInfo,
|
||||
pkey: *mut EVP_PKEY,
|
||||
cert: *mut X509,
|
||||
dcont: *mut BIO,
|
||||
out: *mut BIO,
|
||||
flags: c_uint,
|
||||
) -> c_int;
|
||||
}
|
||||
13
vendor/openssl-sys/src/handwritten/conf.rs
vendored
Normal file
13
vendor/openssl-sys/src/handwritten/conf.rs
vendored
Normal file
|
|
@ -0,0 +1,13 @@
|
|||
use super::super::*;
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn NCONF_new(meth: #[const_ptr_if(libressl400)] CONF_METHOD) -> *mut CONF;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(not(libressl400))]
|
||||
pub fn NCONF_default() -> *mut CONF_METHOD;
|
||||
pub fn NCONF_free(conf: *mut CONF);
|
||||
}
|
||||
85
vendor/openssl-sys/src/handwritten/crypto.rs
vendored
Normal file
85
vendor/openssl-sys/src/handwritten/crypto.rs
vendored
Normal file
|
|
@ -0,0 +1,85 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
stack!(stack_st_void);
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl271))] {
|
||||
extern "C" {
|
||||
pub fn OpenSSL_version_num() -> c_ulong;
|
||||
pub fn OpenSSL_version(key: c_int) -> *const c_char;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn SSLeay() -> c_ulong;
|
||||
pub fn SSLeay_version(key: c_int) -> *const c_char;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl))]
|
||||
pub fn CRYPTO_get_ex_new_index(
|
||||
class_index: c_int,
|
||||
argl: c_long,
|
||||
argp: *mut c_void,
|
||||
new_func: Option<CRYPTO_EX_new>,
|
||||
dup_func: Option<CRYPTO_EX_dup>,
|
||||
free_func: Option<CRYPTO_EX_free>,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn CRYPTO_num_locks() -> c_int;
|
||||
}
|
||||
|
||||
#[allow(clashing_extern_declarations)]
|
||||
extern "C" {
|
||||
#[cfg(not(ossl110))]
|
||||
#[link_name = "CRYPTO_set_locking_callback"]
|
||||
pub fn CRYPTO_set_locking_callback__fixed_rust(
|
||||
func: Option<unsafe extern "C" fn(mode: c_int, n: c_int, file: *const c_char, line: c_int)>,
|
||||
);
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
#[link_name = "CRYPTO_set_id_callback"]
|
||||
pub fn CRYPTO_set_id_callback__fixed_rust(func: Option<unsafe extern "C" fn() -> c_ulong>);
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn CRYPTO_add_lock(
|
||||
pointer: *mut c_int,
|
||||
amount: c_int,
|
||||
type_: c_int,
|
||||
file: *const c_char,
|
||||
line: c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl390))] {
|
||||
extern "C" {
|
||||
pub fn CRYPTO_malloc(num: size_t, file: *const c_char, line: c_int) -> *mut c_void;
|
||||
pub fn CRYPTO_free(buf: *mut c_void, file: *const c_char, line: c_int);
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn CRYPTO_malloc(num: c_int, file: *const c_char, line: c_int) -> *mut c_void;
|
||||
pub fn CRYPTO_free(buf: *mut c_void);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(all(ossl101, not(ossl300)))]
|
||||
pub fn FIPS_mode() -> c_int;
|
||||
#[cfg(all(ossl101, not(ossl300)))]
|
||||
pub fn FIPS_mode_set(onoff: c_int) -> c_int;
|
||||
|
||||
pub fn CRYPTO_memcmp(a: *const c_void, b: *const c_void, len: size_t) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_LIB_CTX_new() -> *mut OSSL_LIB_CTX;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_LIB_CTX_free(libcts: *mut OSSL_LIB_CTX);
|
||||
}
|
||||
52
vendor/openssl-sys/src/handwritten/dh.rs
vendored
Normal file
52
vendor/openssl-sys/src/handwritten/dh.rs
vendored
Normal file
|
|
@ -0,0 +1,52 @@
|
|||
use super::super::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn DH_new() -> *mut DH;
|
||||
pub fn DH_free(dh: *mut DH);
|
||||
pub fn DH_check(dh: *const DH, codes: *mut c_int) -> c_int;
|
||||
|
||||
#[cfg(not(libressl382))]
|
||||
pub fn DH_generate_parameters(
|
||||
prime_len: c_int,
|
||||
generator: c_int,
|
||||
callback: Option<extern "C" fn(c_int, c_int, *mut c_void)>,
|
||||
cb_arg: *mut c_void,
|
||||
) -> *mut DH;
|
||||
|
||||
pub fn DH_generate_parameters_ex(
|
||||
dh: *mut DH,
|
||||
prime_len: c_int,
|
||||
generator: c_int,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
|
||||
pub fn DH_generate_key(dh: *mut DH) -> c_int;
|
||||
pub fn DH_compute_key(key: *mut c_uchar, pub_key: *const BIGNUM, dh: *mut DH) -> c_int;
|
||||
pub fn DH_size(dh: *const DH) -> c_int;
|
||||
|
||||
pub fn d2i_DHparams(k: *mut *mut DH, pp: *mut *const c_uchar, length: c_long) -> *mut DH;
|
||||
pub fn i2d_DHparams(dh: *const DH, pp: *mut *mut c_uchar) -> c_int;
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub fn DH_get_1024_160() -> *mut DH;
|
||||
#[cfg(ossl102)]
|
||||
pub fn DH_get_2048_224() -> *mut DH;
|
||||
#[cfg(ossl102)]
|
||||
pub fn DH_get_2048_256() -> *mut DH;
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn DH_set0_pqg(dh: *mut DH, p: *mut BIGNUM, q: *mut BIGNUM, g: *mut BIGNUM) -> c_int;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn DH_get0_pqg(
|
||||
dh: *const DH,
|
||||
p: *mut *const BIGNUM,
|
||||
q: *mut *const BIGNUM,
|
||||
g: *mut *const BIGNUM,
|
||||
);
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn DH_set0_key(dh: *mut DH, pub_key: *mut BIGNUM, priv_key: *mut BIGNUM) -> c_int;
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn DH_get0_key(dh: *const DH, pub_key: *mut *const BIGNUM, priv_key: *mut *const BIGNUM);
|
||||
}
|
||||
85
vendor/openssl-sys/src/handwritten/dsa.rs
vendored
Normal file
85
vendor/openssl-sys/src/handwritten/dsa.rs
vendored
Normal file
|
|
@ -0,0 +1,85 @@
|
|||
use libc::*;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl280))] {
|
||||
pub enum DSA_SIG {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct DSA_SIG {
|
||||
pub r: *mut BIGNUM,
|
||||
pub s: *mut BIGNUM,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn DSA_new() -> *mut DSA;
|
||||
pub fn DSA_free(dsa: *mut DSA);
|
||||
pub fn DSA_up_ref(dsa: *mut DSA) -> c_int;
|
||||
pub fn DSA_size(dsa: *const DSA) -> c_int;
|
||||
pub fn DSA_sign(
|
||||
dummy: c_int,
|
||||
dgst: *const c_uchar,
|
||||
len: c_int,
|
||||
sigret: *mut c_uchar,
|
||||
siglen: *mut c_uint,
|
||||
dsa: *mut DSA,
|
||||
) -> c_int;
|
||||
pub fn DSA_verify(
|
||||
dummy: c_int,
|
||||
dgst: *const c_uchar,
|
||||
len: c_int,
|
||||
sigbuf: *const c_uchar,
|
||||
siglen: c_int,
|
||||
dsa: *mut DSA,
|
||||
) -> c_int;
|
||||
|
||||
pub fn d2i_DSAPublicKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long) -> *mut DSA;
|
||||
pub fn d2i_DSAPrivateKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long)
|
||||
-> *mut DSA;
|
||||
|
||||
pub fn DSA_generate_parameters_ex(
|
||||
dsa: *mut DSA,
|
||||
bits: c_int,
|
||||
seed: *const c_uchar,
|
||||
seed_len: c_int,
|
||||
counter_ref: *mut c_int,
|
||||
h_ret: *mut c_ulong,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
|
||||
pub fn DSA_generate_key(dsa: *mut DSA) -> c_int;
|
||||
pub fn i2d_DSAPublicKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
|
||||
pub fn i2d_DSAPrivateKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_get0_pqg(
|
||||
d: *const DSA,
|
||||
p: *mut *const BIGNUM,
|
||||
q: *mut *const BIGNUM,
|
||||
q: *mut *const BIGNUM,
|
||||
);
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_set0_pqg(d: *mut DSA, p: *mut BIGNUM, q: *mut BIGNUM, q: *mut BIGNUM) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_get0_key(d: *const DSA, pub_key: *mut *const BIGNUM, priv_key: *mut *const BIGNUM);
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_set0_key(d: *mut DSA, pub_key: *mut BIGNUM, priv_key: *mut BIGNUM) -> c_int;
|
||||
pub fn d2i_DSA_SIG(
|
||||
sig: *mut *mut DSA_SIG,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut DSA_SIG;
|
||||
pub fn i2d_DSA_SIG(a: *const DSA_SIG, pp: *mut *mut c_uchar) -> c_int;
|
||||
|
||||
pub fn DSA_SIG_new() -> *mut DSA_SIG;
|
||||
pub fn DSA_SIG_free(sig: *mut DSA_SIG);
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_SIG_get0(sig: *const DSA_SIG, pr: *mut *const BIGNUM, ps: *mut *const BIGNUM);
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn DSA_SIG_set0(sig: *mut DSA_SIG, pr: *mut BIGNUM, ps: *mut BIGNUM) -> c_int;
|
||||
}
|
||||
271
vendor/openssl-sys/src/handwritten/ec.rs
vendored
Normal file
271
vendor/openssl-sys/src/handwritten/ec.rs
vendored
Normal file
|
|
@ -0,0 +1,271 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Copy, Clone)]
|
||||
pub enum point_conversion_form_t {
|
||||
POINT_CONVERSION_COMPRESSED = 2,
|
||||
POINT_CONVERSION_UNCOMPRESSED = 4,
|
||||
POINT_CONVERSION_HYBRID = 6,
|
||||
}
|
||||
|
||||
pub enum EC_METHOD {}
|
||||
pub enum EC_GROUP {}
|
||||
pub enum EC_POINT {}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
|
||||
pub fn EC_GF2m_simple_method() -> *const EC_METHOD;
|
||||
|
||||
pub fn EC_GROUP_new(meth: *const EC_METHOD) -> *mut EC_GROUP;
|
||||
|
||||
pub fn EC_GROUP_free(group: *mut EC_GROUP);
|
||||
|
||||
pub fn EC_GROUP_get_order(
|
||||
group: *const EC_GROUP,
|
||||
order: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_get_cofactor(
|
||||
group: *const EC_GROUP,
|
||||
cofactor: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_get0_generator(group: *const EC_GROUP) -> *const EC_POINT;
|
||||
|
||||
pub fn EC_GROUP_set_generator(
|
||||
group: *mut EC_GROUP,
|
||||
generator: *const EC_POINT,
|
||||
order: *const BIGNUM,
|
||||
cofactor: *const BIGNUM,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_get_curve_name(group: *const EC_GROUP) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_set_asn1_flag(key: *mut EC_GROUP, flag: c_int);
|
||||
|
||||
pub fn EC_GROUP_get_asn1_flag(group: *const EC_GROUP) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_get_curve_GFp(
|
||||
group: *const EC_GROUP,
|
||||
p: *mut BIGNUM,
|
||||
a: *mut BIGNUM,
|
||||
b: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
|
||||
pub fn EC_GROUP_get_curve_GF2m(
|
||||
group: *const EC_GROUP,
|
||||
p: *mut BIGNUM,
|
||||
a: *mut BIGNUM,
|
||||
b: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_get_degree(group: *const EC_GROUP) -> c_int;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub fn EC_GROUP_order_bits(group: *const EC_GROUP) -> c_int;
|
||||
|
||||
pub fn EC_GROUP_new_curve_GFp(
|
||||
p: *const BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut EC_GROUP;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
|
||||
pub fn EC_GROUP_new_curve_GF2m(
|
||||
p: *const BIGNUM,
|
||||
a: *const BIGNUM,
|
||||
b: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut EC_GROUP;
|
||||
|
||||
pub fn EC_GROUP_new_by_curve_name(nid: c_int) -> *mut EC_GROUP;
|
||||
|
||||
pub fn EC_POINT_is_at_infinity(group: *const EC_GROUP, point: *const EC_POINT) -> c_int;
|
||||
|
||||
pub fn EC_POINT_is_on_curve(
|
||||
group: *const EC_GROUP,
|
||||
point: *const EC_POINT,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_new(group: *const EC_GROUP) -> *mut EC_POINT;
|
||||
|
||||
pub fn EC_POINT_free(point: *mut EC_POINT);
|
||||
|
||||
pub fn EC_POINT_dup(p: *const EC_POINT, group: *const EC_GROUP) -> *mut EC_POINT;
|
||||
|
||||
#[cfg(any(ossl111, boringssl, libressl350))]
|
||||
pub fn EC_POINT_get_affine_coordinates(
|
||||
group: *const EC_GROUP,
|
||||
p: *const EC_POINT,
|
||||
x: *mut BIGNUM,
|
||||
y: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_get_affine_coordinates_GFp(
|
||||
group: *const EC_GROUP,
|
||||
p: *const EC_POINT,
|
||||
x: *mut BIGNUM,
|
||||
y: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_set_affine_coordinates_GFp(
|
||||
group: *const EC_GROUP,
|
||||
p: *mut EC_POINT,
|
||||
x: *const BIGNUM,
|
||||
y: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
|
||||
pub fn EC_POINT_get_affine_coordinates_GF2m(
|
||||
group: *const EC_GROUP,
|
||||
p: *const EC_POINT,
|
||||
x: *mut BIGNUM,
|
||||
y: *mut BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_point2oct(
|
||||
group: *const EC_GROUP,
|
||||
p: *const EC_POINT,
|
||||
form: point_conversion_form_t,
|
||||
buf: *mut c_uchar,
|
||||
len: size_t,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> size_t;
|
||||
|
||||
pub fn EC_POINT_oct2point(
|
||||
group: *const EC_GROUP,
|
||||
p: *mut EC_POINT,
|
||||
buf: *const c_uchar,
|
||||
len: size_t,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_point2hex(
|
||||
group: *const EC_GROUP,
|
||||
p: *const EC_POINT,
|
||||
form: point_conversion_form_t,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut c_char;
|
||||
|
||||
pub fn EC_POINT_hex2point(
|
||||
group: *const EC_GROUP,
|
||||
s: *const c_char,
|
||||
p: *mut EC_POINT,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> *mut EC_POINT;
|
||||
|
||||
pub fn EC_POINT_add(
|
||||
group: *const EC_GROUP,
|
||||
r: *mut EC_POINT,
|
||||
a: *const EC_POINT,
|
||||
b: *const EC_POINT,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_invert(group: *const EC_GROUP, r: *mut EC_POINT, ctx: *mut BN_CTX) -> c_int;
|
||||
|
||||
pub fn EC_POINT_cmp(
|
||||
group: *const EC_GROUP,
|
||||
a: *const EC_POINT,
|
||||
b: *const EC_POINT,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_POINT_mul(
|
||||
group: *const EC_GROUP,
|
||||
r: *mut EC_POINT,
|
||||
n: *const BIGNUM,
|
||||
q: *const EC_POINT,
|
||||
m: *const BIGNUM,
|
||||
ctx: *mut BN_CTX,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EC_KEY_new() -> *mut EC_KEY;
|
||||
|
||||
pub fn EC_KEY_new_by_curve_name(nid: c_int) -> *mut EC_KEY;
|
||||
|
||||
pub fn EC_KEY_free(key: *mut EC_KEY);
|
||||
|
||||
pub fn EC_KEY_dup(key: *const EC_KEY) -> *mut EC_KEY;
|
||||
|
||||
pub fn EC_KEY_up_ref(key: *mut EC_KEY) -> c_int;
|
||||
|
||||
pub fn EC_KEY_get0_group(key: *const EC_KEY) -> *const EC_GROUP;
|
||||
|
||||
pub fn EC_KEY_set_group(key: *mut EC_KEY, group: *const EC_GROUP) -> c_int;
|
||||
|
||||
pub fn EC_KEY_get0_private_key(key: *const EC_KEY) -> *const BIGNUM;
|
||||
|
||||
pub fn EC_KEY_set_private_key(key: *mut EC_KEY, key: *const BIGNUM) -> c_int;
|
||||
|
||||
pub fn EC_KEY_get0_public_key(key: *const EC_KEY) -> *const EC_POINT;
|
||||
|
||||
pub fn EC_KEY_set_public_key(key: *mut EC_KEY, key: *const EC_POINT) -> c_int;
|
||||
|
||||
pub fn EC_KEY_generate_key(key: *mut EC_KEY) -> c_int;
|
||||
|
||||
pub fn EC_KEY_check_key(key: *const EC_KEY) -> c_int;
|
||||
|
||||
pub fn EC_KEY_set_public_key_affine_coordinates(
|
||||
key: *mut EC_KEY,
|
||||
x: *mut BIGNUM,
|
||||
y: *mut BIGNUM,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl280))] {
|
||||
pub enum ECDSA_SIG {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct ECDSA_SIG {
|
||||
pub r: *mut BIGNUM,
|
||||
pub s: *mut BIGNUM,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn ECDSA_SIG_new() -> *mut ECDSA_SIG;
|
||||
|
||||
pub fn ECDSA_SIG_free(sig: *mut ECDSA_SIG);
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn ECDSA_SIG_get0(sig: *const ECDSA_SIG, pr: *mut *const BIGNUM, ps: *mut *const BIGNUM);
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn ECDSA_SIG_set0(sig: *mut ECDSA_SIG, pr: *mut BIGNUM, ps: *mut BIGNUM) -> c_int;
|
||||
|
||||
pub fn ECDSA_do_sign(
|
||||
dgst: *const c_uchar,
|
||||
dgst_len: c_int,
|
||||
eckey: *mut EC_KEY,
|
||||
) -> *mut ECDSA_SIG;
|
||||
|
||||
pub fn ECDSA_do_verify(
|
||||
dgst: *const c_uchar,
|
||||
dgst_len: c_int,
|
||||
sig: *const ECDSA_SIG,
|
||||
eckey: *mut EC_KEY,
|
||||
) -> c_int;
|
||||
|
||||
pub fn d2i_ECDSA_SIG(
|
||||
sig: *mut *mut ECDSA_SIG,
|
||||
inp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut ECDSA_SIG;
|
||||
|
||||
pub fn i2d_ECDSA_SIG(sig: *const ECDSA_SIG, out: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
55
vendor/openssl-sys/src/handwritten/err.rs
vendored
Normal file
55
vendor/openssl-sys/src/handwritten/err.rs
vendored
Normal file
|
|
@ -0,0 +1,55 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[repr(C)]
|
||||
pub struct ERR_STRING_DATA {
|
||||
pub error: c_ulong,
|
||||
pub string: *const c_char,
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn ERR_new();
|
||||
pub fn ERR_set_debug(file: *const c_char, line: c_int, func: *const c_char);
|
||||
pub fn ERR_set_error(lib: c_int, reason: c_int, fmt: *const c_char, ...);
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn ERR_put_error(lib: c_int, func: c_int, reason: c_int, file: *const c_char, line: c_int);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn ERR_set_error_data(data: *mut c_char, flags: c_int);
|
||||
|
||||
pub fn ERR_get_error() -> c_ulong;
|
||||
#[cfg(ossl300)]
|
||||
pub fn ERR_get_error_all(
|
||||
file: *mut *const c_char,
|
||||
line: *mut c_int,
|
||||
func: *mut *const c_char,
|
||||
data: *mut *const c_char,
|
||||
flags: *mut c_int,
|
||||
) -> c_ulong;
|
||||
pub fn ERR_get_error_line_data(
|
||||
file: *mut *const c_char,
|
||||
line: *mut c_int,
|
||||
data: *mut *const c_char,
|
||||
flags: *mut c_int,
|
||||
) -> c_ulong;
|
||||
pub fn ERR_peek_last_error() -> c_ulong;
|
||||
pub fn ERR_clear_error();
|
||||
pub fn ERR_lib_error_string(err: c_ulong) -> *const c_char;
|
||||
pub fn ERR_func_error_string(err: c_ulong) -> *const c_char;
|
||||
pub fn ERR_reason_error_string(err: c_ulong) -> *const c_char;
|
||||
#[cfg(ossl110)]
|
||||
pub fn ERR_load_strings(lib: c_int, str: *mut ERR_STRING_DATA) -> c_int;
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn ERR_load_strings(lib: c_int, str: *mut ERR_STRING_DATA);
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn ERR_load_crypto_strings();
|
||||
|
||||
pub fn ERR_get_next_error_library() -> c_int;
|
||||
}
|
||||
660
vendor/openssl-sys/src/handwritten/evp.rs
vendored
Normal file
660
vendor/openssl-sys/src/handwritten/evp.rs
vendored
Normal file
|
|
@ -0,0 +1,660 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_MD_get_block_size(md: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_MD_get_size(md: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_MD_get_type(md: *const EVP_MD) -> c_int;
|
||||
|
||||
pub fn EVP_MD_CTX_get0_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD;
|
||||
|
||||
pub fn EVP_CIPHER_get_key_length(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_get_block_size(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_get_iv_length(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_get_nid(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_fetch(
|
||||
ctx: *mut OSSL_LIB_CTX,
|
||||
algorithm: *const c_char,
|
||||
properties: *const c_char,
|
||||
) -> *mut EVP_CIPHER;
|
||||
pub fn EVP_CIPHER_free(cipher: *mut EVP_CIPHER);
|
||||
|
||||
pub fn EVP_CIPHER_CTX_get0_cipher(ctx: *const EVP_CIPHER_CTX) -> *const EVP_CIPHER;
|
||||
pub fn EVP_CIPHER_CTX_get_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_get_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_get_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_get_tag_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_get_num(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn EVP_MD_block_size(md: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_MD_size(md: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_MD_type(md: *const EVP_MD) -> c_int;
|
||||
|
||||
pub fn EVP_MD_CTX_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD;
|
||||
|
||||
pub fn EVP_CIPHER_key_length(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_block_size(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_iv_length(cipher: *const EVP_CIPHER) -> c_int;
|
||||
pub fn EVP_CIPHER_nid(cipher: *const EVP_CIPHER) -> c_int;
|
||||
|
||||
pub fn EVP_CIPHER_CTX_cipher(ctx: *const EVP_CIPHER_CTX) -> *const EVP_CIPHER;
|
||||
pub fn EVP_CIPHER_CTX_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_CIPHER_CTX_num(ctx: *const EVP_CIPHER_CTX) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl382))] {
|
||||
extern "C" {
|
||||
pub fn EVP_MD_CTX_new() -> *mut EVP_MD_CTX;
|
||||
pub fn EVP_MD_CTX_free(ctx: *mut EVP_MD_CTX);
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn EVP_MD_CTX_create() -> *mut EVP_MD_CTX;
|
||||
pub fn EVP_MD_CTX_destroy(ctx: *mut EVP_MD_CTX);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_default_properties_is_fips_enabled(libctx: *mut OSSL_LIB_CTX) -> c_int;
|
||||
pub fn EVP_default_properties_enable_fips(libctx: *mut OSSL_LIB_CTX, enable: c_int) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn EVP_DigestInit_ex(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD, imple: *mut ENGINE)
|
||||
-> c_int;
|
||||
pub fn EVP_DigestUpdate(ctx: *mut EVP_MD_CTX, data: *const c_void, n: size_t) -> c_int;
|
||||
pub fn EVP_DigestFinal_ex(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_Q_digest(
|
||||
libctx: *mut OSSL_LIB_CTX,
|
||||
name: *const c_char,
|
||||
propq: *const c_char,
|
||||
data: *const c_void,
|
||||
count: size_t,
|
||||
md: *mut c_uchar,
|
||||
size: *mut size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_DigestInit(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_DigestFinal(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
|
||||
#[cfg(ossl111)]
|
||||
pub fn EVP_DigestFinalXOF(ctx: *mut EVP_MD_CTX, res: *mut u8, len: usize) -> c_int;
|
||||
#[cfg(ossl330)]
|
||||
pub fn EVP_DigestSqueeze(ctx: *mut EVP_MD_CTX, res: *mut u8, len: usize) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_MD_fetch(
|
||||
ctx: *mut OSSL_LIB_CTX,
|
||||
algorithm: *const c_char,
|
||||
properties: *const c_char,
|
||||
) -> *mut EVP_MD;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_MD_free(md: *mut EVP_MD);
|
||||
|
||||
pub fn EVP_BytesToKey(
|
||||
typ: *const EVP_CIPHER,
|
||||
md: *const EVP_MD,
|
||||
salt: *const u8,
|
||||
data: *const u8,
|
||||
datalen: c_int,
|
||||
count: c_int,
|
||||
key: *mut u8,
|
||||
iv: *mut u8,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EVP_CipherInit(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
evp: *const EVP_CIPHER,
|
||||
key: *const u8,
|
||||
iv: *const u8,
|
||||
mode: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_CipherInit_ex(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
type_: *const EVP_CIPHER,
|
||||
impl_: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
iv: *const c_uchar,
|
||||
enc: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_CipherUpdate(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
outbuf: *mut u8,
|
||||
outlen: *mut c_int,
|
||||
inbuf: *const u8,
|
||||
inlen: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_CipherFinal(ctx: *mut EVP_CIPHER_CTX, res: *mut u8, len: *mut c_int) -> c_int;
|
||||
|
||||
pub fn EVP_DigestSignInit(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
pctx: *mut *mut EVP_PKEY_CTX,
|
||||
type_: *const EVP_MD,
|
||||
e: *mut ENGINE,
|
||||
pkey: *mut EVP_PKEY,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_DigestSignUpdate(ctx: *mut EVP_MD_CTX, data: *const c_void, dsize: size_t) -> c_int;
|
||||
pub fn EVP_DigestSignFinal(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
sig: *mut c_uchar,
|
||||
siglen: *mut size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_DigestVerifyInit(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
pctx: *mut *mut EVP_PKEY_CTX,
|
||||
type_: *const EVP_MD,
|
||||
e: *mut ENGINE,
|
||||
pkey: *mut EVP_PKEY,
|
||||
) -> c_int;
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_DigestVerifyUpdate(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
data: *const c_void,
|
||||
dsize: size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_SealInit(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
type_: *const EVP_CIPHER,
|
||||
ek: *mut *mut c_uchar,
|
||||
ekl: *mut c_int,
|
||||
iv: *mut c_uchar,
|
||||
pubk: *mut *mut EVP_PKEY,
|
||||
npubk: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_SealFinal(ctx: *mut EVP_CIPHER_CTX, out: *mut c_uchar, outl: *mut c_int) -> c_int;
|
||||
pub fn EVP_EncryptInit_ex(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
cipher: *const EVP_CIPHER,
|
||||
impl_: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
iv: *const c_uchar,
|
||||
) -> c_int;
|
||||
pub fn EVP_EncryptUpdate(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
out: *mut c_uchar,
|
||||
outl: *mut c_int,
|
||||
in_: *const u8,
|
||||
inl: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_EncryptFinal_ex(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
out: *mut c_uchar,
|
||||
outl: *mut c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_OpenInit(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
type_: *const EVP_CIPHER,
|
||||
ek: *const c_uchar,
|
||||
ekl: c_int,
|
||||
