summaryrefslogtreecommitdiffstats
path: root/extra/includes/gnutls/openssl.h
diff options
context:
space:
mode:
Diffstat (limited to 'extra/includes/gnutls/openssl.h')
-rw-r--r--extra/includes/gnutls/openssl.h329
1 files changed, 329 insertions, 0 deletions
diff --git a/extra/includes/gnutls/openssl.h b/extra/includes/gnutls/openssl.h
new file mode 100644
index 0000000..ec9fd3c
--- /dev/null
+++ b/extra/includes/gnutls/openssl.h
@@ -0,0 +1,329 @@
+/*
+ * Copyright (C) 2004-2012 Free Software Foundation, Inc.
+ * Copyright (c) 2002 Andrew McDonald <andrew@mcdonald.org.uk>
+ *
+ * This file is part of GnuTLS-EXTRA.
+ *
+ * GnuTLS-extra is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License as
+ * published by the Free Software Foundation; either version 3 of the
+ * License, or (at your option) any later version.
+ *
+ * GnuTLS-extra is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GnuTLS-EXTRA; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ * 02110-1301, USA.
+ *
+ */
+
+/* WARNING: Error functions aren't currently thread-safe */
+
+/* This file contains prototypes about the OpenSSL compatibility layer
+ * in GnuTLS. GnuTLS is not a complete replacement of OPENSSL so this
+ * compatibility layer only supports limited OpenSSL functionality.
+ *
+ * New programs should avoid using this compatibility layer, and use
+ * the native GnuTLS API directly.
+ */
+
+#ifndef GNUTLS_OPENSSL_H
+#define GNUTLS_OPENSSL_H
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+#include <gnutls/gnutls.h>
+
+/* Extra definitions that no longer exist in gnutls.
+ */
+#define GNUTLS_X509_CN_SIZE 256
+#define GNUTLS_X509_C_SIZE 3
+#define GNUTLS_X509_O_SIZE 256
+#define GNUTLS_X509_OU_SIZE 256
+#define GNUTLS_X509_L_SIZE 256
+#define GNUTLS_X509_S_SIZE 256
+#define GNUTLS_X509_EMAIL_SIZE 256
+
+ typedef struct {
+ char common_name[GNUTLS_X509_CN_SIZE];
+ char country[GNUTLS_X509_C_SIZE];
+ char organization[GNUTLS_X509_O_SIZE];
+ char organizational_unit_name[GNUTLS_X509_OU_SIZE];
+ char locality_name[GNUTLS_X509_L_SIZE];
+ char state_or_province_name[GNUTLS_X509_S_SIZE];
+ char email[GNUTLS_X509_EMAIL_SIZE];
+ } gnutls_x509_dn;
+
+
+#define OPENSSL_VERSION_NUMBER (0x0090604F)
+#define SSLEAY_VERSION_NUMBER OPENSSL_VERSION_NUMBER
+#define OPENSSL_VERSION_TEXT ("GNUTLS " GNUTLS_VERSION " ")
+
+#define SSL_ERROR_NONE (0)
+#define SSL_ERROR_SSL (1)
+#define SSL_ERROR_WANT_READ (2)
+#define SSL_ERROR_WANT_WRITE (3)
+#define SSL_ERROR_SYSCALL (5)
+#define SSL_ERROR_ZERO_RETURN (6)
+
+#define SSL_FILETYPE_PEM (GNUTLS_X509_FMT_PEM)
+
+#define SSL_VERIFY_NONE (0)
+
+#define SSL_ST_OK (1)
+
+#define X509_V_ERR_CERT_NOT_YET_VALID (1)
+#define X509_V_ERR_CERT_HAS_EXPIRED (2)
+#define X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT (3)
+
+#define SSL_OP_ALL (0x000FFFFF)
+#define SSL_OP_NO_TLSv1 (0x0400000)
+
+#define SSL_MODE_ENABLE_PARTIAL_WRITE (0x1)
