diff options
| author | Benjamin Saunders <[email protected]> | 2018-03-04 22:04:41 -0800 |
|---|---|---|
| committer | Benjamin Saunders <[email protected]> | 2018-03-05 17:45:08 -0800 |
| commit | 38f4705b1dd1b0851944ee799e11c6011dc7b807 (patch) | |
| tree | f9edd5464390ffc186ae7a93a467e47dbffb09ad /openssl-sys/src | |
| parent | Merge pull request #857 from Ralith/middlebox-compat (diff) | |
| download | rust-openssl-38f4705b1dd1b0851944ee799e11c6011dc7b807.tar.xz rust-openssl-38f4705b1dd1b0851944ee799e11c6011dc7b807.zip | |
FFI for OpenSSL 1.1.1 custom extension support
Diffstat (limited to 'openssl-sys/src')
| -rw-r--r-- | openssl-sys/src/lib.rs | 6 | ||||
| -rw-r--r-- | openssl-sys/src/ossl10x.rs | 3 | ||||
| -rw-r--r-- | openssl-sys/src/ossl110.rs | 1 | ||||
| -rw-r--r-- | openssl-sys/src/ossl111.rs | 54 |
4 files changed, 63 insertions, 1 deletions
diff --git a/openssl-sys/src/lib.rs b/openssl-sys/src/lib.rs index 77f69188..d0697435 100644 --- a/openssl-sys/src/lib.rs +++ b/openssl-sys/src/lib.rs @@ -1203,6 +1203,12 @@ pub const RSA_X931_PADDING: c_int = 5; pub const SHA_LBLOCK: c_int = 16; +pub const SSL3_AD_ILLEGAL_PARAMETER: c_int = 47; +pub const SSL_AD_ILLEGAL_PARAMETER: c_int = SSL3_AD_ILLEGAL_PARAMETER; + +pub const TLS1_AD_DECODE_ERROR: c_int = 50; +pub const SSL_AD_DECODE_ERROR: c_int = TLS1_AD_DECODE_ERROR; + pub const TLS1_AD_UNRECOGNIZED_NAME: c_int = 112; pub const SSL_AD_UNRECOGNIZED_NAME: c_int = TLS1_AD_UNRECOGNIZED_NAME; diff --git a/openssl-sys/src/ossl10x.rs b/openssl-sys/src/ossl10x.rs index f8ff7193..87024ac4 100644 --- a/openssl-sys/src/ossl10x.rs +++ b/openssl-sys/src/ossl10x.rs @@ -969,4 +969,7 @@ extern "C" { pub fn SSLeay() -> c_ulong; pub fn SSLeay_version(key: c_int) -> *const c_char; + + #[cfg(ossl102)] + pub fn SSL_extension_supported(ext_type: c_uint) -> c_int; } diff --git a/openssl-sys/src/ossl110.rs b/openssl-sys/src/ossl110.rs index b02c296d..1ab30772 100644 --- a/openssl-sys/src/ossl110.rs +++ b/openssl-sys/src/ossl110.rs @@ -363,4 +363,5 @@ extern "C" { ) -> *mut PKCS12; pub fn X509_REQ_get_version(req: *const X509_REQ) -> c_long; pub fn X509_REQ_get_subject_name(req: *const X509_REQ) -> *mut ::X509_NAME; + pub fn SSL_extension_supported(ext_type: c_uint) -> c_int; } diff --git a/openssl-sys/src/ossl111.rs b/openssl-sys/src/ossl111.rs index 27bc4b54..cca06fda 100644 --- a/openssl-sys/src/ossl111.rs +++ b/openssl-sys/src/ossl111.rs @@ -1,15 +1,67 @@ -use libc::{c_char, c_int, c_ulong}; +use libc::{c_char, c_uchar, c_int, c_uint, c_ulong, size_t, c_void}; pub type SSL_CTX_keylog_cb_func = Option<unsafe extern "C" fn(ssl: *const ::SSL, line: *const c_char)>; +pub type SSL_custom_ext_add_cb_ex = + Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint, + context: c_uint, + out: *mut *const c_uchar, + outlen: *mut size_t, x: *mut ::X509, + chainidx: size_t, al: *mut c_int, + add_arg: *mut c_void) -> c_int>; + +pub type SSL_custom_ext_free_cb_ex = + Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint, + context: c_uint, + out: *mut *const c_uchar, + add_arg: *mut c_void)>; + +pub type SSL_custom_ext_parse_cb_ex = + Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint, + context: c_uint, + input: *const c_uchar, + inlen: size_t, x: *mut ::X509, + chainidx: size_t, al: *mut c_int, + parse_arg: *mut c_void) -> c_int>; + pub const SSL_COOKIE_LENGTH: c_int = 255; pub const SSL_OP_ENABLE_MIDDLEBOX_COMPAT: c_ulong = 0x00100000; pub const TLS1_3_VERSION: c_int = 0x304; +pub const SSL_EXT_TLS_ONLY: c_uint = 0x0001; +/* This extension is only allowed in DTLS */ +pub const SSL_EXT_DTLS_ONLY: c_uint = 0x0002; +/* Some extensions may be allowed in DTLS but we don't implement them for it */ +pub const SSL_EXT_TLS_IMPLEMENTATION_ONLY: c_uint = 0x0004; +/* Most extensions are not defined for SSLv3 but EXT_TYPE_renegotiate is */ +pub const SSL_EXT_SSL3_ALLOWED: c_uint = 0x0008; +/* Extension is only defined for TLS1.2 and below */ +pub const SSL_EXT_TLS1_2_AND_BELOW_ONLY: c_uint = 0x0010; +/* Extension is only defined for TLS1.3 and above */ +pub const SSL_EXT_TLS1_3_ONLY: c_uint = 0x0020; +/* Ignore this extension during parsing if we are resuming */ +pub const SSL_EXT_IGNORE_ON_RESUMPTION: c_uint = 0x0040; +pub const SSL_EXT_CLIENT_HELLO: c_uint = 0x0080; +/* Really means TLS1.2 or below */ +pub const SSL_EXT_TLS1_2_SERVER_HELLO: c_uint = 0x0100; +pub const SSL_EXT_TLS1_3_SERVER_HELLO: c_uint = 0x0200; +pub const SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS: c_uint = 0x0400; +pub const SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST: c_uint = 0x0800; +pub const SSL_EXT_TLS1_3_CERTIFICATE: c_uint = 0x1000; +pub const SSL_EXT_TLS1_3_NEW_SESSION_TICKET: c_uint = 0x2000; +pub const SSL_EXT_TLS1_3_CERTIFICATE_REQUEST: c_uint = 0x4000; + + extern "C" { pub fn SSL_CTX_set_keylog_callback(ctx: *mut ::SSL_CTX, cb: SSL_CTX_keylog_cb_func); + pub fn SSL_CTX_add_custom_ext(ctx: *mut ::SSL_CTX, ext_type: c_uint, context: c_uint, + add_cb: SSL_custom_ext_add_cb_ex, + free_cb: SSL_custom_ext_free_cb_ex, + add_arg: *mut c_void, + parse_cb: SSL_custom_ext_parse_cb_ex, + parse_arg: *mut c_void) -> c_int; pub fn SSL_stateless(s: *mut ::SSL) -> c_int; } |