iv: *const c_uchar,
|
||||
priv_: *mut EVP_PKEY,
|
||||
) -> c_int;
|
||||
pub fn EVP_OpenFinal(ctx: *mut EVP_CIPHER_CTX, out: *mut c_uchar, outl: *mut c_int) -> c_int;
|
||||
pub fn EVP_DecryptInit_ex(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
cipher: *const EVP_CIPHER,
|
||||
impl_: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
iv: *const c_uchar,
|
||||
) -> c_int;
|
||||
pub fn EVP_DecryptUpdate(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
out: *mut c_uchar,
|
||||
outl: *mut c_int,
|
||||
in_: *const u8,
|
||||
inl: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_DecryptFinal_ex(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
outm: *mut c_uchar,
|
||||
outl: *mut c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_get_size(pkey: *const EVP_PKEY) -> c_int;
|
||||
}
|
||||
} else {
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_size(pkey: #[const_ptr_if(any(ossl111b, libressl280))] EVP_PKEY) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl111, libressl370))] {
|
||||
extern "C" {
|
||||
pub fn EVP_DigestSign(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
sigret: *mut c_uchar,
|
||||
siglen: *mut size_t,
|
||||
tbs: *const c_uchar,
|
||||
tbslen: size_t
|
||||
) -> c_int;
|
||||
|
||||
pub fn EVP_DigestVerify(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
sigret: *const c_uchar,
|
||||
siglen: size_t,
|
||||
tbs: *const c_uchar,
|
||||
tbslen: size_t
|
||||
) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn EVP_DigestVerifyFinal(
|
||||
ctx: *mut EVP_MD_CTX,
|
||||
sigret: #[const_ptr_if(any(ossl102, libressl280))] c_uchar,
|
||||
siglen: size_t,
|
||||
) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn EVP_CIPHER_CTX_new() -> *mut EVP_CIPHER_CTX;
|
||||
pub fn EVP_CIPHER_CTX_free(ctx: *mut EVP_CIPHER_CTX);
|
||||
pub fn EVP_CIPHER_CTX_copy(dst: *mut EVP_CIPHER_CTX, src: *const EVP_CIPHER_CTX) -> c_int;
|
||||
|
||||
pub fn EVP_MD_CTX_copy_ex(dst: *mut EVP_MD_CTX, src: *const EVP_MD_CTX) -> c_int;
|
||||
#[cfg(ossl111)]
|
||||
pub fn EVP_MD_CTX_reset(ctx: *mut EVP_MD_CTX) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_set_key_length(ctx: *mut EVP_CIPHER_CTX, keylen: c_int) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_set_padding(ctx: *mut EVP_CIPHER_CTX, padding: c_int) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_ctrl(
|
||||
ctx: *mut EVP_CIPHER_CTX,
|
||||
type_: c_int,
|
||||
arg: c_int,
|
||||
ptr: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_rand_key(ctx: *mut EVP_CIPHER_CTX, key: *mut c_uchar) -> c_int;
|
||||
pub fn EVP_CIPHER_CTX_set_flags(ctx: *mut EVP_CIPHER_CTX, flags: c_int);
|
||||
|
||||
pub fn EVP_md_null() -> *const EVP_MD;
|
||||
pub fn EVP_md5() -> *const EVP_MD;
|
||||
pub fn EVP_sha1() -> *const EVP_MD;
|
||||
pub fn EVP_sha224() -> *const EVP_MD;
|
||||
pub fn EVP_sha256() -> *const EVP_MD;
|
||||
pub fn EVP_sha384() -> *const EVP_MD;
|
||||
pub fn EVP_sha512() -> *const EVP_MD;
|
||||
#[cfg(any(ossl111, libressl380))]
|
||||
pub fn EVP_sha3_224() -> *const EVP_MD;
|
||||
#[cfg(any(ossl111, libressl380))]
|
||||
pub fn EVP_sha3_256() -> *const EVP_MD;
|
||||
#[cfg(any(ossl111, libressl380))]
|
||||
pub fn EVP_sha3_384() -> *const EVP_MD;
|
||||
#[cfg(any(ossl111, libressl380))]
|
||||
pub fn EVP_sha3_512() -> *const EVP_MD;
|
||||
#[cfg(ossl111)]
|
||||
pub fn EVP_shake128() -> *const EVP_MD;
|
||||
#[cfg(ossl111)]
|
||||
pub fn EVP_shake256() -> *const EVP_MD;
|
||||
pub fn EVP_ripemd160() -> *const EVP_MD;
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM3")))]
|
||||
pub fn EVP_sm3() -> *const EVP_MD;
|
||||
pub fn EVP_des_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3_cbc() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3_cfb64() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3_cfb8() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_ede3_ofb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_des_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_RC4"))]
|
||||
pub fn EVP_rc4() -> *const EVP_CIPHER;
|
||||
pub fn EVP_bf_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_bf_cbc() -> *const EVP_CIPHER;
|
||||
pub fn EVP_bf_cfb64() -> *const EVP_CIPHER;
|
||||
pub fn EVP_bf_ofb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_cbc() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_cfb1() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_cfb8() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_cfb128() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_ctr() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_ccm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_gcm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_xts() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_128_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_128_ocb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl102)]
|
||||
pub fn EVP_aes_128_wrap() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_128_wrap_pad() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_cbc() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_cfb1() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_cfb8() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_cfb128() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_ctr() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_ccm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_gcm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_192_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_192_ocb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl102)]
|
||||
pub fn EVP_aes_192_wrap() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_192_wrap_pad() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_ecb() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_cbc() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_cfb1() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_cfb8() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_cfb128() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_ctr() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_ccm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_gcm() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_xts() -> *const EVP_CIPHER;
|
||||
pub fn EVP_aes_256_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_256_ocb() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl102)]
|
||||
pub fn EVP_aes_256_wrap() -> *const EVP_CIPHER;
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_aes_256_wrap_pad() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl110, libressl310), not(osslconf = "OPENSSL_NO_CHACHA")))]
|
||||
pub fn EVP_chacha20() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl110, libressl360), not(osslconf = "OPENSSL_NO_CHACHA")))]
|
||||
pub fn EVP_chacha20_poly1305() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
|
||||
pub fn EVP_seed_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
|
||||
pub fn EVP_seed_cfb128() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
|
||||
pub fn EVP_seed_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
|
||||
pub fn EVP_seed_ofb() -> *const EVP_CIPHER;
|
||||
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
|
||||
pub fn EVP_sm4_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
|
||||
pub fn EVP_sm4_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
|
||||
pub fn EVP_sm4_cfb128() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
|
||||
pub fn EVP_sm4_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
|
||||
pub fn EVP_sm4_ctr() -> *const EVP_CIPHER;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_128_cfb128() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_128_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_128_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_128_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_192_cfb128() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_192_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_192_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_192_ofb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_256_cfb128() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_256_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_256_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAMELLIA"))]
|
||||
pub fn EVP_camellia_256_ofb() -> *const EVP_CIPHER;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAST"))]
|
||||
pub fn EVP_cast5_cfb64() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAST"))]
|
||||
pub fn EVP_cast5_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAST"))]
|
||||
pub fn EVP_cast5_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_CAST"))]
|
||||
pub fn EVP_cast5_ofb() -> *const EVP_CIPHER;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_IDEA"))]
|
||||
pub fn EVP_idea_cfb64() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_IDEA"))]
|
||||
pub fn EVP_idea_ecb() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_IDEA"))]
|
||||
pub fn EVP_idea_cbc() -> *const EVP_CIPHER;
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_IDEA"))]
|
||||
pub fn EVP_idea_ofb() -> *const EVP_CIPHER;
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn OPENSSL_add_all_algorithms_noconf();
|
||||
|
||||
pub fn EVP_get_digestbyname(name: *const c_char) -> *const EVP_MD;
|
||||
pub fn EVP_get_cipherbyname(name: *const c_char) -> *const EVP_CIPHER;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_get_id(pkey: *const EVP_PKEY) -> c_int;
|
||||
pub fn EVP_PKEY_get_bits(key: *const EVP_PKEY) -> c_int;
|
||||
pub fn EVP_PKEY_get_security_bits(key: *const EVP_PKEY) -> c_int;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_id(pkey: *const EVP_PKEY) -> c_int;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_bits(key: #[const_ptr_if(any(ossl110, libressl280))] EVP_PKEY) -> c_int;
|
||||
#[cfg(any(ossl110, libressl360))]
|
||||
pub fn EVP_PKEY_security_bits(pkey: #[const_ptr_if(any(ossl110, libressl280))] EVP_PKEY) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_assign(pkey: *mut EVP_PKEY, typ: c_int, key: *mut c_void) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_set1_RSA(k: *mut EVP_PKEY, r: *mut RSA) -> c_int;
|
||||
pub fn EVP_PKEY_get1_RSA(k: *mut EVP_PKEY) -> *mut RSA;
|
||||
pub fn EVP_PKEY_set1_DSA(k: *mut EVP_PKEY, k: *mut DSA) -> c_int;
|
||||
pub fn EVP_PKEY_get1_DSA(k: *mut EVP_PKEY) -> *mut DSA;
|
||||
pub fn EVP_PKEY_set1_DH(k: *mut EVP_PKEY, k: *mut DH) -> c_int;
|
||||
pub fn EVP_PKEY_get1_DH(k: *mut EVP_PKEY) -> *mut DH;
|
||||
pub fn EVP_PKEY_set1_EC_KEY(k: *mut EVP_PKEY, k: *mut EC_KEY) -> c_int;
|
||||
pub fn EVP_PKEY_get1_EC_KEY(k: *mut EVP_PKEY) -> *mut EC_KEY;
|
||||
|
||||
pub fn EVP_PKEY_new() -> *mut EVP_PKEY;
|
||||
pub fn EVP_PKEY_free(k: *mut EVP_PKEY);
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn EVP_PKEY_up_ref(pkey: *mut EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn d2i_AutoPrivateKey(
|
||||
a: *mut *mut EVP_PKEY,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut EVP_PKEY;
|
||||
|
||||
pub fn EVP_PKEY_cmp(a: *const EVP_PKEY, b: *const EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_copy_parameters(to: *mut EVP_PKEY, from: *const EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn PKCS5_PBKDF2_HMAC_SHA1(
|
||||
pass: *const c_char,
|
||||
passlen: c_int,
|
||||
salt: *const u8,
|
||||
saltlen: c_int,
|
||||
iter: c_int,
|
||||
keylen: c_int,
|
||||
out: *mut u8,
|
||||
) -> c_int;
|
||||
pub fn PKCS5_PBKDF2_HMAC(
|
||||
pass: *const c_char,
|
||||
passlen: c_int,
|
||||
salt: *const c_uchar,
|
||||
saltlen: c_int,
|
||||
iter: c_int,
|
||||
digest: *const EVP_MD,
|
||||
keylen: c_int,
|
||||
out: *mut u8,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub fn EVP_PBE_scrypt(
|
||||
pass: *const c_char,
|
||||
passlen: size_t,
|
||||
salt: *const c_uchar,
|
||||
saltlen: size_t,
|
||||
N: u64,
|
||||
r: u64,
|
||||
p: u64,
|
||||
maxmem: u64,
|
||||
key: *mut c_uchar,
|
||||
keylen: size_t,
|
||||
) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_CTX_new(k: *mut EVP_PKEY, e: *mut ENGINE) -> *mut EVP_PKEY_CTX;
|
||||
pub fn EVP_PKEY_CTX_new_id(id: c_int, e: *mut ENGINE) -> *mut EVP_PKEY_CTX;
|
||||
pub fn EVP_PKEY_CTX_free(ctx: *mut EVP_PKEY_CTX);
|
||||
|
||||
pub fn EVP_PKEY_CTX_ctrl(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
keytype: c_int,
|
||||
optype: c_int,
|
||||
cmd: c_int,
|
||||
p1: c_int,
|
||||
p2: *mut c_void,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_PKEY_CTX_set_signature_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_PKEY_CTX_set_params(ctx: *mut EVP_PKEY_CTX, params: *const OSSL_PARAM) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_PKEY_CTX_get_params(ctx: *mut EVP_PKEY_CTX, params: *mut OSSL_PARAM) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_new_mac_key(
|
||||
type_: c_int,
|
||||
e: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
keylen: c_int,
|
||||
) -> *mut EVP_PKEY;
|
||||
|
||||
pub fn EVP_PKEY_derive_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_derive_set_peer(ctx: *mut EVP_PKEY_CTX, peer: *mut EVP_PKEY) -> c_int;
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_PKEY_derive_set_peer_ex(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
peer: *mut EVP_PKEY,
|
||||
validate_peer: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_derive(ctx: *mut EVP_PKEY_CTX, key: *mut c_uchar, size: *mut size_t) -> c_int;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
pub fn EVP_PKEY_Q_keygen(
|
||||
libctx: *mut OSSL_LIB_CTX,
|
||||
propq: *const c_char,
|
||||
type_: *const c_char,
|
||||
...
|
||||
) -> *mut EVP_PKEY;
|
||||
pub fn EVP_PKEY_keygen_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_keygen(ctx: *mut EVP_PKEY_CTX, key: *mut *mut EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_sign_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_sign(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
sig: *mut c_uchar,
|
||||
siglen: *mut size_t,
|
||||
tbs: *const c_uchar,
|
||||
tbslen: size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_verify_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_verify(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
sig: *const c_uchar,
|
||||
siglen: size_t,
|
||||
tbs: *const c_uchar,
|
||||
tbslen: size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_encrypt_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_encrypt(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
pout: *mut c_uchar,
|
||||
poutlen: *mut size_t,
|
||||
pin: *const c_uchar,
|
||||
pinlen: size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_decrypt_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_decrypt(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
pout: *mut c_uchar,
|
||||
poutlen: *mut size_t,
|
||||
pin: *const c_uchar,
|
||||
pinlen: size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_verify_recover_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
|
||||
pub fn EVP_PKEY_verify_recover(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
rout: *mut c_uchar,
|
||||
routlen: *mut size_t,
|
||||
sig: *const c_uchar,
|
||||
siglen: size_t,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn EVP_PKCS82PKEY(p8: #[const_ptr_if(any(ossl110, libressl280))] PKCS8_PRIV_KEY_INFO) -> *mut EVP_PKEY;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl111, libressl370))] {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_get_raw_public_key(
|
||||
pkey: *const EVP_PKEY,
|
||||
ppub: *mut c_uchar,
|
||||
len: *mut size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_new_raw_public_key(
|
||||
ttype: c_int,
|
||||
e: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
keylen: size_t,
|
||||
) -> *mut EVP_PKEY;
|
||||
pub fn EVP_PKEY_get_raw_private_key(
|
||||
pkey: *const EVP_PKEY,
|
||||
ppriv: *mut c_uchar,
|
||||
len: *mut size_t,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_new_raw_private_key(
|
||||
ttype: c_int,
|
||||
e: *mut ENGINE,
|
||||
key: *const c_uchar,
|
||||
keylen: size_t,
|
||||
) -> *mut EVP_PKEY;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn EVP_EncodeBlock(dst: *mut c_uchar, src: *const c_uchar, src_len: c_int) -> c_int;
|
||||
pub fn EVP_DecodeBlock(dst: *mut c_uchar, src: *const c_uchar, src_len: c_int) -> c_int;
|
||||
}
|
||||
30
vendor/openssl-sys/src/handwritten/hmac.rs
vendored
Normal file
30
vendor/openssl-sys/src/handwritten/hmac.rs
vendored
Normal file
|
|
@ -0,0 +1,30 @@
|
|||
use libc::*;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
extern "C" {
|
||||
pub fn HMAC_CTX_new() -> *mut HMAC_CTX;
|
||||
pub fn HMAC_CTX_free(ctx: *mut HMAC_CTX);
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn HMAC_CTX_init(ctx: *mut HMAC_CTX);
|
||||
pub fn HMAC_CTX_cleanup(ctx: *mut HMAC_CTX);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn HMAC_Init_ex(
|
||||
ctx: *mut HMAC_CTX,
|
||||
key: *const c_void,
|
||||
len: c_int,
|
||||
md: *const EVP_MD,
|
||||
impl_: *mut ENGINE,
|
||||
) -> c_int;
|
||||
pub fn HMAC_Update(ctx: *mut HMAC_CTX, data: *const c_uchar, len: size_t) -> c_int;
|
||||
pub fn HMAC_Final(ctx: *mut HMAC_CTX, md: *mut c_uchar, len: *mut c_uint) -> c_int;
|
||||
pub fn HMAC_CTX_copy(dst: *mut HMAC_CTX, src: *mut HMAC_CTX) -> c_int;
|
||||
}
|
||||
34
vendor/openssl-sys/src/handwritten/kdf.rs
vendored
Normal file
34
vendor/openssl-sys/src/handwritten/kdf.rs
vendored
Normal file
|
|
@ -0,0 +1,34 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_CTX_set_hkdf_mode(ctx: *mut EVP_PKEY_CTX, mode: c_int) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_set_hkdf_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_set1_hkdf_salt(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
salt: *const u8,
|
||||
saltlen: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_set1_hkdf_key(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
key: *const u8,
|
||||
keylen: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_add1_hkdf_info(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
info: *const u8,
|
||||
infolen: c_int,
|
||||
) -> c_int;
|
||||
pub fn EVP_KDF_CTX_new(kdf: *mut EVP_KDF) -> *mut EVP_KDF_CTX;
|
||||
pub fn EVP_KDF_CTX_free(ctx: *mut EVP_KDF_CTX);
|
||||
pub fn EVP_KDF_CTX_reset(ctx: *mut EVP_KDF_CTX);
|
||||
pub fn EVP_KDF_CTX_get_kdf_size(ctx: *mut EVP_KDF_CTX) -> size_t;
|
||||
pub fn EVP_KDF_derive(ctx: *mut EVP_KDF_CTX, key: *mut u8, keylen: size_t, params: *const OSSL_PARAM) -> c_int;
|
||||
pub fn EVP_KDF_fetch(ctx: *mut OSSL_LIB_CTX, algorithm: *const c_char, properties: *const c_char) -> *mut EVP_KDF;
|
||||
pub fn EVP_KDF_free(kdf: *mut EVP_KDF);
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
77
vendor/openssl-sys/src/handwritten/mod.rs
vendored
Normal file
77
vendor/openssl-sys/src/handwritten/mod.rs
vendored
Normal file
|
|
@ -0,0 +1,77 @@
|
|||
pub use self::aes::*;
|
||||
pub use self::asn1::*;
|
||||
pub use self::bio::*;
|
||||
pub use self::bn::*;
|
||||
pub use self::cmac::*;
|
||||
pub use self::cms::*;
|
||||
pub use self::conf::*;
|
||||
pub use self::crypto::*;
|
||||
pub use self::dh::*;
|
||||
pub use self::dsa::*;
|
||||
pub use self::ec::*;
|
||||
pub use self::err::*;
|
||||
pub use self::evp::*;
|
||||
pub use self::hmac::*;
|
||||
pub use self::kdf::*;
|
||||
pub use self::object::*;
|
||||
pub use self::ocsp::*;
|
||||
pub use self::params::*;
|
||||
pub use self::pem::*;
|
||||
pub use self::pkcs12::*;
|
||||
pub use self::pkcs7::*;
|
||||
#[cfg(libressl)]
|
||||
pub use self::poly1305::*;
|
||||
pub use self::provider::*;
|
||||
pub use self::rand::*;
|
||||
pub use self::rsa::*;
|
||||
pub use self::safestack::*;
|
||||
pub use self::sha::*;
|
||||
pub use self::srtp::*;
|
||||
pub use self::ssl::*;
|
||||
pub use self::stack::*;
|
||||
#[cfg(ossl320)]
|
||||
pub use self::thread::*;
|
||||
pub use self::tls1::*;
|
||||
pub use self::types::*;
|
||||
pub use self::x509::*;
|
||||
pub use self::x509_vfy::*;
|
||||
pub use self::x509v3::*;
|
||||
|
||||
mod aes;
|
||||
mod asn1;
|
||||
mod bio;
|
||||
mod bn;
|
||||
mod cmac;
|
||||
mod cms;
|
||||
mod conf;
|
||||
mod crypto;
|
||||
mod dh;
|
||||
mod dsa;
|
||||
mod ec;
|
||||
mod err;
|
||||
mod evp;
|
||||
mod hmac;
|
||||
mod kdf;
|
||||
mod object;
|
||||
mod ocsp;
|
||||
mod params;
|
||||
mod pem;
|
||||
mod pkcs12;
|
||||
mod pkcs7;
|
||||
#[cfg(libressl)]
|
||||
mod poly1305;
|
||||
mod provider;
|
||||
mod rand;
|
||||
mod rsa;
|
||||
mod safestack;
|
||||
mod sha;
|
||||
mod srtp;
|
||||
mod ssl;
|
||||
mod stack;
|
||||
#[cfg(ossl320)]
|
||||
mod thread;
|
||||
mod tls1;
|
||||
mod types;
|
||||
mod x509;
|
||||
mod x509_vfy;
|
||||
mod x509v3;
|
||||
31
vendor/openssl-sys/src/handwritten/object.rs
vendored
Normal file
31
vendor/openssl-sys/src/handwritten/object.rs
vendored
Normal file
|
|
@ -0,0 +1,31 @@
|
|||
use libc::*;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn OBJ_nid2ln(nid: c_int) -> *const c_char;
|
||||
pub fn OBJ_nid2sn(nid: c_int) -> *const c_char;
|
||||
pub fn OBJ_nid2obj(n: c_int) -> *mut ASN1_OBJECT;
|
||||
pub fn OBJ_obj2nid(o: *const ASN1_OBJECT) -> c_int;
|
||||
pub fn OBJ_obj2txt(
|
||||
buf: *mut c_char,
|
||||
buf_len: c_int,
|
||||
a: *const ASN1_OBJECT,
|
||||
no_name: c_int,
|
||||
) -> c_int;
|
||||
|
||||
pub fn OBJ_find_sigid_algs(signid: c_int, pdig_nid: *mut c_int, ppkey_nid: *mut c_int)
|
||||
-> c_int;
|
||||
pub fn OBJ_sn2nid(sn: *const libc::c_char) -> libc::c_int;
|
||||
pub fn OBJ_txt2obj(s: *const libc::c_char, no_name: libc::c_int) -> *mut ASN1_OBJECT;
|
||||
pub fn OBJ_create(
|
||||
oid: *const libc::c_char,
|
||||
sn: *const libc::c_char,
|
||||
ln: *const libc::c_char,
|
||||
) -> c_int;
|
||||
#[cfg(ossl111)]
|
||||
pub fn OBJ_length(obj: *const ASN1_OBJECT) -> libc::size_t;
|
||||
#[cfg(ossl111)]
|
||||
pub fn OBJ_get0_data(obj: *const ASN1_OBJECT) -> *const c_uchar;
|
||||
pub fn OBJ_cmp(a: *const ASN1_OBJECT, b: *const ASN1_OBJECT) -> c_int;
|
||||
}
|
||||
89
vendor/openssl-sys/src/handwritten/ocsp.rs
vendored
Normal file
89
vendor/openssl-sys/src/handwritten/ocsp.rs
vendored
Normal file
|
|
@ -0,0 +1,89 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
pub enum OCSP_CERTID {}
|
||||
|
||||
pub enum OCSP_ONEREQ {}
|
||||
|
||||
pub enum OCSP_REQUEST {}
|
||||
|
||||
pub enum OCSP_BASICRESP {}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn OCSP_cert_to_id(
|
||||
dgst: *const EVP_MD,
|
||||
subject: #[const_ptr_if(any(ossl110, libressl281))] X509,
|
||||
issuer: #[const_ptr_if(any(ossl110, libressl281))] X509,
|
||||
) -> *mut OCSP_CERTID;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn OCSP_request_add0_id(r: *mut OCSP_REQUEST, id: *mut OCSP_CERTID) -> *mut OCSP_ONEREQ;
|
||||
|
||||
pub fn OCSP_resp_find_status(
|
||||
bs: *mut OCSP_BASICRESP,
|
||||
id: *mut OCSP_CERTID,
|
||||
status: *mut c_int,
|
||||
reason: *mut c_int,
|
||||
revtime: *mut *mut ASN1_GENERALIZEDTIME,
|
||||
thisupd: *mut *mut ASN1_GENERALIZEDTIME,
|
||||
nextupd: *mut *mut ASN1_GENERALIZEDTIME,
|
||||
) -> c_int;
|
||||
pub fn OCSP_check_validity(
|
||||
thisupd: *mut ASN1_GENERALIZEDTIME,
|
||||
nextupd: *mut ASN1_GENERALIZEDTIME,
|
||||
sec: c_long,
|
||||
maxsec: c_long,
|
||||
) -> c_int;
|
||||
|
||||
pub fn OCSP_response_status(resp: *mut OCSP_RESPONSE) -> c_int;
|
||||
pub fn OCSP_response_get1_basic(resp: *mut OCSP_RESPONSE) -> *mut OCSP_BASICRESP;
|
||||
|
||||
pub fn OCSP_response_create(status: c_int, bs: *mut OCSP_BASICRESP) -> *mut OCSP_RESPONSE;
|
||||
|
||||
pub fn OCSP_BASICRESP_new() -> *mut OCSP_BASICRESP;
|
||||
pub fn OCSP_BASICRESP_free(r: *mut OCSP_BASICRESP);
|
||||
pub fn OCSP_RESPONSE_new() -> *mut OCSP_RESPONSE;
|
||||
pub fn OCSP_RESPONSE_free(r: *mut OCSP_RESPONSE);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_OCSP_RESPONSE(a: #[const_ptr_if(ossl300)] OCSP_RESPONSE, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn d2i_OCSP_RESPONSE(
|
||||
a: *mut *mut OCSP_RESPONSE,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut OCSP_RESPONSE;
|
||||
pub fn OCSP_ONEREQ_free(r: *mut OCSP_ONEREQ);
|
||||
pub fn OCSP_CERTID_free(id: *mut OCSP_CERTID);
|
||||
pub fn OCSP_REQUEST_new() -> *mut OCSP_REQUEST;
|
||||
pub fn OCSP_REQUEST_free(r: *mut OCSP_REQUEST);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_OCSP_REQUEST(a: #[const_ptr_if(ossl300)] OCSP_REQUEST, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn d2i_OCSP_REQUEST(