+#define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER (0x2)
+#define SSL_MODE_AUTO_RETRY (0x4)
+
+#undef X509_NAME
+#undef X509
+ typedef gnutls_x509_dn X509_NAME;
+ typedef gnutls_datum_t X509;
+
+ typedef struct _SSL SSL;
+
+ typedef struct {
+ char priority_string[256];
+ unsigned int connend;
+ } SSL_METHOD;
+
+ typedef struct {
+ gnutls_protocol_t version;
+ gnutls_cipher_algorithm_t cipher;
+ gnutls_kx_algorithm_t kx;
+ gnutls_mac_algorithm_t mac;
+ gnutls_compression_method_t compression;
+ gnutls_certificate_type_t cert;
+ } SSL_CIPHER;
+
+ typedef struct _BIO {
+ gnutls_transport_ptr_t fd;
+ } BIO;
+
+ typedef struct {
+ SSL *ssl;
+ int error;
+ const gnutls_datum_t *cert_list;
+#define current_cert cert_list
+ } X509_STORE_CTX;
+
+#define X509_STORE_CTX_get_current_cert(ctx) ((ctx)->current_cert)
+
+ typedef struct _SSL_CTX {
+ SSL_METHOD *method;
+ char *certfile;
+ int certfile_type;
+ char *keyfile;
+ int keyfile_type;
+ unsigned long options;
+
+ int (*verify_callback) (int, X509_STORE_CTX *);
+ int verify_mode;
+
+ } SSL_CTX;
+
+ struct _SSL {
+ gnutls_session_t gnutls_state;
+
+ gnutls_certificate_client_credentials gnutls_cred;
+
+ SSL_CTX *ctx;
+ SSL_CIPHER ciphersuite;
+
+ int last_error;
+ int shutdown;
+ int state;
+ unsigned long options;
+
+ int (*verify_callback) (int, X509_STORE_CTX *);
+ int verify_mode;
+
+ gnutls_transport_ptr_t rfd;
+ gnutls_transport_ptr_t wfd;
+ };
+
+#define rbio gnutls_state
+
+ typedef struct {
+ void *handle;
+ } MD_CTX;
+
+ struct rsa_st;
+ typedef struct rsa_st RSA;
+
+#define MD5_CTX MD_CTX
+#define RIPEMD160_CTX MD_CTX
+
+#define OpenSSL_add_ssl_algorithms() SSL_library_init()
+#define SSLeay_add_ssl_algorithms() SSL_library_init()
+#define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms()
+
+#define SSL_get_cipher_name(ssl) SSL_CIPHER_get_name(SSL_get_current_cipher(ssl))
+#define SSL_get_cipher(ssl) SSL_get_cipher_name(ssl)
+#define SSL_get_cipher_bits(ssl,bp) SSL_CIPHER_get_bits(SSL_get_current_cipher(ssl),(bp))
+#define SSL_get_cipher_version(ssl) SSL_CIPHER_get_version(SSL_get_current_cipher(ssl))
+
+
+/* Library initialisation functions */
+
+ int SSL_library_init(void);
+ void OpenSSL_add_all_algorithms(void);
+
+
+/* SSL_CTX structure handling */
+
+ SSL_CTX *SSL_CTX_new(SSL_METHOD * method);
+ void SSL_CTX_free(SSL_CTX * ctx);
+ int SSL_CTX_set_default_verify_paths(SSL_CTX * ctx);
+ int SSL_CTX_use_certificate_file(SSL_CTX * ctx,
+ const char *certfile, int type);
+ int SSL_CTX_use_PrivateKey_file(SSL_CTX * ctx, const char *keyfile,
+ int type);
+ void SSL_CTX_set_verify(SSL_CTX * ctx, int verify_mode,
+ int (*verify_callback) (int,
+ X509_STORE_CTX *));
+ unsigned long SSL_CTX_set_options(SSL_CTX * ctx,
+ unsigned long options);
+ long SSL_CTX_set_mode(SSL_CTX * ctx, long mode);
+ int SSL_CTX_set_cipher_list(SSL_CTX * ctx, const char *list);
+
+
+/* SSL_CTX statistics */
+
