aboutsummaryrefslogtreecommitdiff
path: root/openssl-sys/src/tls1.rs
diff options
context:
space:
mode:
authorSteven Fackler <[email protected]>2018-09-12 20:02:40 -0700
committerGitHub <[email protected]>2018-09-12 20:02:40 -0700
commita29c789e5769169bc338d2ea4773603b674edc9d (patch)
tree2f3c49b218a501b7ec549a1f1fdfeaa37a0186df /openssl-sys/src/tls1.rs
parentBump to 1.1.1 release (diff)
parentRefactor openssl-sys (diff)
downloadrust-openssl-a29c789e5769169bc338d2ea4773603b674edc9d.tar.xz
rust-openssl-a29c789e5769169bc338d2ea4773603b674edc9d.zip
Merge pull request #990 from sfackler/one-sys-mod
Refactor openssl-sys
Diffstat (limited to 'openssl-sys/src/tls1.rs')
-rw-r--r--openssl-sys/src/tls1.rs111
1 files changed, 111 insertions, 0 deletions
diff --git a/openssl-sys/src/tls1.rs b/openssl-sys/src/tls1.rs
new file mode 100644
index 00000000..ca5a512a
--- /dev/null
+++ b/openssl-sys/src/tls1.rs
@@ -0,0 +1,111 @@
+use libc::*;
+use std::ptr;
+use std::mem;
+
+use *;
+
+pub const TLS1_VERSION: c_int = 0x301;
+pub const TLS1_1_VERSION: c_int = 0x302;
+pub const TLS1_2_VERSION: c_int = 0x303;
+#[cfg(ossl111)]
+pub const TLS1_3_VERSION: c_int = 0x304;
+
+pub const TLS1_AD_DECODE_ERROR: c_int = 50;
+pub const TLS1_AD_UNRECOGNIZED_NAME: c_int = 112;
+
+pub const TLSEXT_NAMETYPE_host_name: c_int = 0;
+pub const TLSEXT_STATUSTYPE_ocsp: c_int = 1;
+
+extern "C" {
+ pub fn SSL_get_servername(ssl: *const SSL, name_type: c_int) -> *const c_char;
+
+ pub fn SSL_export_keying_material(
+ s: *mut SSL,
+ out: *mut c_uchar,
+ olen: size_t,
+ label: *const c_char,
+ llen: size_t,
+ context: *const c_uchar,
+ contextlen: size_t,
+ use_context: c_int,
+ ) -> c_int;
+
+ #[cfg(ossl111)]
+ pub fn SSL_export_keying_material_early(
+ s: *mut ::SSL,
+ out: *mut c_uchar,
+ olen: size_t,
+ label: *const c_char,
+ llen: size_t,
+ context: *const c_uchar,
+ contextlen: size_t,
+ ) -> c_int;
+}
+
+pub unsafe fn SSL_set_tlsext_host_name(s: *mut SSL, name: *mut c_char) -> c_long {
+ SSL_ctrl(
+ s,
+ SSL_CTRL_SET_TLSEXT_HOSTNAME,
+ TLSEXT_NAMETYPE_host_name as c_long,
+ name as *mut c_void,
+ )
+}
+
+pub unsafe fn SSL_set_tlsext_status_type(s: *mut SSL, type_: c_int) -> c_long {
+ SSL_ctrl(
+ s,
+ SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,
+ type_ as c_long,
+ ptr::null_mut(),
+ )
+}
+
+pub unsafe fn SSL_get_tlsext_status_ocsp_resp(ssl: *mut SSL, resp: *mut *mut c_uchar) -> c_long {
+ SSL_ctrl(
+ ssl,
+ SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP,
+ 0,
+ resp as *mut c_void,
+ )
+}
+
+pub unsafe fn SSL_set_tlsext_status_ocsp_resp(
+ ssl: *mut SSL,
+ resp: *mut c_uchar,
+ len: c_long,
+) -> c_long {
+ SSL_ctrl(
+ ssl,
+ SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP,
+ len,
+ resp as *mut c_void,
+ )
+}
+
+pub unsafe fn SSL_CTX_set_tlsext_servername_callback(
+ ctx: *mut SSL_CTX,
+ // FIXME should have the right signature
+ cb: Option<extern "C" fn()>,
+) -> c_long {
+ SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_CB, cb)
+}
+
+pub const SSL_TLSEXT_ERR_OK: c_int = 0;
+pub const SSL_TLSEXT_ERR_ALERT_WARNING: c_int = 1;
+pub const SSL_TLSEXT_ERR_ALERT_FATAL: c_int = 2;
+pub const SSL_TLSEXT_ERR_NOACK: c_int = 3;
+
+pub unsafe fn SSL_CTX_set_tlsext_servername_arg(ctx: *mut SSL_CTX, arg: *mut c_void) -> c_long {
+ SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG, 0, arg)
+}
+
+pub unsafe fn SSL_CTX_set_tlsext_status_cb(
+ ctx: *mut SSL_CTX,
+ cb: Option<unsafe extern "C" fn(*mut SSL, *mut c_void) -> c_int>,
+) -> c_long {
+ SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB, mem::transmute(cb))
+}
+
+pub unsafe fn SSL_CTX_set_tlsext_status_arg(ctx: *mut SSL_CTX, arg: *mut c_void) -> c_long {
+ SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG, 0, arg)
+}