|
||||
a: *mut *mut OCSP_REQUEST,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut OCSP_REQUEST;
|
||||
|
||||
pub fn OCSP_basic_verify(
|
||||
bs: *mut OCSP_BASICRESP,
|
||||
certs: *mut stack_st_X509,
|
||||
st: *mut X509_STORE,
|
||||
flags: c_ulong,
|
||||
) -> c_int;
|
||||
}
|
||||
16
vendor/openssl-sys/src/handwritten/params.rs
vendored
Normal file
16
vendor/openssl-sys/src/handwritten/params.rs
vendored
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PARAM_construct_uint(key: *const c_char, buf: *mut c_uint) -> OSSL_PARAM;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PARAM_construct_end() -> OSSL_PARAM;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PARAM_construct_octet_string(
|
||||
key: *const c_char,
|
||||
buf: *mut c_void,
|
||||
bsize: size_t,
|
||||
) -> OSSL_PARAM;
|
||||
|
||||
}
|
||||
191
vendor/openssl-sys/src/handwritten/pem.rs
vendored
Normal file
191
vendor/openssl-sys/src/handwritten/pem.rs
vendored
Normal file
|
|
@ -0,0 +1,191 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
pub type pem_password_cb = Option<
|
||||
unsafe extern "C" fn(
|
||||
buf: *mut c_char,
|
||||
size: c_int,
|
||||
rwflag: c_int,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int,
|
||||
>;
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn PEM_write_bio_X509(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509) -> c_int;
|
||||
pub fn PEM_write_bio_X509_REQ(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509_REQ) -> c_int;
|
||||
pub fn PEM_write_bio_X509_CRL(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509_CRL) -> c_int;
|
||||
pub fn PEM_write_bio_RSAPrivateKey(
|
||||
bp: *mut BIO,
|
||||
rsa: #[const_ptr_if(ossl300)] RSA,
|
||||
cipher: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_uchar,
|
||||
klen: c_int,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn PEM_write_bio_RSA_PUBKEY(bp: *mut BIO, rsa: #[const_ptr_if(ossl300)] RSA) -> c_int;
|
||||
pub fn PEM_write_bio_DSAPrivateKey(
|
||||
bp: *mut BIO,
|
||||
dsa: #[const_ptr_if(ossl300)] DSA,
|
||||
cipher: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_uchar,
|
||||
klen: c_int,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn PEM_write_bio_ECPrivateKey(
|
||||
bio: *mut BIO,
|
||||
key: #[const_ptr_if(ossl300)] EC_KEY,
|
||||
cipher: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_uchar,
|
||||
klen: c_int,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn PEM_write_bio_DSA_PUBKEY(bp: *mut BIO, dsa: #[const_ptr_if(ossl300)] DSA) -> c_int;
|
||||
pub fn PEM_write_bio_PrivateKey(
|
||||
bio: *mut BIO,
|
||||
pkey: #[const_ptr_if(ossl300)] EVP_PKEY,
|
||||
cipher: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_uchar,
|
||||
klen: c_int,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn PEM_write_bio_PUBKEY(bp: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
|
||||
pub fn PEM_write_bio_PKCS8PrivateKey(
|
||||
bio: *mut BIO,
|
||||
pkey: #[const_ptr_if(ossl300)] EVP_PKEY,
|
||||
cipher: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_char,
|
||||
klen: c_int,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
pub fn PEM_write_bio_PKCS7(bp: *mut BIO, x: #[const_ptr_if(ossl300)] PKCS7) -> c_int;
|
||||
pub fn PEM_write_bio_EC_PUBKEY(bp: *mut BIO, ec: #[const_ptr_if(ossl300)] EC_KEY) -> c_int;
|
||||
pub fn i2d_PKCS8PrivateKey_bio(
|
||||
bp: *mut BIO,
|
||||
x: #[const_ptr_if(ossl300)] EVP_PKEY,
|
||||
enc: *const EVP_CIPHER,
|
||||
kstr: #[const_ptr_if(ossl300)] c_char,
|
||||
klen: c_int,
|
||||
cb: pem_password_cb,
|
||||
u: *mut c_void,
|
||||
) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn PEM_read_bio_X509(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut X509,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut X509;
|
||||
pub fn PEM_read_bio_X509_REQ(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut X509_REQ,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut X509_REQ;
|
||||
pub fn PEM_read_bio_X509_CRL(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut X509_CRL,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut X509_CRL;
|
||||
pub fn PEM_read_bio_RSAPrivateKey(
|
||||
bio: *mut BIO,
|
||||
rsa: *mut *mut RSA,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut RSA;
|
||||
pub fn PEM_read_bio_RSAPublicKey(
|
||||
bio: *mut BIO,
|
||||
rsa: *mut *mut RSA,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut RSA;
|
||||
pub fn PEM_write_bio_RSAPublicKey(bp: *mut BIO, rsa: *const RSA) -> c_int;
|
||||
pub fn PEM_read_bio_RSA_PUBKEY(
|
||||
bio: *mut BIO,
|
||||
rsa: *mut *mut RSA,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut RSA;
|
||||
pub fn PEM_read_bio_DSAPrivateKey(
|
||||
bp: *mut BIO,
|
||||
dsa: *mut *mut DSA,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut DSA;
|
||||
pub fn PEM_read_bio_DSA_PUBKEY(
|
||||
bp: *mut BIO,
|
||||
dsa: *mut *mut DSA,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut DSA;
|
||||
pub fn PEM_read_bio_ECPrivateKey(
|
||||
bio: *mut BIO,
|
||||
key: *mut *mut EC_KEY,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut EC_KEY;
|
||||
pub fn PEM_read_bio_EC_PUBKEY(
|
||||
bp: *mut BIO,
|
||||
ec: *mut *mut EC_KEY,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut EC_KEY;
|
||||
pub fn PEM_read_bio_DHparams(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut DH,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut DH;
|
||||
pub fn PEM_write_bio_DHparams(bio: *mut BIO, x: *const DH) -> c_int;
|
||||
pub fn PEM_read_bio_PrivateKey(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut EVP_PKEY,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut EVP_PKEY;
|
||||
pub fn PEM_read_bio_PUBKEY(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut EVP_PKEY,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut EVP_PKEY;
|
||||
|
||||
pub fn d2i_PKCS8PrivateKey_bio(
|
||||
bp: *mut BIO,
|
||||
x: *mut *mut EVP_PKEY,
|
||||
cb: pem_password_cb,
|
||||
u: *mut c_void,
|
||||
) -> *mut EVP_PKEY;
|
||||
pub fn d2i_PKCS8_PRIV_KEY_INFO(
|
||||
k: *mut *mut PKCS8_PRIV_KEY_INFO,
|
||||
buf: *mut *const u8,
|
||||
length: c_long,
|
||||
) -> *mut PKCS8_PRIV_KEY_INFO;
|
||||
pub fn PKCS8_PRIV_KEY_INFO_free(p8inf: *mut PKCS8_PRIV_KEY_INFO);
|
||||
|
||||
pub fn PEM_read_bio_PKCS7(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut PKCS7,
|
||||
cb: pem_password_cb,
|
||||
u: *mut c_void,
|
||||
) -> *mut PKCS7;
|
||||
|
||||
#[cfg(ossl101)]
|
||||
pub fn PEM_read_bio_CMS(
|
||||
bio: *mut BIO,
|
||||
out: *mut *mut CMS_ContentInfo,
|
||||
callback: pem_password_cb,
|
||||
user_data: *mut c_void,
|
||||
) -> *mut CMS_ContentInfo;
|
||||
#[cfg(ossl101)]
|
||||
pub fn PEM_write_bio_CMS(bio: *mut BIO, cms: *const CMS_ContentInfo) -> c_int;
|
||||
}
|
||||
53
vendor/openssl-sys/src/handwritten/pkcs12.rs
vendored
Normal file
53
vendor/openssl-sys/src/handwritten/pkcs12.rs
vendored
Normal file
|
|
@ -0,0 +1,53 @@
|
|||
use libc::*;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
pub enum PKCS12 {}
|
||||
|
||||
extern "C" {
|
||||
pub fn PKCS12_free(p12: *mut PKCS12);
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_PKCS12(a: #[const_ptr_if(ossl300)] PKCS12, buf: *mut *mut u8) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn d2i_PKCS12(a: *mut *mut PKCS12, pp: *mut *const u8, length: c_long) -> *mut PKCS12;
|
||||
|
||||
pub fn PKCS12_parse(
|
||||
p12: *mut PKCS12,
|
||||
pass: *const c_char,
|
||||
pkey: *mut *mut EVP_PKEY,
|
||||
cert: *mut *mut X509,
|
||||
ca: *mut *mut stack_st_X509,
|
||||
) -> c_int;
|
||||
|
||||
pub fn PKCS12_set_mac(
|
||||
p12: *mut PKCS12,
|
||||
pass: *const c_char,
|
||||
passlen: c_int,
|
||||
salt: *mut c_uchar,
|
||||
saltlen: c_int,
|
||||
iter: c_int,
|
||||
md_type: *const EVP_MD,
|
||||
) -> c_int;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn PKCS12_create(
|
||||
pass: #[const_ptr_if(any(ossl110, libressl280))] c_char,
|
||||
friendly_name: #[const_ptr_if(any(ossl110, libressl280))] c_char,
|
||||
pkey: *mut EVP_PKEY,
|
||||
cert: *mut X509,
|
||||
ca: *mut stack_st_X509,
|
||||
nid_key: c_int,
|
||||
nid_cert: c_int,
|
||||
iter: c_int,
|
||||
mac_iter: c_int,
|
||||
keytype: c_int,
|
||||
) -> *mut PKCS12;
|
||||
|
||||
pub fn i2d_PKCS12_bio(b: *mut BIO, a: #[const_ptr_if(ossl300)] PKCS12) -> c_int;
|
||||
}
|
||||
}
|
||||
257
vendor/openssl-sys/src/handwritten/pkcs7.rs
vendored
Normal file
257
vendor/openssl-sys/src/handwritten/pkcs7.rs
vendored
Normal file
|
|
@ -0,0 +1,257 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[cfg(ossl300)]
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_CTX {
|
||||
libctx: *mut OSSL_LIB_CTX,
|
||||
propq: *mut c_char,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_SIGNED {
|
||||
pub version: *mut ASN1_INTEGER, /* version 1 */
|
||||
pub md_algs: *mut stack_st_X509_ALGOR, /* md used */
|
||||
pub cert: *mut stack_st_X509, /* [ 0 ] */
|
||||
pub crl: *mut stack_st_X509_CRL, /* [ 1 ] */
|
||||
pub signer_info: *mut stack_st_PKCS7_SIGNER_INFO,
|
||||
pub contents: *mut PKCS7,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_ENC_CONTENT {
|
||||
pub content_type: *mut ASN1_OBJECT,
|
||||
pub algorithm: *mut X509_ALGOR,
|
||||
pub enc_data: *mut ASN1_OCTET_STRING, /* [ 0 ] */
|
||||
pub cipher: *const EVP_CIPHER,
|
||||
#[cfg(ossl300)]
|
||||
pub ctx: *const PKCS7_CTX,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_ENVELOPE {
|
||||
pub version: *mut ASN1_INTEGER, /* version 0 */
|
||||
pub recipientinfo: *mut stack_st_PKCS7_RECIP_INFO,
|
||||
pub enc_data: *mut PKCS7_ENC_CONTENT,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_SIGN_ENVELOPE {
|
||||
pub version: *mut ASN1_INTEGER, /* version 1 */
|
||||
pub md_algs: *mut stack_st_X509_ALGOR, /* md used */
|
||||
pub cert: *mut stack_st_X509, /* [ 0 ] */
|
||||
pub crl: *mut stack_st_X509_CRL, /* [ 1 ] */
|
||||
pub signer_info: *mut stack_st_PKCS7_SIGNER_INFO,
|
||||
pub enc_data: *mut PKCS7_ENC_CONTENT,
|
||||
pub recipientinfo: *mut stack_st_PKCS7_RECIP_INFO,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_DIGEST {
|
||||
pub version: *mut ASN1_INTEGER, /* version 0 */
|
||||
pub md: *mut X509_ALGOR, /* md used */
|
||||
pub contents: *mut PKCS7,
|
||||
pub digest: *mut ASN1_OCTET_STRING,
|
||||
}
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_ENCRYPT {
|
||||
pub version: *mut ASN1_INTEGER, /* version 0 */
|
||||
pub enc_data: *mut PKCS7_ENC_CONTENT,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn PKCS7_SIGNED_free(info: *mut PKCS7_SIGNED);
|
||||
pub fn PKCS7_ENC_CONTENT_free(info: *mut PKCS7_ENC_CONTENT);
|
||||
pub fn PKCS7_ENVELOPE_free(info: *mut PKCS7_ENVELOPE);
|
||||
pub fn PKCS7_SIGN_ENVELOPE_free(info: *mut PKCS7_SIGN_ENVELOPE);
|
||||
pub fn PKCS7_DIGEST_free(info: *mut PKCS7_DIGEST);
|
||||
pub fn PKCS7_SIGNER_INFO_free(info: *mut PKCS7_SIGNER_INFO);
|
||||
pub fn PKCS7_ENCRYPT_free(enc: *mut PKCS7_ENCRYPT);
|
||||
pub fn PKCS7_ISSUER_AND_SERIAL_free(ias: *mut PKCS7_ISSUER_AND_SERIAL);
|
||||
pub fn PKCS7_RECIP_INFO_free(info: *mut PKCS7_RECIP_INFO);
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct PKCS7 {
|
||||
/*
|
||||
* The following is non NULL if it contains ASN1 encoding of this
|
||||
* structure
|
||||
*/
|
||||
pub asn1: *mut c_uchar,
|
||||
pub length: c_long,
|
||||
// # define PKCS7_S_HEADER 0
|
||||
// # define PKCS7_S_BODY 1
|
||||
// # define PKCS7_S_TAIL 2
|
||||
pub state: c_int, /* used during processing */
|
||||
pub detached: c_int,
|
||||
pub type_: *mut ASN1_OBJECT,
|
||||
/* content as defined by the type */
|
||||
/*
|
||||
* all encryption/message digests are applied to the 'contents', leaving
|
||||
* out the 'type' field.
|
||||
*/
|
||||
pub d: PKCS7_data,
|
||||
#[cfg(ossl300)]
|
||||
pub ctx: PKCS7_CTX,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub union PKCS7_data {
|
||||
pub ptr: *mut c_char,
|
||||
/* NID_pkcs7_data */
|
||||
pub data: *mut ASN1_OCTET_STRING,
|
||||
/* NID_pkcs7_signed */
|
||||
pub sign: *mut PKCS7_SIGNED,
|
||||
/* NID_pkcs7_enveloped */
|
||||
pub enveloped: *mut PKCS7_ENVELOPE,
|
||||
/* NID_pkcs7_signedAndEnveloped */
|
||||
pub signed_and_enveloped: *mut PKCS7_SIGN_ENVELOPE,
|
||||
/* NID_pkcs7_digest */
|
||||
pub digest: *mut PKCS7_DIGEST,
|
||||
/* NID_pkcs7_encrypted */
|
||||
pub encrypted: *mut PKCS7_ENCRYPT,
|
||||
/* Anything else */
|
||||
pub other: *mut ASN1_TYPE,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_ISSUER_AND_SERIAL {
|
||||
pub issuer: *mut X509_NAME,
|
||||
pub serial: *mut ASN1_INTEGER,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_SIGNER_INFO {
|
||||
pub version: *mut ASN1_INTEGER, /* version 1 */
|
||||
pub issuer_and_serial: *mut PKCS7_ISSUER_AND_SERIAL,
|
||||
pub digest_alg: *mut X509_ALGOR,
|
||||
pub auth_attr: *mut stack_st_X509_ATTRIBUTE, /* [ 0 ] */
|
||||
pub digest_enc_alg: *mut X509_ALGOR,
|
||||
pub enc_digest: *mut ASN1_OCTET_STRING,
|
||||
pub unauth_attr: *mut stack_st_X509_ATTRIBUTE, /* [ 1 ] */
|
||||
pub pkey: *mut EVP_PKEY, /* The private key to sign with */
|
||||
#[cfg(ossl300)]
|
||||
pub ctx: *const PKCS7_CTX,
|
||||
}
|
||||
|
||||
stack!(stack_st_PKCS7_SIGNER_INFO);
|
||||
|
||||
#[repr(C)]
|
||||
pub struct PKCS7_RECIP_INFO {
|
||||
pub version: *mut ASN1_INTEGER, /* version 0 */
|
||||
pub issuer_and_serial: *mut PKCS7_ISSUER_AND_SERIAL,
|
||||
pub key_enc_algor: *mut X509_ALGOR,
|
||||
pub enc_key: *mut ASN1_OCTET_STRING,
|
||||
pub cert: *mut X509, /* get the pub-key from this */
|
||||
#[cfg(ossl300)]
|
||||
pub ctx: *const PKCS7_CTX,
|
||||
}
|
||||
|
||||
stack!(stack_st_PKCS7_RECIP_INFO);
|
||||
|
||||
extern "C" {
|
||||
pub fn d2i_PKCS7(a: *mut *mut PKCS7, pp: *mut *const c_uchar, length: c_long) -> *mut PKCS7;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_PKCS7(a: #[const_ptr_if(ossl300)] PKCS7, buf: *mut *mut u8) -> c_int;
|
||||
pub fn i2d_PKCS7_bio(bio: *mut BIO, p7: #[const_ptr_if(ossl300)] PKCS7) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn PKCS7_encrypt(
|
||||
certs: *mut stack_st_X509,
|
||||
b: *mut BIO,
|
||||
cipher: *const EVP_CIPHER,
|
||||
flags: c_int,
|
||||
) -> *mut PKCS7;
|
||||
|
||||
pub fn PKCS7_verify(
|
||||
pkcs7: *mut PKCS7,
|
||||
certs: *mut stack_st_X509,
|
||||
store: *mut X509_STORE,
|
||||
indata: *mut BIO,
|
||||
out: *mut BIO,
|
||||
flags: c_int,
|
||||
) -> c_int;
|
||||
|
||||
pub fn PKCS7_get0_signers(
|
||||
pkcs7: *mut PKCS7,
|
||||
certs: *mut stack_st_X509,
|
||||
flags: c_int,
|
||||
) -> *mut stack_st_X509;
|
||||
|
||||
pub fn PKCS7_sign(
|
||||
signcert: *mut X509,
|
||||
pkey: *mut EVP_PKEY,
|
||||
certs: *mut stack_st_X509,
|
||||
data: *mut BIO,
|
||||
flags: c_int,
|
||||
) -> *mut PKCS7;
|
||||
|
||||
pub fn PKCS7_decrypt(
|
||||
pkcs7: *mut PKCS7,
|
||||
pkey: *mut EVP_PKEY,
|
||||
cert: *mut X509,
|
||||
data: *mut BIO,
|
||||
flags: c_int,
|
||||
) -> c_int;
|
||||
|
||||
pub fn PKCS7_free(pkcs7: *mut PKCS7);
|
||||
|
||||
pub fn SMIME_write_PKCS7(
|
||||
out: *mut BIO,
|
||||
pkcs7: *mut PKCS7,
|
||||
data: *mut BIO,
|
||||
flags: c_int,
|
||||
) -> c_int;
|
||||
|
||||
pub fn SMIME_read_PKCS7(bio: *mut BIO, bcont: *mut *mut BIO) -> *mut PKCS7;
|
||||
|
||||
pub fn PKCS7_new() -> *mut PKCS7;
|
||||
|
||||
pub fn PKCS7_set_type(p7: *mut PKCS7, nid_pkcs7: c_int) -> c_int;
|
||||
|
||||
pub fn PKCS7_add_certificate(p7: *mut PKCS7, x509: *mut X509) -> c_int;
|
||||
|
||||
pub fn PKCS7_add_signature(
|
||||
p7: *mut PKCS7,
|
||||
x509: *mut X509,
|
||||
pkey: *mut EVP_PKEY,
|
||||
digest: *const EVP_MD,
|
||||
) -> *mut PKCS7_SIGNER_INFO;
|
||||
|
||||
pub fn PKCS7_set_signed_attributes(
|
||||
p7si: *mut PKCS7_SIGNER_INFO,
|
||||
attributes: *mut stack_st_X509_ATTRIBUTE,
|
||||
) -> c_int;
|
||||
|
||||
pub fn PKCS7_add_signed_attribute(
|
||||
p7si: *mut PKCS7_SIGNER_INFO,
|
||||
nid: c_int,
|
||||
attrtype: c_int,
|
||||
data: *mut c_void,
|
||||
) -> c_int;
|
||||
|
||||
pub fn PKCS7_content_new(p7: *mut PKCS7, nid_pkcs7: c_int) -> c_int;
|
||||
|
||||
pub fn PKCS7_dataInit(p7: *mut PKCS7, bio: *mut BIO) -> *mut BIO;
|
||||
|
||||
pub fn PKCS7_dataFinal(p7: *mut PKCS7, bio: *mut BIO) -> c_int;
|
||||
|
||||
pub fn PKCS7_get_signer_info(p7: *mut PKCS7) -> *mut stack_st_PKCS7_SIGNER_INFO;
|
||||
|
||||
pub fn PKCS7_SIGNER_INFO_get0_algs(
|
||||
si: *mut PKCS7_SIGNER_INFO,
|
||||
pk: *mut *mut EVP_PKEY,
|
||||
pdig: *mut *mut X509_ALGOR,
|
||||
psig: *mut *mut X509_ALGOR,
|
||||
);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn PKCS7_get_signed_attribute(
|
||||
si: #[const_ptr_if(ossl300)] PKCS7_SIGNER_INFO,
|
||||
nid: c_int
|
||||
) -> *mut ASN1_TYPE;
|
||||
}
|
||||
}
|
||||
23
vendor/openssl-sys/src/handwritten/poly1305.rs
vendored
Normal file
23
vendor/openssl-sys/src/handwritten/poly1305.rs
vendored
Normal file
|
|
@ -0,0 +1,23 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(libressl)] {
|
||||
#[repr(C)]
|
||||
#[derive(Debug, Copy, Clone)]
|
||||
pub struct poly1305_context {
|
||||
pub aligner: usize,
|
||||
pub opaque: [::libc::c_uchar; 136usize],
|
||||
}
|
||||
pub type poly1305_state = poly1305_context;
|
||||
extern "C" {
|
||||
pub fn CRYPTO_poly1305_init(ctx: *mut poly1305_context, key: *const ::libc::c_uchar);
|
||||
pub fn CRYPTO_poly1305_update(
|
||||
ctx: *mut poly1305_context,
|
||||
in_: *const ::libc::c_uchar,
|
||||
len: usize,
|
||||
);
|
||||
pub fn CRYPTO_poly1305_finish(ctx: *mut poly1305_context, mac: *mut ::libc::c_uchar);
|
||||
}
|
||||
}
|
||||
}
|
||||
20
vendor/openssl-sys/src/handwritten/provider.rs
vendored
Normal file
20
vendor/openssl-sys/src/handwritten/provider.rs
vendored
Normal file
|
|
@ -0,0 +1,20 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PROVIDER_load(ctx: *mut OSSL_LIB_CTX, name: *const c_char) -> *mut OSSL_PROVIDER;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PROVIDER_try_load(
|
||||
ctx: *mut OSSL_LIB_CTX,
|
||||
name: *const c_char,
|
||||
retain_fallbacks: c_int,
|
||||
) -> *mut OSSL_PROVIDER;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PROVIDER_unload(prov: *mut OSSL_PROVIDER) -> c_int;
|
||||
#[cfg(ossl300)]
|
||||
pub fn OSSL_PROVIDER_set_default_search_path(
|
||||
ctx: *mut OSSL_LIB_CTX,
|
||||
path: *const c_char,
|
||||
) -> c_int;
|
||||
}
|
||||
15
vendor/openssl-sys/src/handwritten/rand.rs
vendored
Normal file
15
vendor/openssl-sys/src/handwritten/rand.rs
vendored
Normal file
|
|
@ -0,0 +1,15 @@
|
|||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn RAND_bytes(buf: *mut u8, num: c_int) -> c_int;
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub fn RAND_priv_bytes(buf: *mut u8, num: c_int) -> c_int;
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub fn RAND_keep_random_devices_open(keep: c_int);
|
||||
|
||||
pub fn RAND_status() -> c_int;
|
||||
|
||||
pub fn RAND_add(buf: *const c_void, num: c_int, randomness: c_double);
|
||||
}
|
||||
124
vendor/openssl-sys/src/handwritten/rsa.rs
vendored
Normal file
124
vendor/openssl-sys/src/handwritten/rsa.rs
vendored
Normal file
|
|
@ -0,0 +1,124 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
extern "C" {
|
||||
pub fn EVP_PKEY_CTX_set_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad_mode: c_int) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_get_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad_mode: *mut c_int) -> c_int;
|
||||
|
||||
pub fn EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx: *mut EVP_PKEY_CTX, len: c_int) -> c_int;
|
||||
pub fn EVP_PKEY_CTX_set_rsa_mgf1_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn RSA_new() -> *mut RSA;
|
||||
pub fn RSA_size(k: *const RSA) -> c_int;
|
||||
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_set0_key(r: *mut RSA, n: *mut BIGNUM, e: *mut BIGNUM, d: *mut BIGNUM) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_set0_factors(r: *mut RSA, p: *mut BIGNUM, q: *mut BIGNUM) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_set0_crt_params(
|
||||
r: *mut RSA,
|
||||
dmp1: *mut BIGNUM,
|
||||
dmq1: *mut BIGNUM,
|
||||
iqmp: *mut BIGNUM,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_get0_key(
|
||||
r: *const RSA,
|
||||
n: *mut *const BIGNUM,
|
||||
e: *mut *const BIGNUM,
|
||||
d: *mut *const BIGNUM,
|
||||
);
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_get0_factors(r: *const RSA, p: *mut *const BIGNUM, q: *mut *const BIGNUM);
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn RSA_get0_crt_params(
|
||||
r: *const RSA,
|
||||
dmp1: *mut *const BIGNUM,
|
||||
dmq1: *mut *const BIGNUM,
|
||||
iqmp: *mut *const BIGNUM,
|
||||
);
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn RSA_generate_key(
|
||||
modsz: c_int,
|
||||
e: c_ulong,
|
||||
cb: Option<extern "C" fn(c_int, c_int, *mut c_void)>,
|
||||
cbarg: *mut c_void,
|
||||
) -> *mut RSA;
|
||||
|
||||
pub fn RSA_generate_key_ex(
|
||||
rsa: *mut RSA,
|
||||
bits: c_int,
|
||||
e: *mut BIGNUM,
|
||||
cb: *mut BN_GENCB,
|
||||
) -> c_int;
|
||||
|
||||
pub fn RSA_public_encrypt(
|
||||
flen: c_int,
|
||||
from: *const u8,
|
||||
to: *mut u8,
|
||||
k: *mut RSA,
|
||||
pad: c_int,
|
||||
) -> c_int;
|
||||
pub fn RSA_private_encrypt(
|
||||
flen: c_int,
|
||||
from: *const u8,
|
||||
to: *mut u8,
|
||||
k: *mut RSA,
|
||||
pad: c_int,
|
||||
) -> c_int;
|
||||
pub fn RSA_public_decrypt(
|
||||
flen: c_int,
|
||||
from: *const u8,
|
||||
to: *mut u8,
|
||||
k: *mut RSA,
|
||||
pad: c_int,
|
||||
) -> c_int;
|
||||
pub fn RSA_private_decrypt(
|
||||
flen: c_int,
|
||||
from: *const u8,
|
||||
to: *mut u8,
|
||||
k: *mut RSA,
|
||||
pad: c_int,
|
||||
) -> c_int;
|
||||
pub fn RSA_check_key(r: *const RSA) -> c_int;
|
||||
pub fn RSA_free(rsa: *mut RSA);
|
||||
pub fn RSA_up_ref(rsa: *mut RSA) -> c_int;
|
||||
|
||||
pub fn i2d_RSAPublicKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
|
||||
pub fn d2i_RSAPublicKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
|
||||
pub fn i2d_RSAPrivateKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
|
||||
pub fn d2i_RSAPrivateKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
|
||||
|
||||
pub fn RSA_sign(
|
||||
t: c_int,
|
||||
m: *const u8,
|
||||
mlen: c_uint,
|
||||
sig: *mut u8,
|
||||
siglen: *mut c_uint,
|
||||
k: *mut RSA,
|
||||
) -> c_int;
|
||||
pub fn RSA_verify(
|
||||
t: c_int,
|
||||
m: *const u8,
|
||||
mlen: c_uint,
|
||||
sig: *const u8,
|
||||
siglen: c_uint,
|
||||
k: *mut RSA,
|
||||
) -> c_int;
|
||||
|
||||
pub fn RSA_padding_check_PKCS1_type_2(
|
||||
to: *mut c_uchar,
|
||||
tlen: c_int,
|
||||
f: *const c_uchar,
|
||||
fl: c_int,
|
||||
rsa_len: c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
1
vendor/openssl-sys/src/handwritten/safestack.rs
vendored
Normal file
1
vendor/openssl-sys/src/handwritten/safestack.rs
vendored
Normal file
|
|
@ -0,0 +1 @@
|
|||
stack!(stack_st_OPENSSL_STRING);
|
||||
101
vendor/openssl-sys/src/handwritten/sha.rs
vendored
Normal file
101
vendor/openssl-sys/src/handwritten/sha.rs
vendored
Normal file
|
|
@ -0,0 +1,101 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
|
||||
#[repr(C)]
|
||||
#[derive(Clone)]
|
||||
pub struct SHA_CTX {
|
||||
pub h0: SHA_LONG,
|
||||
pub h1: SHA_LONG,
|
||||
pub h2: SHA_LONG,
|
||||
pub h3: SHA_LONG,
|
||||
pub h4: SHA_LONG,
|
||||
pub Nl: SHA_LONG,
|
||||
pub Nh: SHA_LONG,
|
||||
pub data: [SHA_LONG; SHA_LBLOCK as usize],
|
||||
pub num: c_uint,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn SHA1_Init(c: *mut SHA_CTX) -> c_int;
|
||||
pub fn SHA1_Update(c: *mut SHA_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn SHA1_Final(md: *mut c_uchar, c: *mut SHA_CTX) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(ossl300))] {
|
||||
extern "C" {
|
||||
pub fn SHA1(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
|
||||
#[repr(C)]
|
||||
#[derive(Clone)]
|
||||
pub struct SHA256_CTX {
|
||||
pub h: [SHA_LONG; 8],
|
||||
pub Nl: SHA_LONG,
|
||||
pub Nh: SHA_LONG,
|
||||
pub data: [SHA_LONG; SHA_LBLOCK as usize],
|
||||
pub num: c_uint,
|
||||
pub md_len: c_uint,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn SHA224_Init(c: *mut SHA256_CTX) -> c_int;
|
||||
pub fn SHA224_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn SHA224_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
|
||||
pub fn SHA256_Init(c: *mut SHA256_CTX) -> c_int;
|
||||
pub fn SHA256_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn SHA256_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(ossl300))] {
|
||||
extern "C" {
|
||||
pub fn SHA224(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
|
||||
pub fn SHA256(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
|
||||
#[repr(C)]
|
||||
#[derive(Clone)]
|
||||
pub struct SHA512_CTX {
|
||||
pub h: [SHA_LONG64; 8],
|
||||
pub Nl: SHA_LONG64,
|
||||
pub Nh: SHA_LONG64,
|
||||
// this is a union but we don't want to require 1.19
|
||||
u: [SHA_LONG64; SHA_LBLOCK as usize],
|
||||
pub num: c_uint,
|
||||
pub md_len: c_uint,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn SHA384_Init(c: *mut SHA512_CTX) -> c_int;
|
||||
pub fn SHA384_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn SHA384_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
|
||||
pub fn SHA512_Init(c: *mut SHA512_CTX) -> c_int;
|
||||
pub fn SHA512_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
|
||||
pub fn SHA512_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(ossl300))] {
|
||||
extern "C" {
|
||||
pub fn SHA384(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
|
||||
pub fn SHA512(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
|
||||
}
|
||||
}
|
||||
}
|
||||
10
vendor/openssl-sys/src/handwritten/srtp.rs
vendored
Normal file
10
vendor/openssl-sys/src/handwritten/srtp.rs
vendored
Normal file
|
|
@ -0,0 +1,10 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn SSL_CTX_set_tlsext_use_srtp(ctx: *mut SSL_CTX, profiles: *const c_char) -> c_int;
|
||||
pub fn SSL_set_tlsext_use_srtp(ssl: *mut SSL, profiles: *const c_char) -> c_int;
|
||||
|
||||
pub fn SSL_get_srtp_profiles(ssl: *mut SSL) -> *mut stack_st_SRTP_PROTECTION_PROFILE;
|
||||
pub fn SSL_get_selected_srtp_profile(ssl: *mut SSL) -> *mut SRTP_PROTECTION_PROFILE;
|
||||
}
|
||||
1009
vendor/openssl-sys/src/handwritten/ssl.rs
vendored
Normal file
1009
vendor/openssl-sys/src/handwritten/ssl.rs
vendored
Normal file
File diff suppressed because it is too large
Load diff
47
vendor/openssl-sys/src/handwritten/stack.rs
vendored
Normal file
47
vendor/openssl-sys/src/handwritten/stack.rs
vendored
Normal file
|
|
@ -0,0 +1,47 @@
|
|||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub enum OPENSSL_STACK {}
|
||||
} else if #[cfg(libressl390)] {
|
||||
pub enum _STACK {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct _STACK {
|
||||
pub num: c_int,
|
||||
pub data: *mut *mut c_char,
|
||||
pub sorted: c_int,
|
||||
pub num_alloc: c_int,
|
||||
pub comp: Option<unsafe extern "C" fn(*const c_void, *const c_void) -> c_int>,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
extern "C" {
|
||||
pub fn OPENSSL_sk_num(stack: *const OPENSSL_STACK) -> c_int;
|
||||
pub fn OPENSSL_sk_value(stack: *const OPENSSL_STACK, idx: c_int) -> *mut c_void;
|
||||
|
||||
pub fn OPENSSL_sk_new_null() -> *mut OPENSSL_STACK;
|
||||
pub fn OPENSSL_sk_free(st: *mut OPENSSL_STACK);
|
||||
pub fn OPENSSL_sk_pop_free(
|
||||
st: *mut OPENSSL_STACK,
|
||||
free: Option<unsafe extern "C" fn(*mut c_void)>,
|
||||
);
|
||||
pub fn OPENSSL_sk_push(st: *mut OPENSSL_STACK, data: *const c_void) -> c_int;
|
||||
pub fn OPENSSL_sk_pop(st: *mut OPENSSL_STACK) -> *mut c_void;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn sk_num(st: *const _STACK) -> c_int;
|
||||
pub fn sk_value(st: *const _STACK, n: c_int) -> *mut c_void;
|
||||
|
||||
pub fn sk_new_null() -> *mut _STACK;
|
||||
pub fn sk_free(st: *mut _STACK);
|
||||
pub fn sk_pop_free(st: *mut _STACK, free: Option<unsafe extern "C" fn(*mut c_void)>);
|
||||
pub fn sk_push(st: *mut _STACK, data: *mut c_void) -> c_int;
|
||||
pub fn sk_pop(st: *mut _STACK) -> *mut c_void;
|
||||
}
|
||||
}
|
||||
}
|
||||
7
vendor/openssl-sys/src/handwritten/thread.rs
vendored
Normal file
7
vendor/openssl-sys/src/handwritten/thread.rs
vendored
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn OSSL_set_max_threads(ctx: *mut OSSL_LIB_CTX, max_threads: u64) -> c_int;
|
||||
pub fn OSSL_get_max_threads(ctx: *mut OSSL_LIB_CTX) -> u64;
|
||||
}
|
||||
28
vendor/openssl-sys/src/handwritten/tls1.rs
vendored
Normal file
28
vendor/openssl-sys/src/handwritten/tls1.rs
vendored
Normal file
|
|
@ -0,0 +1,28 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
extern "C" {
|
||||
pub fn SSL_get_servername(ssl: *const SSL, name_type: c_int) -> *const c_char;
|
||||
|
||||
pub fn SSL_export_keying_material(
|
||||
s: *mut SSL,
|
||||
out: *mut c_uchar,
|
||||
olen: size_t,
|
||||
label: *const c_char,
|
||||
llen: size_t,
|
||||
context: *const c_uchar,
|
||||
contextlen: size_t,
|
||||
use_context: c_int,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub fn SSL_export_keying_material_early(
|
||||
s: *mut SSL,
|
||||
out: *mut c_uchar,
|
||||
olen: size_t,
|
||||
label: *const c_char,
|
||||
llen: size_t,
|
||||
context: *const c_uchar,
|
||||
contextlen: size_t,
|
||||
) -> c_int;
|
||||
}
|
||||
1146
vendor/openssl-sys/src/handwritten/types.rs
vendored
Normal file
1146
vendor/openssl-sys/src/handwritten/types.rs
vendored
Normal file
File diff suppressed because it is too large
Load diff
781
vendor/openssl-sys/src/handwritten/x509.rs
vendored
Normal file
781
vendor/openssl-sys/src/handwritten/x509.rs
vendored
Normal file
|
|
@ -0,0 +1,781 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(libressl400)] {
|
||||
pub enum X509_VAL {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_VAL {
|
||||
pub notBefore: *mut ASN1_TIME,
|
||||
pub notAfter: *mut ASN1_TIME,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub enum X509_NAME_ENTRY {}
|
||||
|
||||
stack!(stack_st_X509_NAME_ENTRY);
|
||||
|
||||
stack!(stack_st_X509_NAME);
|
||||
|
||||
pub enum X509_EXTENSION {}
|
||||
|
||||
stack!(stack_st_X509_EXTENSION);
|
||||
|
||||
pub enum X509_ATTRIBUTE {}
|
||||
|
||||
stack!(stack_st_X509_ATTRIBUTE);
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_REQ_INFO {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_REQ_INFO {
|
||||
pub enc: ASN1_ENCODING,
|
||||
pub version: *mut ASN1_INTEGER,
|
||||
pub subject: *mut X509_NAME,
|
||||
pubkey: *mut c_void,
|
||||
pub attributes: *mut stack_st_X509_ATTRIBUTE,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_CRL {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_CRL {
|
||||
pub crl: *mut X509_CRL_INFO,
|
||||
sig_alg: *mut X509_ALGOR,
|
||||
signature: *mut c_void,
|
||||
references: c_int,
|
||||
flags: c_int,
|
||||
akid: *mut c_void,
|
||||
idp: *mut c_void,
|
||||
idp_flags: c_int,
|
||||
idp_reasons: c_int,
|
||||
crl_number: *mut ASN1_INTEGER,
|
||||
base_crl_number: *mut ASN1_INTEGER,
|
||||
sha1_hash: [c_uchar; 20],
|
||||
issuers: *mut c_void,
|
||||
meth: *const c_void,
|
||||
meth_data: *mut c_void,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
stack!(stack_st_X509_CRL);
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_CRL_INFO {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_CRL_INFO {
|
||||
version: *mut ASN1_INTEGER,
|
||||
sig_alg: *mut X509_ALGOR,
|
||||
pub issuer: *mut X509_NAME,
|
||||
pub lastUpdate: *mut ASN1_TIME,
|
||||
pub nextUpdate: *mut ASN1_TIME,
|
||||
pub revoked: *mut stack_st_X509_REVOKED,
|
||||
extensions: *mut stack_st_X509_EXTENSION,
|
||||
enc: ASN1_ENCODING,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_REVOKED {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_REVOKED {
|
||||
pub serialNumber: *mut ASN1_INTEGER,
|
||||
pub revocationDate: *mut ASN1_TIME,
|
||||
pub extensions: *mut stack_st_X509_EXTENSION,
|
||||
issuer: *mut stack_st_GENERAL_NAME,
|
||||
reason: c_int,
|
||||
sequence: c_int,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
stack!(stack_st_X509_REVOKED);
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_REQ {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_REQ {
|
||||
pub req_info: *mut X509_REQ_INFO,
|
||||
sig_alg: *mut c_void,
|
||||
signature: *mut c_void,
|
||||
references: c_int,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
pub enum X509_CINF {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_CINF {
|
||||
version: *mut c_void,
|
||||
serialNumber: *mut c_void,
|
||||
signature: *mut c_void,
|
||||
issuer: *mut c_void,
|
||||
pub validity: *mut X509_VAL,
|
||||
subject: *mut c_void,
|
||||
key: *mut c_void,
|
||||
issuerUID: *mut c_void,
|
||||
subjectUID: *mut c_void,
|
||||
pub extensions: *mut stack_st_X509_EXTENSION,
|
||||
enc: ASN1_ENCODING,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
stack!(stack_st_X509);
|
||||
|
||||
stack!(stack_st_X509_OBJECT);
|
||||
|
||||
stack!(stack_st_X509_LOOKUP);
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_verify_cert_error_string(n: c_long) -> *const c_char;
|
||||
|
||||
pub fn X509_sign(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
|
||||
|
||||
pub fn X509_digest(
|
||||
x: *const X509,
|
||||
digest: *const EVP_MD,
|
||||
buf: *mut c_uchar,
|
||||
len: *mut c_uint,
|
||||
) -> c_int;
|
||||
|
||||
pub fn X509_REQ_sign(x: *mut X509_REQ, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] X509) -> c_int;
|
||||
pub fn i2d_X509_REQ_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] X509_REQ) -> c_int;
|
||||
pub fn i2d_PrivateKey_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
|
||||
pub fn i2d_PUBKEY_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn i2d_PUBKEY(k: #[const_ptr_if(ossl300)] EVP_PKEY, buf: *mut *mut u8) -> c_int;
|
||||
pub fn i2d_RSA_PUBKEY(k: #[const_ptr_if(ossl300)] RSA, buf: *mut *mut u8) -> c_int;
|
||||
pub fn i2d_DSA_PUBKEY(a: #[const_ptr_if(ossl300)] DSA, pp: *mut *mut c_uchar) -> c_int;
|
||||
pub fn i2d_PrivateKey(k: #[const_ptr_if(ossl300)] EVP_PKEY, buf: *mut *mut u8) -> c_int;
|
||||
pub fn i2d_ECPrivateKey(ec_key: #[const_ptr_if(ossl300)] EC_KEY, pp: *mut *mut c_uchar) -> c_int;
|
||||
pub fn i2d_EC_PUBKEY(a: #[const_ptr_if(ossl300)] EC_KEY, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn d2i_PUBKEY(k: *mut *mut EVP_PKEY, buf: *mut *const u8, len: c_long) -> *mut EVP_PKEY;
|
||||
pub fn d2i_RSA_PUBKEY(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
|
||||
pub fn d2i_DSA_PUBKEY(k: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long) -> *mut DSA;
|
||||
pub fn d2i_EC_PUBKEY(
|
||||
a: *mut *mut EC_KEY,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut EC_KEY;
|
||||
|
||||
pub fn d2i_ECPrivateKey(
|
||||
k: *mut *mut EC_KEY,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut EC_KEY;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
#[cfg(any(ossl102, libressl350))]
|
||||
pub fn X509_ALGOR_get0(
|
||||
paobj: *mut #[const_ptr_if(any(ossl110, libressl350))] ASN1_OBJECT,
|
||||
pptype: *mut c_int,
|
||||
ppval: *mut #[const_ptr_if(any(ossl110, libressl350))] c_void,
|
||||
alg: #[const_ptr_if(any(ossl110, libressl350))] X509_ALGOR,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_gmtime_adj(time: *mut ASN1_TIME, adj: c_long) -> *mut ASN1_TIME;
|
||||
|
||||
pub fn X509_to_X509_REQ(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> *mut X509_REQ;
|
||||
|
||||
pub fn X509_ALGOR_free(x: *mut X509_ALGOR);
|
||||
|
||||
pub fn X509_REVOKED_new() -> *mut X509_REVOKED;
|
||||
pub fn X509_REVOKED_free(x: *mut X509_REVOKED);
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_REVOKED_dup(rev: #[const_ptr_if(ossl300)] X509_REVOKED) -> *mut X509_REVOKED;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn d2i_X509_REVOKED(
|
||||
a: *mut *mut X509_REVOKED,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut X509_REVOKED;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509_REVOKED(x: #[const_ptr_if(ossl300)] X509_REVOKED, buf: *mut *mut u8) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_CRL_new() -> *mut X509_CRL;
|
||||
pub fn X509_CRL_free(x: *mut X509_CRL);
|
||||
pub fn d2i_X509_CRL(
|
||||
a: *mut *mut X509_CRL,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut X509_CRL;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509_CRL(x: #[const_ptr_if(ossl300)] X509_CRL, buf: *mut *mut u8) -> c_int;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_CRL_dup(x: #[const_ptr_if(ossl300)] X509_CRL) -> *mut X509_CRL;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_REQ_new() -> *mut X509_REQ;
|
||||
pub fn X509_REQ_free(x: *mut X509_REQ);
|
||||
pub fn d2i_X509_REQ(
|
||||
a: *mut *mut X509_REQ,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut X509_REQ;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509_REQ(x: #[const_ptr_if(ossl300)] X509_REQ, buf: *mut *mut u8) -> c_int;
|
||||
|
||||
#[cfg(any(ossl102, libressl273))]
|
||||
pub fn X509_get0_signature(
|
||||
psig: *mut #[const_ptr_if(any(ossl110, libressl273))] ASN1_BIT_STRING,
|
||||
palg: *mut #[const_ptr_if(any(ossl110, libressl273))] X509_ALGOR,
|
||||
x: *const X509,
|
||||
);
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_REQ_dup(x: #[const_ptr_if(ossl300)] X509_REQ) -> *mut X509_REQ;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
#[cfg(ossl102)]
|
||||
pub fn X509_get_signature_nid(x: *const X509) -> c_int;
|
||||
|
||||
pub fn X509_EXTENSION_free(ext: *mut X509_EXTENSION);
|
||||
|
||||
pub fn X509_NAME_ENTRY_free(x: *mut X509_NAME_ENTRY);
|
||||
|
||||
pub fn X509_NAME_new() -> *mut X509_NAME;
|
||||
pub fn X509_NAME_cmp(x: *const X509_NAME, y: *const X509_NAME) -> c_int;
|
||||
pub fn X509_NAME_free(x: *mut X509_NAME);
|
||||
|
||||
pub fn X509_new() -> *mut X509;
|
||||
pub fn X509_free(x: *mut X509);
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509(x: #[const_ptr_if(ossl300)] X509, buf: *mut *mut u8) -> c_int;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_NAME_dup(x: #[const_ptr_if(ossl300)] X509_NAME) -> *mut X509_NAME;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_dup(x: #[const_ptr_if(ossl300)] X509) -> *mut X509;
|
||||
#[cfg(any(ossl101, libressl350))]
|
||||
pub fn X509_NAME_add_entry(
|
||||
name: *mut X509_NAME,
|
||||
ne: #[const_ptr_if(any(ossl110, libressl))] X509_NAME_ENTRY,
|
||||
loc: c_int,
|
||||
set: c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn d2i_X509(a: *mut *mut X509, pp: *mut *const c_uchar, length: c_long) -> *mut X509;
|
||||
pub fn d2i_X509_bio(b: *mut BIO, a: *mut *mut X509) -> *mut X509;
|
||||
|
||||
pub fn X509_get_pubkey(x: *mut X509) -> *mut EVP_PKEY;
|
||||
|
||||
pub fn X509_set_version(x: *mut X509, version: c_long) -> c_int;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get_version(x: *const X509) -> c_long;
|
||||
pub fn X509_set_serialNumber(x: *mut X509, sn: *mut ASN1_INTEGER) -> c_int;
|
||||
pub fn X509_get_serialNumber(x: *mut X509) -> *mut ASN1_INTEGER;
|
||||
pub fn X509_alias_get0(x: *mut X509, len: *mut c_int) -> *mut c_uchar;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_set_issuer_name(x: *mut X509, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_issuer_name_hash(x: *mut X509) -> c_ulong;
|
||||
pub fn X509_subject_name_hash(x: *mut X509) -> c_ulong;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_get_issuer_name(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> *mut X509_NAME;
|
||||
pub fn X509_set_subject_name(x: *mut X509, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
|
||||
pub fn X509_get_subject_name(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> *mut X509_NAME;
|
||||
}
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
extern "C" {
|
||||
pub fn X509_set1_notBefore(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
|
||||
pub fn X509_set1_notAfter(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn X509_set_notBefore(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
|
||||
pub fn X509_set_notAfter(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl350))]
|
||||
pub fn X509_REQ_get_version(req: *const X509_REQ) -> c_long;
|
||||
pub fn X509_REQ_set_version(req: *mut X509_REQ, version: c_long) -> c_int;
|
||||
#[cfg(any(ossl110, libressl350))]
|
||||
pub fn X509_REQ_get_subject_name(req: *const X509_REQ) -> *mut X509_NAME;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_REQ_set_subject_name(req: *mut X509_REQ, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_REQ_set_pubkey(req: *mut X509_REQ, pkey: *mut EVP_PKEY) -> c_int;
|
||||
pub fn X509_REQ_get_pubkey(req: *mut X509_REQ) -> *mut EVP_PKEY;
|
||||
pub fn X509_REQ_get_extensions(req: *mut X509_REQ) -> *mut stack_st_X509_EXTENSION;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_REQ_add_extensions(req: *mut X509_REQ, exts: #[const_ptr_if(ossl300)] stack_st_X509_EXTENSION)
|
||||
-> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_REQ_get_attr_count(req: *const X509_REQ) -> c_int;
|
||||
pub fn X509_REQ_get_attr_by_NID(req: *const X509_REQ, nid: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_REQ_get_attr(req: *const X509_REQ, loc: c_int) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_REQ_delete_attr(req: *mut X509_REQ, loc: c_int) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_REQ_add1_attr_by_txt(
|
||||
req: *mut X509_REQ,
|
||||
attrname: *const c_char,
|
||||
chtype: c_int,
|
||||
bytes: *const c_uchar,
|
||||
len: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509_REQ_add1_attr_by_NID(
|
||||
req: *mut X509_REQ,
|
||||
nid: c_int,
|
||||
chtype: c_int,
|
||||
bytes: *const c_uchar,
|
||||
len: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509_REQ_add1_attr_by_OBJ(
|
||||
req: *mut X509_REQ,
|
||||
obj: *const ASN1_OBJECT,
|
||||
chtype: c_int,
|
||||
bytes: *const c_uchar,
|
||||
len: c_int,
|
||||
) -> c_int;
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_set_pubkey(x: *mut X509, pkey: *mut EVP_PKEY) -> c_int;
|
||||
pub fn X509_REQ_verify(req: *mut X509_REQ, pkey: *mut EVP_PKEY) -> c_int;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn X509_getm_notBefore(x: *const X509) -> *mut ASN1_TIME;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn X509_getm_notAfter(x: *const X509) -> *mut ASN1_TIME;
|
||||
#[cfg(any(ossl110, libressl273))]
|
||||
pub fn X509_up_ref(x: *mut X509) -> c_int;
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_REVOKED_get0_serialNumber(req: *const X509_REVOKED) -> *const ASN1_INTEGER;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_REVOKED_get0_revocationDate(req: *const X509_REVOKED) -> *const ASN1_TIME;
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_REVOKED_get0_extensions(r: *const X509_REVOKED) -> *const stack_st_X509_EXTENSION;
|
||||
|
||||
pub fn X509_REVOKED_set_serialNumber(r: *mut X509_REVOKED, serial: *mut ASN1_INTEGER) -> c_int;
|
||||
pub fn X509_REVOKED_set_revocationDate(r: *mut X509_REVOKED, tm: *mut ASN1_TIME) -> c_int;
|
||||
|
||||
pub fn X509_CRL_sign(x: *mut X509_CRL, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
|
||||
pub fn X509_CRL_digest(
|
||||
x: *const X509_CRL,
|
||||
digest: *const EVP_MD,
|
||||
md: *mut c_uchar,
|
||||
len: *mut c_uint,
|
||||
) -> c_int;
|
||||
pub fn X509_CRL_verify(crl: *mut X509_CRL, pkey: *mut EVP_PKEY) -> c_int;
|
||||
pub fn X509_CRL_get0_by_cert(
|
||||
x: *mut X509_CRL,
|
||||
ret: *mut *mut X509_REVOKED,
|
||||
cert: *mut X509,
|
||||
) -> c_int;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_CRL_get0_by_serial(
|
||||
x: *mut X509_CRL,
|
||||
ret: *mut *mut X509_REVOKED,
|
||||
serial: #[const_ptr_if(ossl300)] ASN1_INTEGER,
|
||||
) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl281))]
|
||||
pub fn X509_CRL_get_REVOKED(crl: *mut X509_CRL) -> *mut stack_st_X509_REVOKED;
|
||||
#[cfg(any(ossl110, libressl281))]
|
||||
pub fn X509_CRL_get0_nextUpdate(x: *const X509_CRL) -> *const ASN1_TIME;
|
||||
#[cfg(any(ossl110, libressl281))]
|
||||
pub fn X509_CRL_get0_lastUpdate(x: *const X509_CRL) -> *const ASN1_TIME;
|
||||
#[cfg(any(ossl110, libressl281))]
|
||||
pub fn X509_CRL_get_issuer(x: *const X509_CRL) -> *mut X509_NAME;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get0_extensions(req: *const X509) -> *const stack_st_X509_EXTENSION;
|
||||
|
||||
pub fn X509_CRL_set_version(crl: *mut X509_CRL, version: c_long) -> c_int;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_CRL_set_issuer_name(crl: *mut X509_CRL, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_CRL_sort(crl: *mut X509_CRL) -> c_int;
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_CRL_up_ref(crl: *mut X509_CRL) -> c_int;
|
||||
pub fn X509_CRL_add0_revoked(crl: *mut X509_CRL, rev: *mut X509_REVOKED) -> c_int;
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl270))] {
|
||||
extern "C" {
|
||||
pub fn X509_CRL_set1_lastUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
|
||||
pub fn X509_CRL_set1_nextUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
|
||||
}
|
||||
} else {
|
||||
// libressl270 kept them, ossl110 "#define"s them to the variants above
|
||||
extern "C" {
|
||||
pub fn X509_CRL_set_lastUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
|
||||
pub fn X509_CRL_set_nextUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_NAME_entry_count(n: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME) -> c_int;
|
||||
pub fn X509_NAME_get_index_by_NID(n: #[const_ptr_if(any(ossl300, libressl280))] X509_NAME, nid: c_int, last_pos: c_int) -> c_int;
|
||||
pub fn X509_NAME_get_entry(n: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME, loc: c_int) -> *mut X509_NAME_ENTRY;
|
||||
pub fn X509_NAME_add_entry_by_NID(
|
||||
x: *mut X509_NAME,
|
||||
field: c_int,
|
||||
ty: c_int,
|
||||
bytes: #[const_ptr_if(any(ossl110, libressl280))] c_uchar,
|
||||
len: c_int,
|
||||
loc: c_int,
|
||||
set: c_int,
|
||||
) -> c_int;
|
||||
pub fn i2d_X509_NAME(n: #[const_ptr_if(ossl300)] X509_NAME, buf: *mut *mut u8) -> c_int;
|
||||
pub fn X509_NAME_ENTRY_get_object(ne: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME_ENTRY) -> *mut ASN1_OBJECT;
|
||||
pub fn X509_NAME_ENTRY_get_data(ne: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME_ENTRY) -> *mut ASN1_STRING;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_NAME_add_entry_by_txt(
|
||||
x: *mut X509_NAME,
|
||||
field: *const c_char,
|
||||
ty: c_int,
|
||||
bytes: *const c_uchar,
|
||||
len: c_int,
|
||||
loc: c_int,
|
||||
set: c_int,
|
||||
) -> c_int;
|
||||
pub fn d2i_X509_NAME(
|
||||
n: *mut *mut X509_NAME,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut X509_NAME;
|
||||
}
|
||||
|
||||
// "raw" X509_EXTENSION related functions
|
||||
extern "C" {
|
||||
// in X509
|
||||
pub fn X509_delete_ext(x: *mut X509, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_add_ext(x: *mut X509, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
|
||||
pub fn X509_add1_ext_i2d(
|
||||
x: *mut X509,
|
||||
nid: c_int,
|
||||
value: *mut c_void,
|
||||
crit: c_int,
|
||||
flags: c_ulong,
|
||||
) -> c_int;
|
||||
// in X509_CRL
|
||||
pub fn X509_CRL_delete_ext(x: *mut X509_CRL, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_CRL_add_ext(x: *mut X509_CRL, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
|
||||
pub fn X509_CRL_add1_ext_i2d(
|
||||
x: *mut X509_CRL,
|
||||
nid: c_int,
|
||||
value: *mut c_void,
|
||||
crit: c_int,
|
||||
flags: c_ulong,
|
||||
) -> c_int;
|
||||
// in X509_REVOKED
|
||||
pub fn X509_REVOKED_delete_ext(x: *mut X509_REVOKED, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_REVOKED_add_ext(
|
||||
x: *mut X509_REVOKED,
|
||||
ext: *mut X509_EXTENSION,
|
||||
loc: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509_REVOKED_add1_ext_i2d(
|
||||
x: *mut X509_REVOKED,
|
||||
nid: c_int,
|
||||
value: *mut c_void,
|
||||
crit: c_int,
|
||||
flags: c_ulong,
|
||||
) -> c_int;
|
||||
// X509_EXTENSION stack
|
||||
// - these getters always used *const STACK
|
||||
pub fn X509v3_get_ext_count(x: *const stack_st_X509_EXTENSION) -> c_int;
|
||||
pub fn X509v3_get_ext_by_NID(
|
||||
x: *const stack_st_X509_EXTENSION,
|
||||
nid: c_int,
|
||||
lastpos: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509v3_get_ext_by_critical(
|
||||
x: *const stack_st_X509_EXTENSION,
|
||||
crit: c_int,
|
||||
lastpos: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509v3_get_ext(x: *const stack_st_X509_EXTENSION, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509v3_delete_ext(x: *mut stack_st_X509_EXTENSION, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509v3_add_ext(
|
||||
x: *mut *mut stack_st_X509_EXTENSION,
|
||||
ex: *mut X509_EXTENSION,
|
||||
loc: c_int,
|
||||
) -> *mut stack_st_X509_EXTENSION;
|
||||
// - X509V3_add1_i2d in x509v3.rs
|
||||
// X509_EXTENSION itself
|
||||
pub fn X509_EXTENSION_create_by_NID(
|
||||
ex: *mut *mut X509_EXTENSION,
|
||||
nid: c_int,
|
||||
crit: c_int,
|
||||
data: *mut ASN1_OCTET_STRING,
|
||||
) -> *mut X509_EXTENSION;
|
||||
pub fn X509_EXTENSION_set_critical(ex: *mut X509_EXTENSION, crit: c_int) -> c_int;
|
||||
pub fn X509_EXTENSION_set_data(ex: *mut X509_EXTENSION, data: *mut ASN1_OCTET_STRING) -> c_int;
|
||||
pub fn X509_EXTENSION_get_object(ext: *mut X509_EXTENSION) -> *mut ASN1_OBJECT;
|
||||
pub fn X509_EXTENSION_get_data(ext: *mut X509_EXTENSION) -> *mut ASN1_OCTET_STRING;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn i2d_X509_EXTENSION(ext: #[const_ptr_if(ossl300)] X509_EXTENSION, pp: *mut *mut c_uchar) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
// in X509
|
||||
pub fn X509_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> c_int;
|
||||
pub fn X509_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509, nid: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
|
||||
pub fn X509_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509, crit: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_get_ext_d2i(
|
||||
x: #[const_ptr_if(any(ossl110, libressl280))] X509,
|
||||
nid: c_int,
|
||||
crit: *mut c_int,
|
||||
idx: *mut c_int,
|
||||
) -> *mut c_void;
|
||||
// in X509_CRL
|
||||
pub fn X509_CRL_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL) -> c_int;
|
||||
pub fn X509_CRL_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, nid: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_CRL_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
|
||||
pub fn X509_CRL_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, crit: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_CRL_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_CRL_get_ext_d2i(
|
||||
x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL,
|
||||
nid: c_int,
|
||||
crit: *mut c_int,
|
||||
idx: *mut c_int,
|
||||
) -> *mut c_void;
|
||||
// in X509_REVOKED
|
||||
pub fn X509_REVOKED_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED) -> c_int;
|
||||
pub fn X509_REVOKED_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, nid: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_REVOKED_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
|
||||
pub fn X509_REVOKED_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, crit: c_int, lastpos: c_int) -> c_int;
|
||||
pub fn X509_REVOKED_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, loc: c_int) -> *mut X509_EXTENSION;
|
||||
pub fn X509_REVOKED_get_ext_d2i(
|
||||
x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED,
|
||||
nid: c_int,
|
||||
crit: *mut c_int,
|
||||
idx: *mut c_int,
|
||||
) -> *mut c_void;
|
||||
// X509_EXTENSION stack
|
||||
pub fn X509v3_get_ext_by_OBJ(x: *const stack_st_X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
|
||||
// X509_EXTENSION itself
|
||||
pub fn X509_EXTENSION_create_by_OBJ(ex: *mut *mut X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, crit: c_int, data: *mut ASN1_OCTET_STRING) -> *mut X509_EXTENSION;
|
||||
pub fn X509_EXTENSION_set_object(ex: *mut X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT) -> c_int;
|
||||
pub fn X509_EXTENSION_get_critical(ex: #[const_ptr_if(any(ossl110, libressl280))] X509_EXTENSION) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_verify_cert(ctx: *mut X509_STORE_CTX) -> c_int;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
pub fn X509_STORE_get0_objects(ctx: #[const_ptr_if(ossl300)] X509_STORE) -> *mut stack_st_X509_OBJECT;
|
||||
#[cfg(ossl300)]
|
||||
pub fn X509_STORE_get1_all_certs(ctx: *mut X509_STORE) -> *mut stack_st_X509;
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(any(ossl110, libressl270))]
|
||||
extern "C" {
|
||||
pub fn X509_OBJECT_get0_X509(x: *const X509_OBJECT) -> *mut X509;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
extern "C" {
|
||||
pub fn X509_OBJECT_free(a: *mut X509_OBJECT);
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn X509_OBJECT_free_contents(a: *mut X509_OBJECT);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_get_default_cert_file_env() -> *const c_char;
|
||||
pub fn X509_get_default_cert_file() -> *const c_char;
|
||||
pub fn X509_get_default_cert_dir_env() -> *const c_char;
|
||||
pub fn X509_get_default_cert_dir() -> *const c_char;
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_cmp(a: *const X509, b: *const X509) -> c_int;
|
||||
pub fn X509_issuer_and_serial_cmp(a: *const X509, b: *const X509) -> c_int;
|
||||
pub fn X509_issuer_name_cmp(a: *const X509, b: *const X509) -> c_int;
|
||||
pub fn X509_subject_name_cmp(a: *const X509, b: *const X509) -> c_int;
|
||||
pub fn X509_CRL_cmp(a: *const X509_CRL, b: *const X509_CRL) -> c_int;
|
||||
pub fn X509_CRL_match(a: *const X509_CRL, b: *const X509_CRL) -> c_int;
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_print(bio: *mut BIO, x509: *mut X509) -> c_int;
|
||||
pub fn X509_REQ_print(bio: *mut BIO, req: *mut X509_REQ) -> c_int;
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(libressl390)] {
|
||||
pub enum X509_PURPOSE {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct X509_PURPOSE {
|
||||
pub purpose: c_int,
|
||||
pub trust: c_int, // Default trust ID
|
||||
pub flags: c_int,
|
||||
pub check_purpose:
|
||||
Option<unsafe extern "C" fn(*const X509_PURPOSE, *const X509, c_int) -> c_int>,
|
||||
pub name: *mut c_char,
|
||||
pub sname: *mut c_char,
|
||||
pub usr_data: *mut c_void,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_PURPOSE_get_by_sname(sname: #[const_ptr_if(any(ossl110, libressl280))] c_char) -> c_int;
|
||||
pub fn X509_PURPOSE_get_id(purpose: #[const_ptr_if(any(ossl110, libressl280))] X509_PURPOSE) -> c_int;
|
||||
pub fn X509_PURPOSE_get0(idx: c_int) -> #[const_ptr_if(libressl390)] X509_PURPOSE;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_ATTRIBUTE_new() -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_ATTRIBUTE_free(attr: *mut X509_ATTRIBUTE);
|
||||
pub fn X509_ATTRIBUTE_create(
|
||||
nid: c_int,
|
||||
atrtype: c_int,
|
||||
value: *mut c_void,
|
||||
) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_ATTRIBUTE_create_by_NID(
|
||||
attr: *mut *mut X509_ATTRIBUTE,
|
||||
nid: c_int,
|
||||
atrtype: c_int,
|
||||
data: *const c_void,
|
||||
len: c_int,
|
||||
) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_ATTRIBUTE_create_by_OBJ(
|
||||
attr: *mut *mut X509_ATTRIBUTE,
|
||||
obj: *const ASN1_OBJECT,
|
||||
atrtype: c_int,
|
||||
data: *const c_void,
|
||||
len: c_int,
|
||||
) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_ATTRIBUTE_create_by_txt(
|
||||
attr: *mut *mut X509_ATTRIBUTE,
|
||||
atrname: *const c_char,
|
||||
atrtype: c_int,
|
||||
bytes: *const c_uchar,
|
||||
len: c_int,
|
||||
) -> *mut X509_ATTRIBUTE;
|
||||
pub fn X509_ATTRIBUTE_set1_object(attr: *mut X509_ATTRIBUTE, obj: *const ASN1_OBJECT) -> c_int;
|
||||
pub fn X509_ATTRIBUTE_set1_data(
|
||||
attr: *mut X509_ATTRIBUTE,
|
||||
attrtype: c_int,
|
||||
data: *const c_void,
|
||||
len: c_int,
|
||||
) -> c_int;
|
||||
pub fn X509_ATTRIBUTE_get0_data(
|
||||
attr: *mut X509_ATTRIBUTE,
|
||||
idx: c_int,
|
||||
atrtype: c_int,
|
||||
data: *mut c_void,
|
||||
) -> *mut c_void;
|
||||
pub fn X509_ATTRIBUTE_get0_object(attr: *mut X509_ATTRIBUTE) -> *mut ASN1_OBJECT;
|
||||
pub fn X509_ATTRIBUTE_get0_type(attr: *mut X509_ATTRIBUTE, idx: c_int) -> *mut ASN1_TYPE;
|
||||
pub fn d2i_X509_ATTRIBUTE(
|
||||
a: *mut *mut X509_ATTRIBUTE,
|
||||
pp: *mut *const c_uchar,
|
||||
length: c_long,
|
||||
) -> *mut X509_ATTRIBUTE;
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_ATTRIBUTE_count(
|
||||
attr: #[const_ptr_if(any(ossl110, libressl280))] X509_ATTRIBUTE // const since OpenSSL v1.1.0
|
||||
) -> c_int;
|
||||
pub fn i2d_X509_ATTRIBUTE(x: #[const_ptr_if(ossl300)] X509_ATTRIBUTE, buf: *mut *mut u8) -> c_int;
|
||||
pub fn X509_ATTRIBUTE_dup(x: #[const_ptr_if(ossl300)] X509_ATTRIBUTE) -> *mut X509_ATTRIBUTE;
|
||||
}
|
||||
}
|
||||
141
vendor/openssl-sys/src/handwritten/x509_vfy.rs
vendored
Normal file
141
vendor/openssl-sys/src/handwritten/x509_vfy.rs
vendored
Normal file
|
|
@ -0,0 +1,141 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
#[cfg(any(libressl, all(ossl102, not(ossl110))))]
|
||||
pub enum X509_VERIFY_PARAM_ID {}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_LOOKUP_meth_free(method: *mut X509_LOOKUP_METHOD);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_LOOKUP_hash_dir() -> #[const_ptr_if(libressl400)] X509_LOOKUP_METHOD;
|
||||
pub fn X509_LOOKUP_file() -> #[const_ptr_if(libressl400)] X509_LOOKUP_METHOD;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_LOOKUP_free(ctx: *mut X509_LOOKUP);
|
||||
pub fn X509_LOOKUP_ctrl(
|
||||
ctx: *mut X509_LOOKUP,
|
||||
cmd: c_int,
|
||||
argc: *const c_char,
|
||||
argl: c_long,
|
||||
ret: *mut *mut c_char,
|
||||
) -> c_int;
|
||||
pub fn X509_load_cert_file(ctx: *mut X509_LOOKUP, file: *const c_char, _type: c_int) -> c_int;
|
||||
pub fn X509_load_crl_file(ctx: *mut X509_LOOKUP, file: *const c_char, _type: c_int) -> c_int;
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_STORE_new() -> *mut X509_STORE;
|
||||
pub fn X509_STORE_free(store: *mut X509_STORE);
|
||||
|
||||
pub fn X509_STORE_CTX_new() -> *mut X509_STORE_CTX;
|
||||
|
||||
pub fn X509_STORE_CTX_free(ctx: *mut X509_STORE_CTX);
|
||||
pub fn X509_STORE_CTX_init(
|
||||
ctx: *mut X509_STORE_CTX,
|
||||
store: *mut X509_STORE,
|
||||
x509: *mut X509,
|
||||
chain: *mut stack_st_X509,
|
||||
) -> c_int;
|
||||
pub fn X509_STORE_CTX_cleanup(ctx: *mut X509_STORE_CTX);
|
||||
|
||||
pub fn X509_STORE_add_cert(store: *mut X509_STORE, x: *mut X509) -> c_int;
|
||||
|
||||
pub fn X509_STORE_set_default_paths(store: *mut X509_STORE) -> c_int;
|
||||
pub fn X509_STORE_set_flags(store: *mut X509_STORE, flags: c_ulong) -> c_int;
|
||||
pub fn X509_STORE_set_purpose(ctx: *mut X509_STORE, purpose: c_int) -> c_int;
|
||||
pub fn X509_STORE_set_trust(ctx: *mut X509_STORE, trust: c_int) -> c_int;
|
||||
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_STORE_add_lookup(
|
||||
store: *mut X509_STORE,
|
||||
meth: #[const_ptr_if(libressl400)] X509_LOOKUP_METHOD,
|
||||
) -> *mut X509_LOOKUP;
|
||||
pub fn X509_STORE_set1_param(store: *mut X509_STORE, pm: #[const_ptr_if(ossl300)] X509_VERIFY_PARAM) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_STORE_CTX_get_ex_data(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX, idx: c_int) -> *mut c_void;
|
||||
pub fn X509_STORE_CTX_get_error(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> c_int;
|
||||
pub fn X509_STORE_CTX_get_error_depth(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> c_int;
|
||||
pub fn X509_STORE_CTX_get_current_cert(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> *mut X509;
|
||||
}
|
||||
}
|
||||
extern "C" {
|
||||
pub fn X509_STORE_CTX_set_error(ctx: *mut X509_STORE_CTX, error: c_int);
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl350))] {
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509_STORE_CTX_get0_chain(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> *mut stack_st_X509;
|
||||
}
|
||||
}
|
||||
} else {
|
||||
extern "C" {
|
||||
pub fn X509_STORE_CTX_get_chain(ctx: *mut X509_STORE_CTX) -> *mut stack_st_X509;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_new() -> *mut X509_VERIFY_PARAM;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_free(param: *mut X509_VERIFY_PARAM);
|
||||
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set_flags(param: *mut X509_VERIFY_PARAM, flags: c_ulong) -> c_int;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_clear_flags(param: *mut X509_VERIFY_PARAM, flags: c_ulong) -> c_int;
|
||||
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set_time(param: *mut X509_VERIFY_PARAM, t: time_t);
|
||||
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set_depth(param: *mut X509_VERIFY_PARAM, depth: c_int);
|
||||
}
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_get_flags(param: #[const_ptr_if(ossl300)] X509_VERIFY_PARAM) -> c_ulong;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set1_host(
|
||||
param: *mut X509_VERIFY_PARAM,
|
||||
name: *const c_char,
|
||||
namelen: size_t,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set_hostflags(param: *mut X509_VERIFY_PARAM, flags: c_uint);
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set1_email(
|
||||
param: *mut X509_VERIFY_PARAM,
|
||||
email: *const c_char,
|
||||
emaillen: size_t,
|
||||
) -> c_int;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn X509_VERIFY_PARAM_set1_ip(
|
||||
param: *mut X509_VERIFY_PARAM,
|
||||
ip: *const c_uchar,
|
||||
iplen: size_t,
|
||||
) -> c_int;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_VERIFY_PARAM_set_auth_level(param: *mut X509_VERIFY_PARAM, lvl: c_int);
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_VERIFY_PARAM_get_auth_level(param: *const X509_VERIFY_PARAM) -> c_int;
|
||||
#[cfg(ossl102)]
|
||||
pub fn X509_VERIFY_PARAM_set_purpose(param: *mut X509_VERIFY_PARAM, purpose: c_int) -> c_int;
|
||||
}
|
||||
167
vendor/openssl-sys/src/handwritten/x509v3.rs
vendored
Normal file
167
vendor/openssl-sys/src/handwritten/x509v3.rs
vendored
Normal file
|
|
@ -0,0 +1,167 @@
|
|||
use super::super::*;
|
||||
use libc::*;
|
||||
|
||||
pub enum CONF_METHOD {}
|
||||
|
||||
extern "C" {
|
||||
pub fn GENERAL_NAME_new() -> *mut GENERAL_NAME;
|
||||
pub fn GENERAL_NAME_free(name: *mut GENERAL_NAME);
|
||||
pub fn GENERAL_NAME_set0_othername(
|
||||
gen: *mut GENERAL_NAME,
|
||||
oid: *mut ASN1_OBJECT,
|
||||
value: *mut ASN1_TYPE,
|
||||
) -> c_int;
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct ACCESS_DESCRIPTION {
|
||||
pub method: *mut ASN1_OBJECT,
|
||||
pub location: *mut GENERAL_NAME,
|
||||
}
|
||||
|
||||
stack!(stack_st_ACCESS_DESCRIPTION);
|
||||
|
||||
extern "C" {
|
||||
pub fn ACCESS_DESCRIPTION_free(ad: *mut ACCESS_DESCRIPTION);
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct AUTHORITY_KEYID {
|
||||
pub keyid: *mut ASN1_OCTET_STRING,
|
||||
pub issuer: *mut stack_st_GENERAL_NAME,
|
||||
pub serial: *mut ASN1_INTEGER,
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn AUTHORITY_KEYID_free(akid: *mut AUTHORITY_KEYID);
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509V3_EXT_nconf_nid(
|
||||
conf: *mut CONF,
|
||||
ctx: *mut X509V3_CTX,
|
||||
ext_nid: c_int,
|
||||
value: #[const_ptr_if(any(ossl110, libressl280))] c_char,
|
||||
) -> *mut X509_EXTENSION;
|
||||
pub fn X509V3_EXT_nconf(
|
||||
conf: *mut CONF,
|
||||
ctx: *mut X509V3_CTX,
|
||||
name: #[const_ptr_if(any(ossl110, libressl280))] c_char,
|
||||
value: #[const_ptr_if(any(ossl110, libressl280))] c_char,
|
||||
) -> *mut X509_EXTENSION;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
pub fn X509_check_issued(issuer: *mut X509, subject: *mut X509) -> c_int;
|
||||
pub fn X509_verify(req: *mut X509, pkey: *mut EVP_PKEY) -> c_int;
|
||||
|
||||
pub fn X509V3_set_nconf(ctx: *mut X509V3_CTX, conf: *mut CONF);
|
||||
|
||||
pub fn X509V3_set_ctx(
|
||||
ctx: *mut X509V3_CTX,
|
||||
issuer: *mut X509,
|
||||
subject: *mut X509,
|
||||
req: *mut X509_REQ,
|
||||
crl: *mut X509_CRL,
|
||||
flags: c_int,
|
||||
);
|
||||
|
||||
pub fn X509_get1_ocsp(x: *mut X509) -> *mut stack_st_OPENSSL_STRING;
|
||||
}
|
||||
|
||||
const_ptr_api! {
|
||||
extern "C" {
|
||||
pub fn X509V3_get_d2i(
|
||||
x: #[const_ptr_if(any(ossl110, libressl280))] stack_st_X509_EXTENSION,
|
||||
nid: c_int,
|
||||
crit: *mut c_int,
|
||||
idx: *mut c_int,
|
||||
) -> *mut c_void;
|
||||
pub fn X509V3_extensions_print(out: *mut BIO, title: #[const_ptr_if(any(ossl110, libressl280))] c_char, exts: #[const_ptr_if(any(ossl110, libressl280))] stack_st_X509_EXTENSION, flag: c_ulong, indent: c_int) -> c_int;
|
||||
}
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
#[cfg(not(libressl390))]
|
||||
pub fn X509V3_EXT_add_alias(nid_to: c_int, nid_from: c_int) -> c_int;
|
||||
pub fn X509V3_EXT_d2i(ext: *mut X509_EXTENSION) -> *mut c_void;
|
||||
pub fn X509V3_EXT_i2d(ext_nid: c_int, crit: c_int, ext: *mut c_void) -> *mut X509_EXTENSION;
|
||||
pub fn X509V3_add1_i2d(
|
||||
x: *mut *mut stack_st_X509_EXTENSION,
|
||||
nid: c_int,
|
||||
value: *mut c_void,
|
||||
crit: c_int,
|
||||
flags: c_ulong,
|
||||
) -> c_int;
|
||||
pub fn X509V3_EXT_print(
|
||||
out: *mut BIO,
|
||||
ext: *mut X509_EXTENSION,
|
||||
flag: c_ulong,
|
||||
indent: c_int,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get_pathlen(x: *mut X509) -> c_long;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get_extension_flags(x: *mut X509) -> u32;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get_key_usage(x: *mut X509) -> u32;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get_extended_key_usage(x: *mut X509) -> u32;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get0_subject_key_id(x: *mut X509) -> *const ASN1_OCTET_STRING;
|
||||
#[cfg(ossl110)]
|
||||
pub fn X509_get0_authority_key_id(x: *mut X509) -> *const ASN1_OCTET_STRING;
|
||||
#[cfg(ossl111d)]
|
||||
pub fn X509_get0_authority_issuer(x: *mut X509) -> *const stack_st_GENERAL_NAME;
|
||||
#[cfg(ossl111d)]
|
||||
pub fn X509_get0_authority_serial(x: *mut X509) -> *const ASN1_INTEGER;
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct DIST_POINT_NAME {
|
||||
pub type_: c_int,
|
||||
pub name: DIST_POINT_NAME_st_anon_union,
|
||||
pub dpname: *mut X509_NAME,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub union DIST_POINT_NAME_st_anon_union {
|
||||
pub fullname: *mut stack_st_GENERAL_NAME,
|
||||
pub relativename: *mut stack_st_X509_NAME_ENTRY,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
pub struct DIST_POINT {
|
||||
pub distpoint: *mut DIST_POINT_NAME,
|
||||
pub reasons: *mut ASN1_BIT_STRING,
|
||||
pub CRLissuer: *mut stack_st_GENERAL_NAME,
|
||||
pub dp_reasons: c_int,
|
||||
}
|
||||
stack!(stack_st_DIST_POINT);
|
||||
|
||||
extern "C" {
|
||||
pub fn DIST_POINT_free(dist_point: *mut DIST_POINT);
|
||||
pub fn DIST_POINT_NAME_free(dist_point: *mut DIST_POINT_NAME);
|
||||
}
|
||||
|
||||
#[cfg(ossl102)]
|
||||
extern "C" {
|
||||
pub fn X509_check_host(
|
||||
x: *mut X509,
|
||||
chk: *const c_char,
|
||||
chklen: usize,
|
||||
flags: c_uint,
|
||||
peername: *mut *mut c_char,
|
||||
) -> c_int;
|
||||
pub fn X509_check_email(
|
||||
x: *mut X509,
|
||||
chk: *const c_char,
|
||||
chklen: usize,
|
||||
flags: c_uint,
|
||||
) -> c_int;
|
||||
pub fn X509_check_ip(x: *mut X509, chk: *const c_uchar, chklen: usize, flags: c_uint) -> c_int;
|
||||
pub fn X509_check_ip_asc(x: *mut X509, ipasc: *const c_char, flags: c_uint) -> c_int;
|
||||
}
|
||||
209
vendor/openssl-sys/src/lib.rs
vendored
Normal file
209
vendor/openssl-sys/src/lib.rs
vendored
Normal file
|
|
@ -0,0 +1,209 @@
|
|||
#![allow(
|
||||
clippy::missing_safety_doc,
|
||||
dead_code,
|
||||
non_camel_case_types,
|
||||
non_snake_case,
|
||||
non_upper_case_globals,
|
||||
unused_imports
|
||||
)]
|
||||
#![cfg_attr(feature = "unstable_boringssl", allow(ambiguous_glob_reexports))]
|
||||
#![doc(html_root_url = "https://docs.rs/openssl-sys/0.9")]
|
||||
#![recursion_limit = "128"] // configure fixed limit across all rust versions
|
||||
|
||||
extern crate libc;
|
||||
pub use libc::c_int;
|
||||
|
||||
#[cfg(feature = "unstable_boringssl")]
|
||||
extern crate bssl_sys;
|
||||
#[cfg(feature = "unstable_boringssl")]
|
||||
pub use bssl_sys::*;
|
||||
|
||||
#[cfg(all(boringssl, not(feature = "unstable_boringssl")))]
|
||||
#[path = "."]
|
||||
mod boringssl {
|
||||
include!(concat!(env!("OUT_DIR"), "/bindgen.rs"));
|
||||
|
||||
pub fn init() {
|
||||
unsafe {
|
||||
CRYPTO_library_init();
|
||||
}
|
||||
}
|
||||
}
|
||||
#[cfg(all(boringssl, not(feature = "unstable_boringssl")))]
|
||||
pub use boringssl::*;
|
||||
|
||||
#[cfg(openssl)]
|
||||
#[path = "."]
|
||||
mod openssl {
|
||||
use libc::*;
|
||||
|
||||
#[cfg(feature = "bindgen")]
|
||||
include!(concat!(env!("OUT_DIR"), "/bindgen.rs"));
|
||||
|
||||
pub use self::aes::*;
|
||||
pub use self::asn1::*;
|
||||
pub use self::bio::*;
|
||||
pub use self::bn::*;
|
||||
pub use self::cms::*;
|
||||
pub use self::crypto::*;
|
||||
pub use self::dtls1::*;
|
||||
pub use self::ec::*;
|
||||
pub use self::err::*;
|
||||
pub use self::evp::*;
|
||||
#[cfg(not(feature = "bindgen"))]
|
||||
pub use self::handwritten::*;
|
||||
pub use self::obj_mac::*;
|
||||
pub use self::ocsp::*;
|
||||
pub use self::pem::*;
|
||||
pub use self::pkcs7::*;
|
||||
pub use self::rsa::*;
|
||||
pub use self::sha::*;
|
||||
pub use self::srtp::*;
|
||||
pub use self::ssl::*;
|
||||
pub use self::ssl3::*;
|
||||
pub use self::tls1::*;
|
||||
pub use self::types::*;
|
||||
pub use self::x509::*;
|
||||
pub use self::x509_vfy::*;
|
||||
pub use self::x509v3::*;
|
||||
|
||||
#[macro_use]
|
||||
mod macros;
|
||||
|
||||
mod aes;
|
||||
mod asn1;
|
||||
mod bio;
|
||||
mod bn;
|
||||
mod cms;
|
||||
mod crypto;
|
||||
mod dtls1;
|
||||
mod ec;
|
||||
mod err;
|
||||
mod evp;
|
||||
#[cfg(not(feature = "bindgen"))]
|
||||
mod handwritten;
|
||||
mod obj_mac;
|
||||
mod ocsp;
|
||||
mod pem;
|
||||
mod pkcs7;
|
||||
mod rsa;
|
||||
mod sha;
|
||||
mod srtp;
|
||||
mod ssl;
|
||||
mod ssl3;
|
||||
mod tls1;
|
||||
mod types;
|
||||
mod x509;
|
||||
mod x509_vfy;
|
||||
mod x509v3;
|
||||
|
||||
use std::sync::Once;
|
||||
// explicitly initialize to work around https://github.com/openssl/openssl/issues/3505
|
||||
static INIT: Once = Once::new();
|
||||
|
||||
// FIXME remove
|
||||
pub type PasswordCallback = unsafe extern "C" fn(
|
||||
buf: *mut c_char,
|
||||
size: c_int,
|
||||
rwflag: c_int,
|
||||
user_data: *mut c_void,
|
||||
) -> c_int;
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub fn init() {
|
||||
use std::ptr;
|
||||
|
||||
#[cfg(not(ossl111b))]
|
||||
let init_options = OPENSSL_INIT_LOAD_SSL_STRINGS;
|
||||
#[cfg(ossl111b)]
|
||||
let init_options = OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_NO_ATEXIT;
|
||||
|
||||
INIT.call_once(|| unsafe {
|
||||
OPENSSL_init_ssl(init_options, ptr::null_mut());
|
||||
})
|
||||
}
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn init() {
|
||||
use std::io::{self, Write};
|
||||
use std::mem;
|
||||
use std::process;
|
||||
use std::sync::{Mutex, MutexGuard};
|
||||
|
||||
static mut MUTEXES: *mut Vec<Mutex<()>> = 0 as *mut Vec<Mutex<()>>;
|
||||
static mut GUARDS: *mut Vec<Option<MutexGuard<'static, ()>>> =
|
||||
0 as *mut Vec<Option<MutexGuard<'static, ()>>>;
|
||||
|
||||
unsafe extern "C" fn locking_function(
|
||||
mode: c_int,
|
||||
n: c_int,
|
||||
_file: *const c_char,
|
||||
_line: c_int,
|
||||
) {
|
||||
let mutex = &(*MUTEXES)[n as usize];
|
||||
|
||||
if mode & CRYPTO_LOCK != 0 {
|
||||
(*GUARDS)[n as usize] = Some(mutex.lock().unwrap());
|
||||
} else {
|
||||
if let None = (*GUARDS)[n as usize].take() {
|
||||
let _ = writeln!(
|
||||
io::stderr(),
|
||||
"BUG: rust-openssl lock {} already unlocked, aborting",
|
||||
n
|
||||
);
|
||||
process::abort();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(unix)] {
|
||||
fn set_id_callback() {
|
||||
unsafe extern "C" fn thread_id() -> c_ulong {
|
||||
::libc::pthread_self() as c_ulong
|
||||
}
|
||||
|
||||
unsafe {
|
||||
CRYPTO_set_id_callback__fixed_rust(Some(thread_id));
|
||||
}
|
||||
}
|
||||
} else {
|
||||
fn set_id_callback() {}
|
||||
}
|
||||
}
|
||||
|
||||
INIT.call_once(|| unsafe {
|
||||
SSL_library_init();
|
||||
SSL_load_error_strings();
|
||||
OPENSSL_add_all_algorithms_noconf();
|
||||
|
||||
let num_locks = CRYPTO_num_locks();
|
||||
let mut mutexes = Box::new(Vec::new());
|
||||
for _ in 0..num_locks {
|
||||
mutexes.push(Mutex::new(()));
|
||||
}
|
||||
MUTEXES = mem::transmute(mutexes);
|
||||
let guards: Box<Vec<Option<MutexGuard<()>>>> =
|
||||
Box::new((0..num_locks).map(|_| None).collect());
|
||||
GUARDS = mem::transmute(guards);
|
||||
|
||||
CRYPTO_set_locking_callback__fixed_rust(Some(locking_function));
|
||||
set_id_callback();
|
||||
})
|
||||
}
|
||||
|
||||
/// Disable explicit initialization of the openssl libs.
|
||||
///
|
||||
/// This is only appropriate to use if the openssl crate is being consumed by an application
|
||||
/// that will be performing the initialization explicitly.
|
||||
///
|
||||
/// # Safety
|
||||
///
|
||||
/// In some versions of openssl, skipping initialization will fall back to the default procedure
|
||||
/// while other will cause difficult to debug errors so care must be taken when calling this.
|
||||
pub unsafe fn assume_init() {
|
||||
INIT.call_once(|| {});
|
||||
}
|
||||
}
|
||||
#[cfg(openssl)]
|
||||
pub use openssl::*;
|
||||
280
vendor/openssl-sys/src/macros.rs
vendored
Normal file
280
vendor/openssl-sys/src/macros.rs
vendored
Normal file
|
|
@ -0,0 +1,280 @@
|
|||
#![allow(unused_macros)]
|
||||
|
||||
// vendored from the cfg-if crate to avoid breaking ctest
|
||||
macro_rules! cfg_if {
|
||||
// match if/else chains with a final `else`
|
||||
($(
|
||||
if #[cfg($($meta:meta),*)] { $($it:item)* }
|
||||
) else * else {
|
||||
$($it2:item)*
|
||||
}) => {
|
||||
cfg_if! {
|
||||
@__items
|
||||
() ;
|
||||
$( ( ($($meta),*) ($($it)*) ), )*
|
||||
( () ($($it2)*) ),
|
||||
}
|
||||
};
|
||||
|
||||
// match if/else chains lacking a final `else`
|
||||
(
|
||||
if #[cfg($($i_met:meta),*)] { $($i_it:item)* }
|
||||
$(
|
||||
else if #[cfg($($e_met:meta),*)] { $($e_it:item)* }
|
||||
)*
|
||||
) => {
|
||||
cfg_if! {
|
||||
@__items
|
||||
() ;
|
||||
( ($($i_met),*) ($($i_it)*) ),
|
||||
$( ( ($($e_met),*) ($($e_it)*) ), )*
|
||||
( () () ),
|
||||
}
|
||||
};
|
||||
|
||||
// Internal and recursive macro to emit all the items
|
||||
//
|
||||
// Collects all the negated cfgs in a list at the beginning and after the
|
||||
// semicolon is all the remaining items
|
||||
(@__items ($($not:meta,)*) ; ) => {};
|
||||
(@__items ($($not:meta,)*) ; ( ($($m:meta),*) ($($it:item)*) ), $($rest:tt)*) => {
|
||||
// Emit all items within one block, applying an appropriate #[cfg]. The
|
||||
// #[cfg] will require all `$m` matchers specified and must also negate
|
||||
// all previous matchers.
|
||||
cfg_if! { @__apply cfg(all($($m,)* not(any($($not),*)))), $($it)* }
|
||||
|
||||
// Recurse to emit all other items in `$rest`, and when we do so add all
|
||||
// our `$m` matchers to the list of `$not` matchers as future emissions
|
||||
// will have to negate everything we just matched as well.
|
||||
cfg_if! { @__items ($($not,)* $($m,)*) ; $($rest)* }
|
||||
};
|
||||
|
||||
// Internal macro to Apply a cfg attribute to a list of items
|
||||
(@__apply $m:meta, $($it:item)*) => {
|
||||
$(#[$m] $it)*
|
||||
};
|
||||
}
|
||||
|
||||
macro_rules! stack {
|
||||
($t:ident) => {
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl390))] {
|
||||
pub enum $t {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct $t {
|
||||
pub stack: $crate::_STACK,
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
// openssl changes `*mut` to `*const` in certain parameters in certain versions;
|
||||
// in C this is ABI and (mostly) API compatible.
|
||||
//
|
||||
// We need to handle this explicitly, and this macro helps annotate which
|
||||
// parameter got converted in which version.
|
||||
//
|
||||
// Input is:
|
||||
// extern "C" {
|
||||
// #[attributes...]
|
||||
// pub fn name(args) -> rettype; // `-> rettype` optional
|
||||
// // more functions...
|
||||
// }
|
||||
//
|
||||
// This macro replaces `#[const_ptr_if(...)]` in types with `*const` or `*mut`
|
||||
// (depending on the inner cfg flags)
|
||||
//
|
||||
// Walks through all argument and return types, but only finds inner types of
|
||||
// `*const` and `*mut`; doesn't walk arrays or generics.
|
||||
//
|
||||
// NOTE: can't abstract `pub` as `$fn_vis:vis`, as ctest macro handling doesn't
|
||||
// support it (old syntax crate). But we really only need `pub` anyway.
|
||||
//
|
||||
// NOTE: ctest seams to simply ignore macros it can't expand (whatever the
|
||||
// reason)
|
||||
macro_rules! const_ptr_api {
|
||||
// ----------------------------------------------------------------
|
||||
// (partialarg): partial argument, waiting for "final" argument type
|
||||
// MAGIC PART 1: hande conditional const ptr in argument type
|
||||
( (partialarg)
|
||||
{ $(#[$fn_attr:meta])* pub fn $fn_name:ident }
|
||||
$args_packed:tt
|
||||
[ $($part_arg:tt)* ]
|
||||
[ #[const_ptr_if( $($cfg:tt)* )] $($arg_rem:tt)* ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (partialarg) { #[cfg($($cfg)*)] $(#[$fn_attr])* pub fn $fn_name } $args_packed [ $($part_arg)* *const ] [ $($arg_rem)* ] $ret_packed );
|
||||
const_ptr_api!( (partialarg) { #[cfg(not($($cfg)*))] $(#[$fn_attr])* pub fn $fn_name } $args_packed [ $($part_arg)* *mut ] [ $($arg_rem)* ] $ret_packed );
|
||||
};
|
||||
// continue partial argument with `*mut` pointer (might need special const handling in inner type)
|
||||
( (partialarg)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $($part_arg:tt)* ]
|
||||
[ *mut $($arg_rem:tt)* ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (partialarg) $def_packed $args_packed [ $($part_arg)* *mut ] [ $($arg_rem)* ] $ret_packed );
|
||||
};
|
||||
// continue partial argument with `*const` pointer (might need special const handling in inner type)
|
||||
( (partialarg)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $($part_arg:tt)* ]
|
||||
[ *const $($arg_rem:tt)* ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (partialarg) $def_packed $args_packed [ $($part_arg)* *const ] [ $($arg_rem)* ] $ret_packed );
|
||||
};
|
||||
// finish partial argument with trailing comma
|
||||
( (partialarg)
|
||||
$def_packed:tt
|
||||
{ $($args_tt:tt)* }
|
||||
[ $($part_arg:tt)* ]
|
||||
[ $arg_ty:ty, $($arg_rem:tt)* ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (parseargs) $def_packed { $($args_tt)* { $($part_arg)* $arg_ty } } [ $($arg_rem)* ] $ret_packed );
|
||||
};
|
||||
// finish final partial argument (no trailing comma)
|
||||
( (partialarg)
|
||||
$def_packed:tt
|
||||
{ $($args_tt:tt)* }
|
||||
[ $($part_arg:tt)* ]
|
||||
[ $arg_ty:ty ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (parseargs) $def_packed { $($args_tt)* { $($part_arg)* $arg_ty } } [ ] $ret_packed );
|
||||
};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// (parseargs): parsing arguments
|
||||
// start next argument
|
||||
( (parseargs)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $arg_name:ident : $($arg_rem:tt)* ]
|
||||
$ret_packed:tt
|
||||
) => {
|
||||
const_ptr_api!( (partialarg) $def_packed $args_packed [ $arg_name: ] [ $($arg_rem)* ] $ret_packed );
|
||||
};
|
||||
// end of arguments, there is a return type; start parsing it
|
||||
( (parseargs)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ ]
|
||||
[ -> $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (partialret) $def_packed $args_packed [] [ $($rem)* ] );
|
||||
};
|
||||
// end of arguments, no return type
|
||||
( (parseargs)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ ]
|
||||
[ ]
|
||||
) => {
|
||||
const_ptr_api!( (generate) $def_packed $args_packed { () } );
|
||||
};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// (partialret): have partial return type, waiting for final return type
|
||||
// MAGIC PART 2: hande conditional const ptr in return type
|
||||
( (partialret)
|
||||
{ $(#[$fn_attr:meta])* pub fn $fn_name:ident }
|
||||
$args_packed:tt
|
||||
[ $($part_ret:tt)* ]
|
||||
[ #[const_ptr_if( $($cfg:tt)* )] $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (partialret) { #[cfg($($cfg)*)] $(#[$fn_attr])* pub fn $fn_name } $args_packed [ $($part_ret)* *const ] [ $($rem)* ] );
|
||||
const_ptr_api!( (partialret) { #[cfg(not($($cfg)*))] $(#[$fn_attr])* pub fn $fn_name } $args_packed [ $($part_ret)* *mut ] [ $($rem)* ] );
|
||||
};
|
||||
// `* mut` part in return type; continue parsing to find inner conditional const ptr
|
||||
( (partialret)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $($part_ret:tt)* ]
|
||||
[ *mut $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (partialret) $def_packed $args_packed [ $($part_ret)* *mut ] [ $($rem)* ] );
|
||||
};
|
||||
// `* const` part in return type; continue parsing to find inner conditional const ptr
|
||||
( (partialret)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $($part_ret:tt)* ]
|
||||
[ *const $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (partialret) $def_packed $args_packed [ $($part_ret)* *const ] [ $($rem)* ] );
|
||||
};
|
||||
// final part of return type
|
||||
( (partialret)
|
||||
$def_packed:tt
|
||||
$args_packed:tt
|
||||
[ $($part_ret:tt)* ]
|
||||
[ $ret_ty:ty ]
|
||||
) => {
|
||||
const_ptr_api!( (generate) $def_packed $args_packed { $($part_ret)* $ret_ty } );
|
||||
};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// generate
|
||||
( (generate)
|
||||
{ $(#[$fn_attr:meta])* pub fn $fn_name:ident }
|
||||
{ $({ $arg_name:ident: $($arg_ty:tt)* })* }
|
||||
{ $ret_ty:ty }
|
||||
) => {
|
||||
extern "C" {
|
||||
$(#[$fn_attr])*
|
||||
pub fn $fn_name( $(
|
||||
$arg_name: $($arg_ty)*
|
||||
),* ) -> $ret_ty;
|
||||
}
|
||||
};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// (fn): gather tokens for return type until ";"
|
||||
// found end; start parsing current function, and parse remaining functions
|
||||
( (fn)
|
||||
$def_packed:tt
|
||||
$arg_tts_packed:tt
|
||||
$ret_packed:tt
|
||||
[ ; $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (parseargs) $def_packed {} $arg_tts_packed $ret_packed );
|
||||
const_ptr_api!( (extern) [ $($rem)* ] );
|
||||
};
|
||||
// not ";" - all other tokens are part of the return type.
|
||||
// don't expand return type yet; otherwise we'd have to remember in which branch `rem` needs
|
||||
// to be used to parse further functions.
|
||||
( (fn)
|
||||
$def_packed:tt
|
||||
$arg_tts_packed:tt
|
||||
[ $($ret_tt:tt)* ]
|
||||
[ $tt:tt $($rem:tt)* ]
|
||||
) => {
|
||||
const_ptr_api!( (fn) $def_packed $arg_tts_packed [ $($ret_tt)* $tt ] [ $($rem)* ] );
|
||||
};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// (extern): in extern block, find next function
|
||||
// try to split into functions as fast as possible to reduce recursion depth
|
||||
( (extern) [
|
||||
$(#[$fn_attr:meta])*
|
||||
pub fn $fn_name:ident( $($arg_rem:tt)* ) $($rem:tt)*
|
||||
] ) => {
|
||||
const_ptr_api!( (fn)
|
||||
{ $(#[$fn_attr])* pub fn $fn_name } [ $($arg_rem)* ] [] [ $($rem)* ]
|
||||
);
|
||||
};
|
||||
// end of extern block
|
||||
( (extern) [] ) => {};
|
||||
|
||||
// ----------------------------------------------------------------
|
||||
// macro start; find extern block
|
||||
( extern "C" { $($rem:tt)* } ) => {
|
||||
const_ptr_api!( (extern) [ $($rem)* ] );
|
||||
};
|
||||
}
|
||||
1023
vendor/openssl-sys/src/obj_mac.rs
vendored
Normal file
1023
vendor/openssl-sys/src/obj_mac.rs
vendored
Normal file
File diff suppressed because it is too large
Load diff
35
vendor/openssl-sys/src/ocsp.rs
vendored
Normal file
35
vendor/openssl-sys/src/ocsp.rs
vendored
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
use libc::*;
|
||||
|
||||
pub const OCSP_REVOKED_STATUS_NOSTATUS: c_int = -1;
|
||||
pub const OCSP_REVOKED_STATUS_UNSPECIFIED: c_int = 0;
|
||||
pub const OCSP_REVOKED_STATUS_KEYCOMPROMISE: c_int = 1;
|
||||
pub const OCSP_REVOKED_STATUS_CACOMPROMISE: c_int = 2;
|
||||
pub const OCSP_REVOKED_STATUS_AFFILIATIONCHANGED: c_int = 3;
|
||||
pub const OCSP_REVOKED_STATUS_SUPERSEDED: c_int = 4;
|
||||
pub const OCSP_REVOKED_STATUS_CESSATIONOFOPERATION: c_int = 5;
|
||||
pub const OCSP_REVOKED_STATUS_CERTIFICATEHOLD: c_int = 6;
|
||||
pub const OCSP_REVOKED_STATUS_REMOVEFROMCRL: c_int = 8;
|
||||
|
||||
pub const OCSP_NOCERTS: c_ulong = 0x1;
|
||||
pub const OCSP_NOINTERN: c_ulong = 0x2;
|
||||
pub const OCSP_NOSIGS: c_ulong = 0x4;
|
||||
pub const OCSP_NOCHAIN: c_ulong = 0x8;
|
||||
pub const OCSP_NOVERIFY: c_ulong = 0x10;
|
||||
pub const OCSP_NOEXPLICIT: c_ulong = 0x20;
|
||||
pub const OCSP_NOCASIGN: c_ulong = 0x40;
|
||||
pub const OCSP_NODELEGATED: c_ulong = 0x80;
|
||||
pub const OCSP_NOCHECKS: c_ulong = 0x100;
|
||||
pub const OCSP_TRUSTOTHER: c_ulong = 0x200;
|
||||
pub const OCSP_RESPID_KEY: c_ulong = 0x400;
|
||||
pub const OCSP_NOTIME: c_ulong = 0x800;
|
||||
|
||||
pub const OCSP_RESPONSE_STATUS_SUCCESSFUL: c_int = 0;
|
||||
pub const OCSP_RESPONSE_STATUS_MALFORMEDREQUEST: c_int = 1;
|
||||
pub const OCSP_RESPONSE_STATUS_INTERNALERROR: c_int = 2;
|
||||
pub const OCSP_RESPONSE_STATUS_TRYLATER: c_int = 3;
|
||||
pub const OCSP_RESPONSE_STATUS_SIGREQUIRED: c_int = 5;
|
||||
pub const OCSP_RESPONSE_STATUS_UNAUTHORIZED: c_int = 6;
|
||||
|
||||
pub const V_OCSP_CERTSTATUS_GOOD: c_int = 0;
|
||||
pub const V_OCSP_CERTSTATUS_REVOKED: c_int = 1;
|
||||
pub const V_OCSP_CERTSTATUS_UNKNOWN: c_int = 2;
|
||||
3
vendor/openssl-sys/src/pem.rs
vendored
Normal file
3
vendor/openssl-sys/src/pem.rs
vendored
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
use libc::*;
|
||||
|
||||
pub const PEM_R_NO_START_LINE: c_int = 108;
|
||||
20
vendor/openssl-sys/src/pkcs7.rs
vendored
Normal file
20
vendor/openssl-sys/src/pkcs7.rs
vendored
Normal file
|
|
@ -0,0 +1,20 @@
|
|||
use libc::*;
|
||||
|
||||
pub const PKCS7_TEXT: c_int = 0x1;
|
||||
pub const PKCS7_NOCERTS: c_int = 0x2;
|
||||
pub const PKCS7_NOSIGS: c_int = 0x4;
|
||||
pub const PKCS7_NOCHAIN: c_int = 0x8;
|
||||
pub const PKCS7_NOINTERN: c_int = 0x10;
|
||||
pub const PKCS7_NOVERIFY: c_int = 0x20;
|
||||
pub const PKCS7_DETACHED: c_int = 0x40;
|
||||
pub const PKCS7_BINARY: c_int = 0x80;
|
||||
pub const PKCS7_NOATTR: c_int = 0x100;
|
||||
pub const PKCS7_NOSMIMECAP: c_int = 0x200;
|
||||
pub const PKCS7_NOOLDMIMETYPE: c_int = 0x400;
|
||||
pub const PKCS7_CRLFEOL: c_int = 0x800;
|
||||
pub const PKCS7_STREAM: c_int = 0x1000;
|
||||
pub const PKCS7_NOCRL: c_int = 0x2000;
|
||||
pub const PKCS7_PARTIAL: c_int = 0x4000;
|
||||
pub const PKCS7_REUSE_DIGEST: c_int = 0x8000;
|
||||
#[cfg(not(any(ossl101, ossl102, libressl)))]
|
||||
pub const PKCS7_NO_DUAL_CONTENT: c_int = 0x10000;
|
||||
101
vendor/openssl-sys/src/rsa.rs
vendored
Normal file
101
vendor/openssl-sys/src/rsa.rs
vendored
Normal file
|
|
@ -0,0 +1,101 @@
|
|||
use libc::*;
|
||||
use std::ptr;
|
||||
|
||||
use super::super::*;
|
||||
|
||||
pub const RSA_F4: c_long = 0x10001;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(ossl300))] {
|
||||
pub unsafe fn EVP_PKEY_CTX_set_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad: c_int) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
-1,
|
||||
EVP_PKEY_CTRL_RSA_PADDING,
|
||||
pad,
|
||||
ptr::null_mut(),
|
||||
)
|
||||
}
|
||||
pub unsafe fn EVP_PKEY_CTX_get_rsa_padding(ctx: *mut EVP_PKEY_CTX, ppad: *mut c_int) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
-1,
|
||||
EVP_PKEY_CTRL_GET_RSA_PADDING,
|
||||
0,
|
||||
ppad as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx: *mut EVP_PKEY_CTX, len: c_int) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY,
|
||||
EVP_PKEY_CTRL_RSA_PSS_SALTLEN,
|
||||
len,
|
||||
ptr::null_mut(),
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn EVP_PKEY_CTX_set_rsa_mgf1_md(ctx: *mut EVP_PKEY_CTX, md: *mut EVP_MD) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT,
|
||||
EVP_PKEY_CTRL_RSA_MGF1_MD,
|
||||
0,
|
||||
md as *mut c_void,
|
||||
)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(any(ossl102, libressl310))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set_rsa_oaep_md(ctx: *mut EVP_PKEY_CTX, md: *mut EVP_MD) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
EVP_PKEY_OP_TYPE_CRYPT,
|
||||
EVP_PKEY_CTRL_RSA_OAEP_MD,
|
||||
0,
|
||||
md as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(ossl102, libressl310))]
|
||||
pub unsafe fn EVP_PKEY_CTX_set0_rsa_oaep_label(
|
||||
ctx: *mut EVP_PKEY_CTX,
|
||||
label: *mut c_void,
|
||||
len: c_int,
|
||||
) -> c_int {
|
||||
EVP_PKEY_CTX_ctrl(
|
||||
ctx,
|
||||
EVP_PKEY_RSA,
|
||||
EVP_PKEY_OP_TYPE_CRYPT,
|
||||
EVP_PKEY_CTRL_RSA_OAEP_LABEL,
|
||||
len,
|
||||
label,
|
||||
)
|
||||
}
|
||||
|
||||
pub const EVP_PKEY_CTRL_RSA_PADDING: c_int = EVP_PKEY_ALG_CTRL + 1;
|
||||
pub const EVP_PKEY_CTRL_RSA_PSS_SALTLEN: c_int = EVP_PKEY_ALG_CTRL + 2;
|
||||
|
||||
pub const EVP_PKEY_CTRL_RSA_MGF1_MD: c_int = EVP_PKEY_ALG_CTRL + 5;
|
||||
|
||||
pub const EVP_PKEY_CTRL_GET_RSA_PADDING: c_int = EVP_PKEY_ALG_CTRL + 6;
|
||||
|
||||
#[cfg(any(ossl102, libressl310))]
|
||||
pub const EVP_PKEY_CTRL_RSA_OAEP_MD: c_int = EVP_PKEY_ALG_CTRL + 9;
|
||||
#[cfg(any(ossl102, libressl310))]
|
||||
pub const EVP_PKEY_CTRL_RSA_OAEP_LABEL: c_int = EVP_PKEY_ALG_CTRL + 10;
|
||||
|
||||
pub const RSA_PKCS1_PADDING: c_int = 1;
|
||||
#[cfg(not(ossl300))]
|
||||
pub const RSA_SSLV23_PADDING: c_int = 2;
|
||||
pub const RSA_NO_PADDING: c_int = 3;
|
||||
pub const RSA_PKCS1_OAEP_PADDING: c_int = 4;
|
||||
pub const RSA_X931_PADDING: c_int = 5;
|
||||
pub const RSA_PKCS1_PSS_PADDING: c_int = 6;
|
||||
103
vendor/openssl-sys/src/sha.rs
vendored
Normal file
103
vendor/openssl-sys/src/sha.rs
vendored
Normal file
|
|
@ -0,0 +1,103 @@
|
|||
use super::*;
|
||||
use libc::*;
|
||||
use std::ptr;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub const SHA_LBLOCK: c_int = 16;
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub type SHA_LONG = c_uint;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
#[cfg(ossl300)]
|
||||
// Ideally we'd macro define these, but that crashes ctest :(
|
||||
pub unsafe fn SHA1(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar {
|
||||
if EVP_Q_digest(
|
||||
ptr::null_mut(),
|
||||
"SHA1\0".as_ptr() as *const c_char,
|
||||
ptr::null(),
|
||||
d as *const c_void,
|
||||
n,
|
||||
md,
|
||||
ptr::null_mut(),
|
||||
) != 0
|
||||
{
|
||||
md
|
||||
} else {
|
||||
ptr::null_mut()
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn SHA224(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar {
|
||||
if EVP_Q_digest(
|
||||
ptr::null_mut(),
|
||||
"SHA224\0".as_ptr() as *const c_char,
|
||||
ptr::null(),
|
||||
d as *const c_void,
|
||||
n,
|
||||
md,
|
||||
ptr::null_mut(),
|
||||
) != 0 {
|
||||
md
|
||||
} else {
|
||||
ptr::null_mut()
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn SHA256(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar {
|
||||
if EVP_Q_digest(
|
||||
ptr::null_mut(),
|
||||
"SHA256\0".as_ptr() as *const c_char,
|
||||
ptr::null(),
|
||||
d as *const c_void,
|
||||
n,
|
||||
md,
|
||||
ptr::null_mut(),
|
||||
) != 0 {
|
||||
md
|
||||
} else {
|
||||
ptr::null_mut()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
|
||||
pub type SHA_LONG64 = u64;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub unsafe fn SHA384(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar {
|
||||
if EVP_Q_digest(
|
||||
ptr::null_mut(),
|
||||
"SHA384\0".as_ptr() as *const c_char,
|
||||
ptr::null(),
|
||||
d as *const c_void,
|
||||
n,
|
||||
md,
|
||||
ptr::null_mut(),
|
||||
) != 0 {
|
||||
md
|
||||
} else {
|
||||
ptr::null_mut()
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn SHA512(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar {
|
||||
if EVP_Q_digest(
|
||||
ptr::null_mut(),
|
||||
"SHA512\0".as_ptr() as *const c_char,
|
||||
ptr::null(),
|
||||
d as *const c_void,
|
||||
n,
|
||||
md,
|
||||
ptr::null_mut(),
|
||||
) != 0 {
|
||||
md
|
||||
} else {
|
||||
ptr::null_mut()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
14
vendor/openssl-sys/src/srtp.rs
vendored
Normal file
14
vendor/openssl-sys/src/srtp.rs
vendored
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
use libc::*;
|
||||
|
||||
pub const SRTP_AES128_CM_SHA1_80: c_ulong = 0x0001;
|
||||
pub const SRTP_AES128_CM_SHA1_32: c_ulong = 0x0002;
|
||||
pub const SRTP_AES128_F8_SHA1_80: c_ulong = 0x0003;
|
||||
pub const SRTP_AES128_F8_SHA1_32: c_ulong = 0x0004;
|
||||
pub const SRTP_NULL_SHA1_80: c_ulong = 0x0005;
|
||||
pub const SRTP_NULL_SHA1_32: c_ulong = 0x0006;
|
||||
|
||||
/* AEAD SRTP protection profiles from RFC 7714 */
|
||||
#[cfg(ossl110)]
|
||||
pub const SRTP_AEAD_AES_128_GCM: c_ulong = 0x0007;
|
||||
#[cfg(ossl110)]
|
||||
pub const SRTP_AEAD_AES_256_GCM: c_ulong = 0x0008;
|
||||
716
vendor/openssl-sys/src/ssl.rs
vendored
Normal file
716
vendor/openssl-sys/src/ssl.rs
vendored
Normal file
|
|
@ -0,0 +1,716 @@
|
|||
use libc::*;
|
||||
use std::ptr;
|
||||
|
||||
use super::*;
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub const SSL_MAX_KRB5_PRINCIPAL_LENGTH: c_int = 256;
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub const SSL_MAX_SSL_SESSION_ID_LENGTH: c_int = 32;
|
||||
#[cfg(not(ossl110))]
|
||||
pub const SSL_MAX_SID_CTX_LENGTH: c_int = 32;
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub const SSL_MAX_KEY_ARG_LENGTH: c_int = 8;
|
||||
#[cfg(not(ossl110))]
|
||||
pub const SSL_MAX_MASTER_KEY_LENGTH: c_int = 48;
|
||||
|
||||
pub const SSL_SENT_SHUTDOWN: c_int = 1;
|
||||
pub const SSL_RECEIVED_SHUTDOWN: c_int = 2;
|
||||
|
||||
pub const SSL_FILETYPE_PEM: c_int = X509_FILETYPE_PEM;
|
||||
pub const SSL_FILETYPE_ASN1: c_int = X509_FILETYPE_ASN1;
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS_ONLY: c_uint = 0x0001;
|
||||
/* This extension is only allowed in DTLS */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_DTLS_ONLY: c_uint = 0x0002;
|
||||
/* Some extensions may be allowed in DTLS but we don't implement them for it */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS_IMPLEMENTATION_ONLY: c_uint = 0x0004;
|
||||
/* Most extensions are not defined for SSLv3 but EXT_TYPE_renegotiate is */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_SSL3_ALLOWED: c_uint = 0x0008;
|
||||
/* Extension is only defined for TLS1.2 and below */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_2_AND_BELOW_ONLY: c_uint = 0x0010;
|
||||
/* Extension is only defined for TLS1.3 and above */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_ONLY: c_uint = 0x0020;
|
||||
/* Ignore this extension during parsing if we are resuming */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_IGNORE_ON_RESUMPTION: c_uint = 0x0040;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_CLIENT_HELLO: c_uint = 0x0080;
|
||||
/* Really means TLS1.2 or below */
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_2_SERVER_HELLO: c_uint = 0x0100;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_SERVER_HELLO: c_uint = 0x0200;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS: c_uint = 0x0400;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST: c_uint = 0x0800;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_CERTIFICATE: c_uint = 0x1000;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_NEW_SESSION_TICKET: c_uint = 0x2000;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_EXT_TLS1_3_CERTIFICATE_REQUEST: c_uint = 0x4000;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
macro_rules! ssl_op_type {
|
||||
() => {u64};
|
||||
}
|
||||
} else {
|
||||
macro_rules! ssl_op_type {
|
||||
() => {c_ulong};
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub const SSL_OP_LEGACY_SERVER_CONNECT: ssl_op_type!() = 0x00000004;
|
||||
cfg_if! {
|
||||
if #[cfg(libressl261)] {
|
||||
pub const SSL_OP_TLSEXT_PADDING: ssl_op_type!() = 0x0;
|
||||
} else if #[cfg(any(ossl102, libressl))] {
|
||||
pub const SSL_OP_TLSEXT_PADDING: ssl_op_type!() = 0x10;
|
||||
}
|
||||
}
|
||||
#[cfg(ossl101)]
|
||||
pub const SSL_OP_SAFARI_ECDHE_ECDSA_BUG: ssl_op_type!() = 0x00000040;
|
||||
|
||||
pub const SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: ssl_op_type!() = 0x00000800;
|
||||
|
||||
pub const SSL_OP_NO_QUERY_MTU: ssl_op_type!() = 0x00001000;
|
||||
pub const SSL_OP_COOKIE_EXCHANGE: ssl_op_type!() = 0x00002000;
|
||||
pub const SSL_OP_NO_TICKET: ssl_op_type!() = 0x00004000;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl101)] {
|
||||
pub const SSL_OP_CISCO_ANYCONNECT: ssl_op_type!() = 0x00008000;
|
||||
} else {
|
||||
pub const SSL_OP_CISCO_ANYCONNECT: ssl_op_type!() = 0x0;
|
||||
}
|
||||
}
|
||||
|
||||
pub const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: ssl_op_type!() = 0x00010000;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl101)] {
|
||||
pub const SSL_OP_NO_COMPRESSION: ssl_op_type!() = 0x00020000;
|
||||
pub const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: ssl_op_type!() = 0x00040000;
|
||||
} else {
|
||||
pub const SSL_OP_NO_COMPRESSION: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: ssl_op_type!() = 0x0;
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_OP_ENABLE_MIDDLEBOX_COMPAT: ssl_op_type!() = 0x00100000;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_OP_PRIORITIZE_CHACHA: ssl_op_type!() = 0x00200000;
|
||||
|
||||
pub const SSL_OP_CIPHER_SERVER_PREFERENCE: ssl_op_type!() = 0x00400000;
|
||||
cfg_if! {
|
||||
if #[cfg(libressl280)] {
|
||||
pub const SSL_OP_TLS_ROLLBACK_BUG: ssl_op_type!() = 0;
|
||||
} else {
|
||||
pub const SSL_OP_TLS_ROLLBACK_BUG: ssl_op_type!() = 0x00800000;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl101)] {
|
||||
pub const SSL_OP_NO_SSLv3: ssl_op_type!() = 0x02000000;
|
||||
} else {
|
||||
pub const SSL_OP_NO_SSLv3: ssl_op_type!() = 0x0;
|
||||
}
|
||||
}
|
||||
pub const SSL_OP_NO_TLSv1_1: ssl_op_type!() = 0x10000000;
|
||||
pub const SSL_OP_NO_TLSv1_2: ssl_op_type!() = 0x08000000;
|
||||
|
||||
pub const SSL_OP_NO_TLSv1: ssl_op_type!() = 0x04000000;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl102)] {
|
||||
pub const SSL_OP_NO_DTLSv1: ssl_op_type!() = 0x04000000;
|
||||
pub const SSL_OP_NO_DTLSv1_2: ssl_op_type!() = 0x08000000;
|
||||
} else if #[cfg(libressl332)] {
|
||||
pub const SSL_OP_NO_DTLSv1: ssl_op_type!() = 0x40000000;
|
||||
pub const SSL_OP_NO_DTLSv1_2: ssl_op_type!() = 0x80000000;
|
||||
}
|
||||
}
|
||||
#[cfg(any(ossl111, libressl340))]
|
||||
pub const SSL_OP_NO_TLSv1_3: ssl_op_type!() = 0x20000000;
|
||||
|
||||
#[cfg(ossl110h)]
|
||||
pub const SSL_OP_NO_RENEGOTIATION: ssl_op_type!() = 0x40000000;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl111)] {
|
||||
pub const SSL_OP_NO_SSL_MASK: ssl_op_type!() = SSL_OP_NO_SSLv2
|
||||
| SSL_OP_NO_SSLv3
|
||||
| SSL_OP_NO_TLSv1
|
||||
| SSL_OP_NO_TLSv1_1
|
||||
| SSL_OP_NO_TLSv1_2
|
||||
| SSL_OP_NO_TLSv1_3;
|
||||
} else if #[cfg(ossl102)] {
|
||||
pub const SSL_OP_NO_SSL_MASK: ssl_op_type!() =
|
||||
SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(libressl261)] {
|
||||
pub const SSL_OP_CRYPTOPRO_TLSEXT_BUG: ssl_op_type!() = 0x0;
|
||||
} else {
|
||||
pub const SSL_OP_CRYPTOPRO_TLSEXT_BUG: ssl_op_type!() = 0x80000000;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub const SSL_OP_ALL: ssl_op_type!() = SSL_OP_CRYPTOPRO_TLSEXT_BUG
|
||||
| SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
|
||||
| SSL_OP_TLSEXT_PADDING
|
||||
| SSL_OP_SAFARI_ECDHE_ECDSA_BUG;
|
||||
} else if #[cfg(ossl110f)] {
|
||||
pub const SSL_OP_ALL: ssl_op_type!() = SSL_OP_CRYPTOPRO_TLSEXT_BUG
|
||||
| SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
|
||||
| SSL_OP_LEGACY_SERVER_CONNECT
|
||||
| SSL_OP_TLSEXT_PADDING
|
||||
| SSL_OP_SAFARI_ECDHE_ECDSA_BUG;
|
||||
} else if #[cfg(libressl261)] {
|
||||
pub const SSL_OP_ALL: ssl_op_type!() = 0x4;
|
||||
} else if #[cfg(libressl)] {
|
||||
pub const SSL_OP_ALL: ssl_op_type!() = 0x80000014;
|
||||
} else {
|
||||
pub const SSL_OP_ALL: ssl_op_type!() = 0x80000BFF;
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub const SSL_OP_MICROSOFT_SESS_ID_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_NETSCAPE_CHALLENGE_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_SSLEAY_080_CLIENT_DH_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_TLS_D5_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_TLS_BLOCK_PADDING_BUG: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_SINGLE_ECDH_USE: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_SINGLE_DH_USE: ssl_op_type!() = 0x00000000;
|
||||
pub const SSL_OP_NO_SSLv2: ssl_op_type!() = 0x00000000;
|
||||
} else if #[cfg(ossl101)] {
|
||||
pub const SSL_OP_MICROSOFT_SESS_ID_BUG: ssl_op_type!() = 0x00000001;
|
||||
pub const SSL_OP_NETSCAPE_CHALLENGE_BUG: ssl_op_type!() = 0x00000002;
|
||||
pub const SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: ssl_op_type!() = 0x00000008;
|
||||
pub const SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: ssl_op_type!() = 0x00000020;
|
||||
pub const SSL_OP_SSLEAY_080_CLIENT_DH_BUG: ssl_op_type!() = 0x00000080;
|
||||
pub const SSL_OP_TLS_D5_BUG: ssl_op_type!() = 0x00000100;
|
||||
pub const SSL_OP_TLS_BLOCK_PADDING_BUG: ssl_op_type!() = 0x00000200;
|
||||
pub const SSL_OP_SINGLE_ECDH_USE: ssl_op_type!() = 0x00080000;
|
||||
pub const SSL_OP_SINGLE_DH_USE: ssl_op_type!() = 0x00100000;
|
||||
pub const SSL_OP_NO_SSLv2: ssl_op_type!() = 0x01000000;
|
||||
} else {
|
||||
pub const SSL_OP_MICROSOFT_SESS_ID_BUG: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_NETSCAPE_CHALLENGE_BUG: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_SSLEAY_080_CLIENT_DH_BUG: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_TLS_D5_BUG: ssl_op_type!() = 0x0;
|
||||
pub const SSL_OP_TLS_BLOCK_PADDING_BUG: ssl_op_type!() = 0x0;
|
||||
#[cfg(libressl261)]
|
||||
pub const SSL_OP_SINGLE_ECDH_USE: ssl_op_type!() = 0x0;
|
||||
#[cfg(not(libressl261))]
|
||||
pub const SSL_OP_SINGLE_ECDH_USE: ssl_op_type!() = 0x00080000;
|
||||
pub const SSL_OP_SINGLE_DH_USE: ssl_op_type!() = 0x00100000;
|
||||
pub const SSL_OP_NO_SSLv2: ssl_op_type!() = 0x0;
|
||||
}
|
||||
}
|
||||
|
||||
pub const SSL_MODE_ENABLE_PARTIAL_WRITE: c_long = 0x1;
|
||||
pub const SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER: c_long = 0x2;
|
||||
pub const SSL_MODE_AUTO_RETRY: c_long = 0x4;
|
||||
pub const SSL_MODE_NO_AUTO_CHAIN: c_long = 0x8;
|
||||
pub const SSL_MODE_RELEASE_BUFFERS: c_long = 0x10;
|
||||
#[cfg(ossl101)]
|
||||
pub const SSL_MODE_SEND_CLIENTHELLO_TIME: c_long = 0x20;
|
||||
#[cfg(ossl101)]
|
||||
pub const SSL_MODE_SEND_SERVERHELLO_TIME: c_long = 0x40;
|
||||
#[cfg(ossl101)]
|
||||
pub const SSL_MODE_SEND_FALLBACK_SCSV: c_long = 0x80;
|
||||
|
||||
pub unsafe fn SSL_CTX_set_mode(ctx: *mut SSL_CTX, op: c_long) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_MODE, op, ptr::null_mut())
|
||||
}
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_COOKIE_LENGTH: c_int = 4096;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(ossl110))] {
|
||||
pub unsafe fn SSL_CTX_get_options(ctx: *const SSL_CTX) -> c_ulong {
|
||||
SSL_CTX_ctrl(ctx as *mut _, SSL_CTRL_OPTIONS, 0, ptr::null_mut()) as c_ulong
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_options(ctx: *const SSL_CTX, op: c_ulong) -> c_ulong {
|
||||
SSL_CTX_ctrl(
|
||||
ctx as *mut _,
|
||||
SSL_CTRL_OPTIONS,
|
||||
op as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_ulong
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_clear_options(ctx: *const SSL_CTX, op: c_ulong) -> c_ulong {
|
||||
SSL_CTX_ctrl(
|
||||
ctx as *mut _,
|
||||
SSL_CTRL_CLEAR_OPTIONS,
|
||||
op as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_ulong
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_mtu(ssl: *mut SSL, mtu: c_long) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_SET_MTU, mtu, ptr::null_mut())
|
||||
}
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub unsafe fn SSL_get_extms_support(ssl: *mut SSL) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_GET_EXTMS_SUPPORT, 0, ptr::null_mut())
|
||||
}
|
||||
|
||||
pub const SSL_SESS_CACHE_OFF: c_long = 0x0;
|
||||
pub const SSL_SESS_CACHE_CLIENT: c_long = 0x1;
|
||||
pub const SSL_SESS_CACHE_SERVER: c_long = 0x2;
|
||||
pub const SSL_SESS_CACHE_BOTH: c_long = SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_SERVER;
|
||||
pub const SSL_SESS_CACHE_NO_AUTO_CLEAR: c_long = 0x80;
|
||||
pub const SSL_SESS_CACHE_NO_INTERNAL_LOOKUP: c_long = 0x100;
|
||||
pub const SSL_SESS_CACHE_NO_INTERNAL_STORE: c_long = 0x200;
|
||||
pub const SSL_SESS_CACHE_NO_INTERNAL: c_long =
|
||||
SSL_SESS_CACHE_NO_INTERNAL_LOOKUP | SSL_SESS_CACHE_NO_INTERNAL_STORE;
|
||||
|
||||
pub const OPENSSL_NPN_UNSUPPORTED: c_int = 0;
|
||||
pub const OPENSSL_NPN_NEGOTIATED: c_int = 1;
|
||||
pub const OPENSSL_NPN_NO_OVERLAP: c_int = 2;
|
||||
|
||||
pub const SSL_AD_ILLEGAL_PARAMETER: c_int = SSL3_AD_ILLEGAL_PARAMETER;
|
||||
pub const SSL_AD_DECODE_ERROR: c_int = TLS1_AD_DECODE_ERROR;
|
||||
pub const SSL_AD_UNRECOGNIZED_NAME: c_int = TLS1_AD_UNRECOGNIZED_NAME;
|
||||
pub const SSL_ERROR_NONE: c_int = 0;
|
||||
pub const SSL_ERROR_SSL: c_int = 1;
|
||||
pub const SSL_ERROR_SYSCALL: c_int = 5;
|
||||
pub const SSL_ERROR_WANT_ACCEPT: c_int = 8;
|
||||
pub const SSL_ERROR_WANT_CONNECT: c_int = 7;
|
||||
pub const SSL_ERROR_WANT_READ: c_int = 2;
|
||||
pub const SSL_ERROR_WANT_WRITE: c_int = 3;
|
||||
pub const SSL_ERROR_WANT_X509_LOOKUP: c_int = 4;
|
||||
pub const SSL_ERROR_ZERO_RETURN: c_int = 6;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_ERROR_WANT_CLIENT_HELLO_CB: c_int = 11;
|
||||
pub const SSL_VERIFY_NONE: c_int = 0;
|
||||
pub const SSL_VERIFY_PEER: c_int = 1;
|
||||
pub const SSL_VERIFY_FAIL_IF_NO_PEER_CERT: c_int = 2;
|
||||
pub const SSL_CTRL_SET_TMP_DH: c_int = 3;
|
||||
pub const SSL_CTRL_SET_TMP_ECDH: c_int = 4;
|
||||
#[cfg(any(libressl, all(ossl101, not(ossl110))))]
|
||||
pub const SSL_CTRL_GET_SESSION_REUSED: c_int = 8;
|
||||
pub const SSL_CTRL_EXTRA_CHAIN_CERT: c_int = 14;
|
||||
pub const SSL_CTRL_SET_MTU: c_int = 17;
|
||||
#[cfg(any(libressl, all(ossl101, not(ossl110))))]
|
||||
pub const SSL_CTRL_OPTIONS: c_int = 32;
|
||||
pub const SSL_CTRL_MODE: c_int = 33;
|
||||
pub const SSL_CTRL_SET_READ_AHEAD: c_int = 41;
|
||||
pub const SSL_CTRL_SET_SESS_CACHE_SIZE: c_int = 42;
|
||||
pub const SSL_CTRL_GET_SESS_CACHE_SIZE: c_int = 43;
|
||||
pub const SSL_CTRL_SET_SESS_CACHE_MODE: c_int = 44;
|
||||
pub const SSL_CTRL_SET_TLSEXT_SERVERNAME_CB: c_int = 53;
|
||||
pub const SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG: c_int = 54;
|
||||
pub const SSL_CTRL_SET_TLSEXT_HOSTNAME: c_int = 55;
|
||||
pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB: c_int = 63;
|
||||
pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG: c_int = 64;
|
||||
pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE: c_int = 65;
|
||||
pub const SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: c_int = 70;
|
||||
pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: c_int = 71;
|
||||
#[cfg(any(libressl, all(ossl101, not(ossl110))))]
|
||||
pub const SSL_CTRL_CLEAR_OPTIONS: c_int = 77;
|
||||
pub const SSL_CTRL_GET_EXTRA_CHAIN_CERTS: c_int = 82;
|
||||
#[cfg(ossl102)]
|
||||
pub const SSL_CTRL_CHAIN_CERT: c_int = 89;
|
||||
#[cfg(any(ossl111, libressl252))]
|
||||
pub const SSL_CTRL_SET_GROUPS_LIST: c_int = 92;
|
||||
#[cfg(any(libressl, all(ossl102, not(ossl110))))]
|
||||
pub const SSL_CTRL_SET_ECDH_AUTO: c_int = 94;
|
||||
#[cfg(ossl102)]
|
||||
pub const SSL_CTRL_SET_SIGALGS_LIST: c_int = 98;
|
||||
#[cfg(ossl102)]
|
||||
pub const SSL_CTRL_SET_VERIFY_CERT_STORE: c_int = 106;
|
||||
#[cfg(ossl300)]
|
||||
pub const SSL_CTRL_GET_PEER_TMP_KEY: c_int = 109;
|
||||
#[cfg(ossl110)]
|
||||
pub const SSL_CTRL_GET_EXTMS_SUPPORT: c_int = 122;
|
||||
#[cfg(any(ossl110, libressl261))]
|
||||
pub const SSL_CTRL_SET_MIN_PROTO_VERSION: c_int = 123;
|
||||
#[cfg(any(ossl110, libressl261))]
|
||||
pub const SSL_CTRL_SET_MAX_PROTO_VERSION: c_int = 124;
|
||||
#[cfg(any(ossl110g, libressl270))]
|
||||
pub const SSL_CTRL_GET_MIN_PROTO_VERSION: c_int = 130;
|
||||
#[cfg(any(ossl110g, libressl270))]
|
||||
pub const SSL_CTRL_GET_MAX_PROTO_VERSION: c_int = 131;
|
||||
#[cfg(ossl300)]
|
||||
pub const SSL_CTRL_GET_TMP_KEY: c_int = 133;
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tmp_dh(ctx: *mut SSL_CTX, dh: *mut DH) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TMP_DH, 0, dh as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tmp_ecdh(ctx: *mut SSL_CTX, key: *mut EC_KEY) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TMP_ECDH, 0, key as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_tmp_dh(ssl: *mut SSL, dh: *mut DH) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_SET_TMP_DH, 0, dh as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_tmp_ecdh(ssl: *mut SSL, key: *mut EC_KEY) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_SET_TMP_ECDH, 0, key as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_add_extra_chain_cert(ctx: *mut SSL_CTX, x509: *mut X509) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_EXTRA_CHAIN_CERT, 0, x509 as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_get_extra_chain_certs(
|
||||
ctx: *mut SSL_CTX,
|
||||
chain: *mut *mut stack_st_X509,
|
||||
) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_GET_EXTRA_CHAIN_CERTS, 0, chain as *mut c_void)
|
||||
}
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub unsafe fn SSL_CTX_set0_verify_cert_store(ctx: *mut SSL_CTX, st: *mut X509_STORE) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_VERIFY_CERT_STORE, 0, st as *mut c_void)
|
||||
}
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub unsafe fn SSL_set0_verify_cert_store(ssl: *mut SSL, st: *mut X509_STORE) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_SET_VERIFY_CERT_STORE, 0, st as *mut c_void)
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl111)] {
|
||||
pub unsafe fn SSL_CTX_set1_groups_list(ctx: *mut SSL_CTX, s: *const c_char) -> c_long {
|
||||
SSL_CTX_ctrl(
|
||||
ctx,
|
||||
SSL_CTRL_SET_GROUPS_LIST,
|
||||
0,
|
||||
s as *const c_void as *mut c_void,
|
||||
)
|
||||
}
|
||||
} else if #[cfg(libressl251)] {
|
||||
extern "C" {
|
||||
pub fn SSL_CTX_set1_groups_list(ctx: *mut SSL_CTX, s: *const c_char) -> c_int;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub unsafe fn SSL_add0_chain_cert(ssl: *mut SSL, ptr: *mut X509) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_CHAIN_CERT, 0, ptr as *mut c_void)
|
||||
}
|
||||
|
||||
#[cfg(ossl102)]
|
||||
pub unsafe fn SSL_CTX_set1_sigalgs_list(ctx: *mut SSL_CTX, s: *const c_char) -> c_long {
|
||||
SSL_CTX_ctrl(
|
||||
ctx,
|
||||
SSL_CTRL_SET_SIGALGS_LIST,
|
||||
0,
|
||||
s as *const c_void as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[cfg(any(libressl, all(ossl102, not(ossl110))))]
|
||||
pub unsafe fn SSL_CTX_set_ecdh_auto(ctx: *mut SSL_CTX, onoff: c_int) -> c_int {
|
||||
SSL_CTX_ctrl(
|
||||
ctx,
|
||||
SSL_CTRL_SET_ECDH_AUTO,
|
||||
onoff as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
|
||||
#[cfg(any(libressl, all(ossl102, not(ossl110))))]
|
||||
pub unsafe fn SSL_set_ecdh_auto(ssl: *mut SSL, onoff: c_int) -> c_int {
|
||||
SSL_ctrl(
|
||||
ssl,
|
||||
SSL_CTRL_SET_ECDH_AUTO,
|
||||
onoff as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub unsafe fn SSL_CTX_set_min_proto_version(ctx: *mut SSL_CTX, version: c_int) -> c_int {
|
||||
SSL_CTX_ctrl(
|
||||
ctx,
|
||||
SSL_CTRL_SET_MIN_PROTO_VERSION,
|
||||
version as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_max_proto_version(ctx: *mut SSL_CTX, version: c_int) -> c_int {
|
||||
SSL_CTX_ctrl(
|
||||
ctx,
|
||||
SSL_CTRL_SET_MAX_PROTO_VERSION,
|
||||
version as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_min_proto_version(s: *mut SSL, version: c_int) -> c_int {
|
||||
SSL_ctrl(
|
||||
s,
|
||||
SSL_CTRL_SET_MIN_PROTO_VERSION,
|
||||
version as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_max_proto_version(s: *mut SSL, version: c_int) -> c_int {
|
||||
SSL_ctrl(
|
||||
s,
|
||||
SSL_CTRL_SET_MAX_PROTO_VERSION,
|
||||
version as c_long,
|
||||
ptr::null_mut(),
|
||||
) as c_int
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110g)] {
|
||||
pub unsafe fn SSL_CTX_get_min_proto_version(ctx: *mut SSL_CTX) -> c_int {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_GET_MIN_PROTO_VERSION, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_get_max_proto_version(ctx: *mut SSL_CTX) -> c_int {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_GET_MAX_PROTO_VERSION, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn SSL_get_min_proto_version(s: *mut SSL) -> c_int {
|
||||
SSL_ctrl(s, SSL_CTRL_GET_MIN_PROTO_VERSION, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
pub unsafe fn SSL_get_max_proto_version(s: *mut SSL) -> c_int {
|
||||
SSL_ctrl(s, SSL_CTRL_GET_MAX_PROTO_VERSION, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
}
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub unsafe fn SSL_get_peer_tmp_key(ssl: *mut SSL, key: *mut *mut EVP_PKEY) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_GET_PEER_TMP_KEY, 0, key as *mut c_void)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_get_tmp_key(ssl: *mut SSL, key: *mut *mut EVP_PKEY) -> c_long {
|
||||
SSL_ctrl(ssl, SSL_CTRL_GET_TMP_KEY, 0, key as *mut c_void)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_CLIENT_HELLO_SUCCESS: c_int = 1;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_CLIENT_HELLO_ERROR: c_int = 0;
|
||||
#[cfg(ossl111)]
|
||||
pub const SSL_CLIENT_HELLO_RETRY: c_int = -1;
|
||||
|
||||
#[cfg(any(ossl111, libressl340))]
|
||||
pub const SSL_READ_EARLY_DATA_ERROR: c_int = 0;
|
||||
#[cfg(any(ossl111, libressl340))]
|
||||
pub const SSL_READ_EARLY_DATA_SUCCESS: c_int = 1;
|
||||
#[cfg(any(ossl111, libressl340))]
|
||||
pub const SSL_READ_EARLY_DATA_FINISH: c_int = 2;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub unsafe fn SSL_get_ex_new_index(
|
||||
l: c_long,
|
||||
p: *mut c_void,
|
||||
newf: Option<CRYPTO_EX_new>,
|
||||
dupf: Option<CRYPTO_EX_dup>,
|
||||
freef: Option<CRYPTO_EX_free>,
|
||||
) -> c_int {
|
||||
CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL, l, p, newf, dupf, freef)
|
||||
}
|
||||
}
|
||||
}
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub unsafe fn SSL_CTX_get_ex_new_index(
|
||||
l: c_long,
|
||||
p: *mut c_void,
|
||||
newf: Option<CRYPTO_EX_new>,
|
||||
dupf: Option<CRYPTO_EX_dup>,
|
||||
freef: Option<CRYPTO_EX_free>,
|
||||
) -> c_int {
|
||||
CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL_CTX, l, p, newf, dupf, freef)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_sess_set_cache_size(ctx: *mut SSL_CTX, t: c_long) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_SESS_CACHE_SIZE, t, ptr::null_mut())
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_sess_get_cache_size(ctx: *mut SSL_CTX) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_GET_SESS_CACHE_SIZE, 0, ptr::null_mut())
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_session_cache_mode(ctx: *mut SSL_CTX, m: c_long) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_SESS_CACHE_MODE, m, ptr::null_mut())
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_read_ahead(ctx: *mut SSL_CTX, m: c_long) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_READ_AHEAD, m, ptr::null_mut())
|
||||
}
|
||||
|
||||
#[allow(clashing_extern_declarations)]
|
||||
extern "C" {
|
||||
#[deprecated(note = "use SSL_CTX_set_tmp_dh_callback__fixed_rust instead")]
|
||||
pub fn SSL_CTX_set_tmp_dh_callback(
|
||||
ctx: *mut SSL_CTX,
|
||||
dh: unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
|
||||
);
|
||||
#[deprecated(note = "use SSL_set_tmp_dh_callback__fixed_rust instead")]
|
||||
pub fn SSL_set_tmp_dh_callback(
|
||||
ctx: *mut SSL,
|
||||
dh: unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
|
||||
);
|
||||
#[deprecated(note = "use SSL_CTX_set_tmp_ecdh_callback__fixed_rust instead")]
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn SSL_CTX_set_tmp_ecdh_callback(
|
||||
ctx: *mut SSL_CTX,
|
||||
ecdh: unsafe extern "C" fn(
|
||||
ssl: *mut SSL,
|
||||
is_export: c_int,
|
||||
keylength: c_int,
|
||||
) -> *mut EC_KEY,
|
||||
);
|
||||
#[deprecated(note = "use SSL_set_tmp_ecdh_callback__fixed_rust instead")]
|
||||
#[cfg(not(ossl110))]
|
||||
pub fn SSL_set_tmp_ecdh_callback(
|
||||
ssl: *mut SSL,
|
||||
ecdh: unsafe extern "C" fn(
|
||||
ssl: *mut SSL,
|
||||
is_export: c_int,
|
||||
keylength: c_int,
|
||||
) -> *mut EC_KEY,
|
||||
);
|
||||
|
||||
#[deprecated(note = "use SSL_CTX_callback_ctrl__fixed_rust instead")]
|
||||
pub fn SSL_CTX_callback_ctrl(
|
||||
ctx: *mut SSL_CTX,
|
||||
cmd: c_int,
|
||||
fp: Option<extern "C" fn()>,
|
||||
) -> c_long;
|
||||
|
||||
#[deprecated(note = "use SSL_CTX_set_alpn_select_cb__fixed_rust instead")]
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub fn SSL_CTX_set_alpn_select_cb(
|
||||
ssl: *mut SSL_CTX,
|
||||
cb: extern "C" fn(
|
||||
ssl: *mut SSL,
|
||||
out: *mut *const c_uchar,
|
||||
outlen: *mut c_uchar,
|
||||
inbuf: *const c_uchar,
|
||||
inlen: c_uint,
|
||||
arg: *mut c_void,
|
||||
) -> c_int,
|
||||
arg: *mut c_void,
|
||||
);
|
||||
}
|
||||
|
||||
#[cfg(not(ossl110))]
|
||||
pub unsafe fn SSL_session_reused(ssl: *mut SSL) -> c_int {
|
||||
SSL_ctrl(ssl, SSL_CTRL_GET_SESSION_REUSED, 0, ptr::null_mut()) as c_int
|
||||
}
|
||||
|
||||
#[cfg(ossl110)]
|
||||
pub const OPENSSL_INIT_LOAD_SSL_STRINGS: u64 = 0x00200000;
|
||||
#[cfg(ossl111b)]
|
||||
pub const OPENSSL_INIT_NO_ATEXIT: u64 = 0x00080000;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(ossl330)] {
|
||||
pub const SSL_VALUE_CLASS_GENERIC: c_uint = 0;
|
||||
pub const SSL_VALUE_CLASS_FEATURE_REQUEST: c_uint = 1;
|
||||
pub const SSL_VALUE_CLASS_FEATURE_PEER_REQUEST: c_uint = 2;
|
||||
pub const SSL_VALUE_CLASS_FEATURE_NEGOTIATED: c_uint = 3;
|
||||
|
||||
pub const SSL_VALUE_NONE: c_uint = 0;
|
||||
pub const SSL_VALUE_QUIC_STREAM_BIDI_LOCAL_AVAIL: c_uint = 1;
|
||||
pub const SSL_VALUE_QUIC_STREAM_BIDI_REMOTE_AVAIL: c_uint = 2;
|
||||
pub const SSL_VALUE_QUIC_STREAM_UNI_LOCAL_AVAIL: c_uint = 3;
|
||||
pub const SSL_VALUE_QUIC_STREAM_UNI_REMOTE_AVAIL: c_uint = 4;
|
||||
pub const SSL_VALUE_QUIC_IDLE_TIMEOUT: c_uint = 5;
|
||||
pub const SSL_VALUE_EVENT_HANDLING_MODE: c_uint = 6;
|
||||
pub const SSL_VALUE_STREAM_WRITE_BUF_SIZE: c_uint = 7;
|
||||
pub const SSL_VALUE_STREAM_WRITE_BUF_USED: c_uint = 8;
|
||||
pub const SSL_VALUE_STREAM_WRITE_BUF_AVAIL: c_uint = 9;
|
||||
|
||||
pub const SSL_VALUE_EVENT_HANDLING_MODE_INHERIT: c_uint = 0;
|
||||
pub const SSL_VALUE_EVENT_HANDLING_MODE_IMPLICIT: c_uint = 1;
|
||||
pub const SSL_VALUE_EVENT_HANDLING_MODE_EXPLICIT: c_uint = 2;
|
||||
|
||||
pub unsafe fn SSL_get_generic_value_uint(ssl: *mut SSL, id: u32, value: *mut u64) -> c_int {
|
||||
SSL_get_value_uint(ssl, SSL_VALUE_CLASS_GENERIC, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_set_generic_value_uint(ssl: *mut SSL, id: u32, value: u64) -> c_int {
|
||||
SSL_set_value_uint(ssl, SSL_VALUE_CLASS_GENERIC, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_feature_request_uint(ssl: *mut SSL, id: u32, value: *mut u64) -> c_int {
|
||||
SSL_get_value_uint(ssl, SSL_VALUE_CLASS_FEATURE_REQUEST, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_set_feature_request_uint(ssl: *mut SSL, id: u32, value: u64) -> c_int {
|
||||
SSL_set_value_uint(ssl, SSL_VALUE_CLASS_FEATURE_REQUEST, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_feature_peer_request_uint(ssl: *mut SSL, id: u32, value: *mut u64) -> c_int {
|
||||
SSL_get_value_uint(ssl, SSL_VALUE_CLASS_FEATURE_PEER_REQUEST, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_feature_negotiated_uint(ssl: *mut SSL, id: u32, value: *mut u64) -> c_int {
|
||||
SSL_get_value_uint(ssl, SSL_VALUE_CLASS_FEATURE_NEGOTIATED, id, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_quic_stream_bidi_local_avail(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_QUIC_STREAM_BIDI_LOCAL_AVAIL, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_quic_stream_bidi_remote_avail(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_QUIC_STREAM_BIDI_REMOTE_AVAIL, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_quic_stream_uni_local_avail(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_QUIC_STREAM_UNI_LOCAL_AVAIL, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_quic_stream_uni_remote_avail(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_QUIC_STREAM_UNI_REMOTE_AVAIL, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_event_handling_mode(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_EVENT_HANDLING_MODE, value)
|
||||
}
|
||||
pub unsafe fn SSL_set_event_handling_mode(ssl: *mut SSL, value: u64) -> c_int {
|
||||
SSL_set_generic_value_uint(ssl, SSL_VALUE_EVENT_HANDLING_MODE, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_stream_write_buf_size(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_STREAM_WRITE_BUF_SIZE, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_stream_write_buf_avail(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_STREAM_WRITE_BUF_AVAIL, value)
|
||||
}
|
||||
pub unsafe fn SSL_get_stream_write_buf_used(ssl: *mut SSL, value: *mut u64) -> c_int {
|
||||
SSL_get_generic_value_uint(ssl, SSL_VALUE_STREAM_WRITE_BUF_USED, value)
|
||||
}
|
||||
}
|
||||
}
|
||||
5
vendor/openssl-sys/src/ssl3.rs
vendored
Normal file
5
vendor/openssl-sys/src/ssl3.rs
vendored
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
use libc::*;
|
||||
|
||||
pub const SSL3_VERSION: c_int = 0x300;
|
||||
|
||||
pub const SSL3_AD_ILLEGAL_PARAMETER: c_int = 47;
|
||||
114
vendor/openssl-sys/src/tls1.rs
vendored
Normal file
114
vendor/openssl-sys/src/tls1.rs
vendored
Normal file
|
|
@ -0,0 +1,114 @@
|
|||
use libc::*;
|
||||
use std::mem;
|
||||
use std::ptr;
|
||||
|
||||
use super::*;
|
||||
|
||||
pub const TLS1_VERSION: c_int = 0x301;
|
||||
pub const TLS1_1_VERSION: c_int = 0x302;
|
||||
pub const TLS1_2_VERSION: c_int = 0x303;
|
||||
#[cfg(any(ossl111, libressl340))]
|
||||
pub const TLS1_3_VERSION: c_int = 0x304;
|
||||
|
||||
pub const DTLS1_VERSION: c_int = 0xFEFF;
|
||||
#[cfg(any(ossl102, libressl332))]
|
||||
pub const DTLS1_2_VERSION: c_int = 0xFEFD;
|
||||
|
||||
pub const TLS1_AD_DECODE_ERROR: c_int = 50;
|
||||
pub const TLS1_AD_UNRECOGNIZED_NAME: c_int = 112;
|
||||
|
||||
pub const TLSEXT_NAMETYPE_host_name: c_int = 0;
|
||||
pub const TLSEXT_STATUSTYPE_ocsp: c_int = 1;
|
||||
|
||||
pub unsafe fn SSL_set_tlsext_host_name(s: *mut SSL, name: *mut c_char) -> c_long {
|
||||
SSL_ctrl(
|
||||
s,
|
||||
SSL_CTRL_SET_TLSEXT_HOSTNAME,
|
||||
TLSEXT_NAMETYPE_host_name as c_long,
|
||||
name as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_tlsext_status_type(s: *mut SSL, type_: c_int) -> c_long {
|
||||
SSL_ctrl(
|
||||
s,
|
||||
SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,
|
||||
type_ as c_long,
|
||||
ptr::null_mut(),
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_get_tlsext_status_ocsp_resp(ssl: *mut SSL, resp: *mut *mut c_uchar) -> c_long {
|
||||
SSL_ctrl(
|
||||
ssl,
|
||||
SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP,
|
||||
0,
|
||||
resp as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_set_tlsext_status_ocsp_resp(
|
||||
ssl: *mut SSL,
|
||||
resp: *mut c_uchar,
|
||||
len: c_long,
|
||||
) -> c_long {
|
||||
SSL_ctrl(
|
||||
ssl,
|
||||
SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP,
|
||||
len,
|
||||
resp as *mut c_void,
|
||||
)
|
||||
}
|
||||
|
||||
#[deprecated(note = "use SSL_CTX_set_tlsext_servername_callback__fixed_rust instead")]
|
||||
#[allow(deprecated)]
|
||||
pub unsafe fn SSL_CTX_set_tlsext_servername_callback(
|
||||
ctx: *mut SSL_CTX,
|
||||
// FIXME should have the right signature
|
||||
cb: Option<extern "C" fn()>,
|
||||
) -> c_long {
|
||||
SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_CB, cb)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tlsext_servername_callback__fixed_rust(
|
||||
ctx: *mut SSL_CTX,
|
||||
cb: Option<unsafe extern "C" fn(*mut SSL, *mut c_int, *mut c_void) -> c_int>,
|
||||
) -> c_long {
|
||||
SSL_CTX_callback_ctrl__fixed_rust(
|
||||
ctx,
|
||||
SSL_CTRL_SET_TLSEXT_SERVERNAME_CB,
|
||||
mem::transmute::<
|
||||
std::option::Option<
|
||||
unsafe extern "C" fn(*mut SSL, *mut c_int, *mut libc::c_void) -> i32,
|
||||
>,
|
||||
std::option::Option<unsafe extern "C" fn()>,
|
||||
>(cb),
|
||||
)
|
||||
}
|
||||
|
||||
pub const SSL_TLSEXT_ERR_OK: c_int = 0;
|
||||
pub const SSL_TLSEXT_ERR_ALERT_WARNING: c_int = 1;
|
||||
pub const SSL_TLSEXT_ERR_ALERT_FATAL: c_int = 2;
|
||||
pub const SSL_TLSEXT_ERR_NOACK: c_int = 3;
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tlsext_servername_arg(ctx: *mut SSL_CTX, arg: *mut c_void) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG, 0, arg)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tlsext_status_cb(
|
||||
ctx: *mut SSL_CTX,
|
||||
cb: Option<unsafe extern "C" fn(*mut SSL, *mut c_void) -> c_int>,
|
||||
) -> c_long {
|
||||
SSL_CTX_callback_ctrl__fixed_rust(
|
||||
ctx,
|
||||
SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB,
|
||||
mem::transmute::<
|
||||
std::option::Option<unsafe extern "C" fn(*mut SSL, *mut c_void) -> i32>,
|
||||
std::option::Option<unsafe extern "C" fn()>,
|
||||
>(cb),
|
||||
)
|
||||
}
|
||||
|
||||
pub unsafe fn SSL_CTX_set_tlsext_status_arg(ctx: *mut SSL_CTX, arg: *mut c_void) -> c_long {
|
||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG, 0, arg)
|
||||
}
|
||||
21
vendor/openssl-sys/src/types.rs
vendored
Normal file
21
vendor/openssl-sys/src/types.rs
vendored
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
use libc::*;
|
||||
|
||||
use super::*;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(any(ossl110, libressl280))] {
|
||||
pub enum EVP_PKEY {}
|
||||
} else {
|
||||
#[repr(C)]
|
||||
pub struct EVP_PKEY {
|
||||
pub type_: c_int,
|
||||
pub save_type: c_int,
|
||||
pub references: c_int,
|
||||
pub ameth: *const EVP_PKEY_ASN1_METHOD,
|
||||
pub engine: *mut ENGINE,
|
||||
pub pkey: *mut c_void,
|
||||
pub save_parameters: c_int,
|
||||
pub attributes: *mut stack_st_X509_ATTRIBUTE,
|
||||
}
|
||||
}
|
||||
}
|
||||
15
vendor/openssl-sys/src/x509.rs
vendored
Normal file
15
vendor/openssl-sys/src/x509.rs
vendored
Normal file
|
|
@ -0,0 +1,15 @@
|
|||
use libc::*;
|
||||
|
||||
pub const X509_FILETYPE_PEM: c_int = 1;
|
||||
pub const X509_FILETYPE_ASN1: c_int = 2;
|
||||
pub const X509_FILETYPE_DEFAULT: c_int = 3;
|
||||
|
||||
pub const ASN1_R_HEADER_TOO_LONG: c_int = 123;
|
||||
|
||||
cfg_if! {
|
||||
if #[cfg(not(any(ossl110, libressl350)))] {
|
||||
pub const X509_LU_FAIL: c_int = 0;
|
||||
pub const X509_LU_X509: c_int = 1;
|
||||
pub const X509_LU_CRL: c_int = 2;
|
||||
}
|
||||
}
|
||||
149
vendor/openssl-sys/src/x509_vfy.rs
vendored
Normal file
149
vendor/openssl-sys/src/x509_vfy.rs
vendored
Normal file
|
|
@ -0,0 +1,149 @@
|
|||
use libc::*;
|
||||
|
||||
use super::*;
|
||||
|
||||
pub const X509_V_OK: c_int = 0;
|
||||
#[cfg(ossl102f)]
|
||||
pub const X509_V_ERR_UNSPECIFIED: c_int = 1;
|
||||
pub const X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: c_int = 2;
|
||||
pub const X509_V_ERR_UNABLE_TO_GET_CRL: c_int = 3;
|
||||
pub const X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: c_int = 4;
|
||||
pub const X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: c_int = 5;
|
||||
pub const X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: c_int = 6;
|
||||
pub const X509_V_ERR_CERT_SIGNATURE_FAILURE: c_int = 7;
|
||||
pub const X509_V_ERR_CRL_SIGNATURE_FAILURE: c_int = 8;
|
||||
pub const X509_V_ERR_CERT_NOT_YET_VALID: c_int = 9;
|
||||
pub const X509_V_ERR_CERT_HAS_EXPIRED: c_int = 10;
|
||||
pub const X509_V_ERR_CRL_NOT_YET_VALID: c_int = 11;
|
||||
pub const X509_V_ERR_CRL_HAS_EXPIRED: c_int = 12;
|
||||
pub const X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: c_int = 13;
|
||||
pub const X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: c_int = 14;
|
||||
pub const X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: c_int = 15;
|
||||
pub const X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: c_int = 16;
|
||||
pub const X509_V_ERR_OUT_OF_MEM: c_int = 17;
|
||||
pub const X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: c_int = 18;
|
||||
pub const X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: c_int = 19;
|
||||
pub const X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: c_int = 20;
|
||||
pub const X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: c_int = 21;
|
||||
pub const X509_V_ERR_CERT_CHAIN_TOO_LONG: c_int = 22;
|
||||
pub const X509_V_ERR_CERT_REVOKED: c_int = 23;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl300)] {
|
||||
pub const X509_V_ERR_NO_ISSUER_PUBLIC_KEY: c_int = 24;
|
||||
} else {
|
||||
pub const X509_V_ERR_INVALID_CA: c_int = 24;
|
||||
}
|
||||
}
|
||||
pub const X509_V_ERR_PATH_LENGTH_EXCEEDED: c_int = 25;
|
||||
pub const X509_V_ERR_INVALID_PURPOSE: c_int = 26;
|
||||
pub const X509_V_ERR_CERT_UNTRUSTED: c_int = 27;
|
||||
pub const X509_V_ERR_CERT_REJECTED: c_int = 28;
|
||||
pub const X509_V_ERR_SUBJECT_ISSUER_MISMATCH: c_int = 29;
|
||||
pub const X509_V_ERR_AKID_SKID_MISMATCH: c_int = 30;
|
||||
pub const X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: c_int = 31;
|
||||
pub const X509_V_ERR_KEYUSAGE_NO_CERTSIGN: c_int = 32;
|
||||
pub const X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER: c_int = 33;
|
||||
pub const X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION: c_int = 34;
|
||||
pub const X509_V_ERR_KEYUSAGE_NO_CRL_SIGN: c_int = 35;
|
||||
pub const X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION: c_int = 36;
|
||||
pub const X509_V_ERR_INVALID_NON_CA: c_int = 37;
|
||||
pub const X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED: c_int = 38;
|
||||
pub const X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE: c_int = 39;
|
||||
pub const X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED: c_int = 40;
|
||||
pub const X509_V_ERR_INVALID_EXTENSION: c_int = 41;
|
||||
pub const X509_V_ERR_INVALID_POLICY_EXTENSION: c_int = 42;
|
||||
pub const X509_V_ERR_NO_EXPLICIT_POLICY: c_int = 43;
|
||||
pub const X509_V_ERR_DIFFERENT_CRL_SCOPE: c_int = 44;
|
||||
pub const X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE: c_int = 45;
|
||||
pub const X509_V_ERR_UNNESTED_RESOURCE: c_int = 46;
|
||||
pub const X509_V_ERR_PERMITTED_VIOLATION: c_int = 47;
|
||||
pub const X509_V_ERR_EXCLUDED_VIOLATION: c_int = 48;
|
||||
pub const X509_V_ERR_SUBTREE_MINMAX: c_int = 49;
|
||||
pub const X509_V_ERR_APPLICATION_VERIFICATION: c_int = 50;
|
||||
pub const X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: c_int = 51;
|
||||
pub const X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: c_int = 52;
|
||||
pub const X509_V_ERR_UNSUPPORTED_NAME_SYNTAX: c_int = 53;
|
||||
pub const X509_V_ERR_CRL_PATH_VALIDATION_ERROR: c_int = 54;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_INVALID_VERSION: c_int = 56;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_INVALID_ALGORITHM: c_int = 57;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_INVALID_CURVE: c_int = 58;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM: c_int = 59;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED: c_int = 60;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256: c_int = 61;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_HOSTNAME_MISMATCH: c_int = 62;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_EMAIL_MISMATCH: c_int = 63;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_ERR_IP_ADDRESS_MISMATCH: c_int = 64;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl110)] {
|
||||
pub const X509_V_ERR_DANE_NO_MATCH: c_int = 65;
|
||||
pub const X509_V_ERR_EE_KEY_TOO_SMALL: c_int = 66;
|
||||
pub const X509_V_ERR_CA_KEY_TOO_SMALL: c_int = 67;
|
||||
pub const X509_V_ERR_CA_MD_TOO_WEAK: c_int = 68;
|
||||
pub const X509_V_ERR_INVALID_CALL: c_int = 69;
|
||||
pub const X509_V_ERR_STORE_LOOKUP: c_int = 70;
|
||||
pub const X509_V_ERR_NO_VALID_SCTS: c_int = 71;
|
||||
} else if #[cfg(ossl102h)] {
|
||||
pub const X509_V_ERR_INVALID_CALL: c_int = 65;
|
||||
pub const X509_V_ERR_STORE_LOOKUP: c_int = 66;
|
||||
pub const X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: c_int = 67;
|
||||
}
|
||||
}
|
||||
#[cfg(ossl300)]
|
||||
pub const X509_V_ERR_INVALID_CA: c_int = 79;
|
||||
|
||||
#[cfg(not(any(ossl110, libressl370)))]
|
||||
pub const X509_V_FLAG_CB_ISSUER_CHECK: c_ulong = 0x1;
|
||||
#[cfg(any(ossl110, libressl370))]
|
||||
pub const X509_V_FLAG_CB_ISSUER_CHECK: c_ulong = 0x0;
|
||||
pub const X509_V_FLAG_USE_CHECK_TIME: c_ulong = 0x2;
|
||||
pub const X509_V_FLAG_CRL_CHECK: c_ulong = 0x4;
|
||||
pub const X509_V_FLAG_CRL_CHECK_ALL: c_ulong = 0x8;
|
||||
pub const X509_V_FLAG_IGNORE_CRITICAL: c_ulong = 0x10;
|
||||
pub const X509_V_FLAG_X509_STRICT: c_ulong = 0x20;
|
||||
pub const X509_V_FLAG_ALLOW_PROXY_CERTS: c_ulong = 0x40;
|
||||
pub const X509_V_FLAG_POLICY_CHECK: c_ulong = 0x80;
|
||||
pub const X509_V_FLAG_EXPLICIT_POLICY: c_ulong = 0x100;
|
||||
pub const X509_V_FLAG_INHIBIT_ANY: c_ulong = 0x200;
|
||||
pub const X509_V_FLAG_INHIBIT_MAP: c_ulong = 0x400;
|
||||
pub const X509_V_FLAG_NOTIFY_POLICY: c_ulong = 0x800;
|
||||
pub const X509_V_FLAG_EXTENDED_CRL_SUPPORT: c_ulong = 0x1000;
|
||||
pub const X509_V_FLAG_USE_DELTAS: c_ulong = 0x2000;
|
||||
pub const X509_V_FLAG_CHECK_SS_SIGNATURE: c_ulong = 0x4000;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_FLAG_TRUSTED_FIRST: c_ulong = 0x8000;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_FLAG_SUITEB_128_LOS_ONLY: c_ulong = 0x10000;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_FLAG_SUITEB_192_LOS: c_ulong = 0x20000;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_FLAG_SUITEB_128_LOS: c_ulong = 0x30000;
|
||||
#[cfg(ossl102)]
|
||||
pub const X509_V_FLAG_PARTIAL_CHAIN: c_ulong = 0x80000;
|
||||
#[cfg(ossl110)]
|
||||
pub const X509_V_FLAG_NO_ALT_CHAINS: c_ulong = 0x100000;
|
||||
#[cfg(ossl110)]
|
||||
pub const X509_V_FLAG_NO_CHECK_TIME: c_ulong = 0x200000;
|
||||
|
||||
pub unsafe fn X509_LOOKUP_add_dir(
|
||||
ctx: *mut X509_LOOKUP,
|
||||
name: *const c_char,
|
||||
_type: c_int,
|
||||
) -> c_int {
|
||||
const X509_L_ADD_DIR: c_int = 2;
|
||||
X509_LOOKUP_ctrl(
|
||||
ctx,
|
||||
X509_L_ADD_DIR,
|
||||
name,
|
||||
_type as c_long,
|
||||
std::ptr::null_mut(),
|
||||
)
|
||||
}
|
||||
112
vendor/openssl-sys/src/x509v3.rs
vendored
Normal file
112
vendor/openssl-sys/src/x509v3.rs
vendored
Normal file
|
|
@ -0,0 +1,112 @@
|
|||
use libc::*;
|
||||
|
||||
use super::*;
|
||||
|
||||
#[repr(C)]
|
||||
pub struct GENERAL_NAME {
|
||||
pub type_: c_int,
|
||||
// FIXME should be a union
|
||||
pub d: *mut c_void,
|
||||
}
|
||||
|
||||
stack!(stack_st_GENERAL_NAME);
|
||||
|
||||
pub const GEN_OTHERNAME: c_int = 0;
|
||||
pub const GEN_EMAIL: c_int = 1;
|
||||
pub const GEN_DNS: c_int = 2;
|
||||
pub const GEN_X400: c_int = 3;
|
||||
pub const GEN_DIRNAME: c_int = 4;
|
||||
pub const GEN_EDIPARTY: c_int = 5;
|
||||
pub const GEN_URI: c_int = 6;
|
||||
pub const GEN_IPADD: c_int = 7;
|
||||
pub const GEN_RID: c_int = 8;
|
||||
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT: c_uint = 0x1;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const X509_CHECK_FLAG_NO_WILDCARDS: c_uint = 0x2;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS: c_uint = 0x4;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS: c_uint = 0x8;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS: c_uint = 0x10;
|
||||
#[cfg(ossl110)]
|
||||
pub const X509_CHECK_FLAG_NEVER_CHECK_SUBJECT: c_uint = 0x20;
|
||||
|
||||
pub const X509V3_ADD_DEFAULT: c_ulong = 0;
|
||||
pub const X509V3_ADD_APPEND: c_ulong = 1;
|
||||
pub const X509V3_ADD_REPLACE: c_ulong = 2;
|
||||
pub const X509V3_ADD_REPLACE_EXISTING: c_ulong = 3;
|
||||
pub const X509V3_ADD_KEEP_EXISTING: c_ulong = 4;
|
||||
pub const X509V3_ADD_DELETE: c_ulong = 5;
|
||||
pub const X509V3_ADD_SILENT: c_ulong = 0x10;
|
||||
|
||||
pub const EXFLAG_BCONS: u32 = 0x1;
|
||||
pub const EXFLAG_KUSAGE: u32 = 0x2;
|
||||
pub const EXFLAG_XKUSAGE: u32 = 0x4;
|
||||
pub const EXFLAG_NSCERT: u32 = 0x8;
|
||||
pub const EXFLAG_CA: u32 = 0x10;
|
||||
pub const EXFLAG_SI: u32 = 0x20;
|
||||
pub const EXFLAG_V1: u32 = 0x40;
|
||||
pub const EXFLAG_INVALID: u32 = 0x80;
|
||||
pub const EXFLAG_SET: u32 = 0x100;
|
||||
pub const EXFLAG_CRITICAL: u32 = 0x200;
|
||||
pub const EXFLAG_PROXY: u32 = 0x400;
|
||||
pub const EXFLAG_INVALID_POLICY: u32 = 0x800;
|
||||
pub const EXFLAG_FRESHEST: u32 = 0x1000;
|
||||
#[cfg(any(ossl102, libressl261))]
|
||||
pub const EXFLAG_SS: u32 = 0x2000;
|
||||
|
||||
pub const X509v3_KU_DIGITAL_SIGNATURE: u32 = 0x0080;
|
||||
pub const X509v3_KU_NON_REPUDIATION: u32 = 0x0040;
|
||||
pub const X509v3_KU_KEY_ENCIPHERMENT: u32 = 0x0020;
|
||||
pub const X509v3_KU_DATA_ENCIPHERMENT: u32 = 0x0010;
|
||||
pub const X509v3_KU_KEY_AGREEMENT: u32 = 0x0008;
|
||||
pub const X509v3_KU_KEY_CERT_SIGN: u32 = 0x0004;
|
||||
pub const X509v3_KU_CRL_SIGN: u32 = 0x0002;
|
||||
pub const X509v3_KU_ENCIPHER_ONLY: u32 = 0x0001;
|
||||
pub const X509v3_KU_DECIPHER_ONLY: u32 = 0x8000;
|
||||
pub const X509v3_KU_UNDEF: u32 = 0xffff;
|
||||
|
||||
pub const XKU_SSL_SERVER: u32 = 0x1;
|
||||
pub const XKU_SSL_CLIENT: u32 = 0x2;
|
||||
pub const XKU_SMIME: u32 = 0x4;
|
||||
pub const XKU_CODE_SIGN: u32 = 0x8;
|
||||
pub const XKU_SGC: u32 = 0x10;
|
||||
pub const XKU_OCSP_SIGN: u32 = 0x20;
|
||||
pub const XKU_TIMESTAMP: u32 = 0x40;
|
||||
pub const XKU_DVCS: u32 = 0x80;
|
||||
#[cfg(ossl110)]
|
||||
pub const XKU_ANYEKU: u32 = 0x100;
|
||||
|
||||
pub const X509_PURPOSE_SSL_CLIENT: c_int = 1;
|
||||
pub const X509_PURPOSE_SSL_SERVER: c_int = 2;
|
||||
pub const X509_PURPOSE_NS_SSL_SERVER: c_int = 3;
|
||||
pub const X509_PURPOSE_SMIME_SIGN: c_int = 4;
|
||||
pub const X509_PURPOSE_SMIME_ENCRYPT: c_int = 5;
|
||||
pub const X509_PURPOSE_CRL_SIGN: c_int = 6;
|
||||
pub const X509_PURPOSE_ANY: c_int = 7;
|
||||
pub const X509_PURPOSE_OCSP_HELPER: c_int = 8;
|
||||
pub const X509_PURPOSE_TIMESTAMP_SIGN: c_int = 9;
|
||||
#[cfg(ossl320)]
|
||||
pub const X509_PURPOSE_CODE_SIGN: c_int = 10;
|
||||
pub const X509_PURPOSE_MIN: c_int = 1;
|
||||
cfg_if! {
|
||||
if #[cfg(ossl320)] {
|
||||
pub const X509_PURPOSE_MAX: c_int = 10;
|
||||
} else {
|
||||
pub const X509_PURPOSE_MAX: c_int = 9;
|
||||
}
|
||||
}
|
||||
|
||||
pub const CRL_REASON_UNSPECIFIED: c_int = 0;
|
||||
pub const CRL_REASON_KEY_COMPROMISE: c_int = 1;
|
||||
pub const CRL_REASON_CA_COMPROMISE: c_int = 2;
|
||||
pub const CRL_REASON_AFFILIATION_CHANGED: c_int = 3;
|
||||
pub const CRL_REASON_SUPERSEDED: c_int = 4;
|
||||
pub const CRL_REASON_CESSATION_OF_OPERATION: c_int = 5;
|
||||
pub const CRL_REASON_CERTIFICATE_HOLD: c_int = 6;
|
||||
pub const CRL_REASON_REMOVE_FROM_CRL: c_int = 8;
|
||||
pub const CRL_REASON_PRIVILEGE_WITHDRAWN: c_int = 9;
|
||||
pub const CRL_REASON_AA_COMPROMISE: c_int = 10;
|
||||
Loading…
Add table
Add a link
Reference in a new issue