+ long SSL_CTX_sess_number(SSL_CTX * ctx);
+ long SSL_CTX_sess_connect(SSL_CTX * ctx);
+ long SSL_CTX_sess_connect_good(SSL_CTX * ctx);
+ long SSL_CTX_sess_connect_renegotiate(SSL_CTX * ctx);
+ long SSL_CTX_sess_accept(SSL_CTX * ctx);
+ long SSL_CTX_sess_accept_good(SSL_CTX * ctx);
+ long SSL_CTX_sess_accept_renegotiate(SSL_CTX * ctx);
+ long SSL_CTX_sess_hits(SSL_CTX * ctx);
+ long SSL_CTX_sess_misses(SSL_CTX * ctx);
+ long SSL_CTX_sess_timeouts(SSL_CTX * ctx);
+
+
+/* SSL structure handling */
+
+ SSL *SSL_new(SSL_CTX * ctx);
+ void SSL_free(SSL * ssl);
+ void SSL_load_error_strings(void);
+ int SSL_get_error(SSL * ssl, int ret);
+ int SSL_set_fd(SSL * ssl, int fd);
+ int SSL_set_rfd(SSL * ssl, int fd);
+ int SSL_set_wfd(SSL * ssl, int fd);
+ void SSL_set_bio(SSL * ssl, BIO * rbio, BIO * wbio);
+ void SSL_set_connect_state(SSL * ssl);
+ int SSL_pending(SSL * ssl);
+ void SSL_set_verify(SSL * ssl, int verify_mode,
+ int (*verify_callback) (int,
+ X509_STORE_CTX *));
+ const X509 *SSL_get_peer_certificate(SSL * ssl);
+
+/* SSL connection open/close/read/write functions */
+
+ int SSL_connect(SSL * ssl);
+ int SSL_accept(SSL * ssl);
+ int SSL_shutdown(SSL * ssl);
+ int SSL_read(SSL * ssl, void *buf, int len);
+ int SSL_write(SSL * ssl, const void *buf, int len);
+
+ int SSL_want(SSL * ssl);
+
+#define SSL_NOTHING (1)
+#define SSL_WRITING (2)
+#define SSL_READING (3)
+#define SSL_X509_LOOKUP (4)
+
+#define SSL_want_nothing(s) (SSL_want(s) == SSL_NOTHING)
+#define SSL_want_read(s) (SSL_want(s) == SSL_READING)
+#define SSL_want_write(s) (SSL_want(s) == SSL_WRITING)
+#define SSL_want_x509_lookup(s) (SSL_want(s) == SSL_X509_LOOKUP)
+
+
+/* SSL_METHOD functions */
+
+ SSL_METHOD *SSLv23_client_method(void);
+ SSL_METHOD *SSLv23_server_method(void);
+ SSL_METHOD *SSLv3_client_method(void);
+ SSL_METHOD *SSLv3_server_method(void);
+ SSL_METHOD *TLSv1_client_method(void);
+ SSL_METHOD *TLSv1_server_method(void);
+
+
+/* SSL_CIPHER functions */
+
+ SSL_CIPHER *SSL_get_current_cipher(SSL * ssl);
+ const char *SSL_CIPHER_get_name(SSL_CIPHER * cipher);
+ int SSL_CIPHER_get_bits(SSL_CIPHER * cipher, int *bits);
+ const char *SSL_CIPHER_get_version(SSL_CIPHER * cipher);
+ char *SSL_CIPHER_description(SSL_CIPHER * cipher, char *buf,
+ int size);
+
+
+/* X509 functions */
+
+ X509_NAME *X509_get_subject_name(const X509 * cert);
+ X509_NAME *X509_get_issuer_name(const X509 * cert);
+ char *X509_NAME_oneline(gnutls_x509_dn * name, char *buf, int len);
+ void X509_free(const X509 * cert);
+
+
+/* BIO functions */
+
+ void BIO_get_fd(gnutls_session_t gnutls_state, int *fd);
+ BIO *BIO_new_socket(int sock, int close_flag);
+
+/* error handling */
+
+ unsigned long ERR_get_error(void);
+ const char *ERR_error_string(unsigned long e, char *buf);
+
+
+/* RAND functions */
+
+ int RAND_status(void);
+ void RAND_seed(const void *buf, int num);
+ int RAND_bytes(unsigned char *buf, int num);
+ int RAND_pseudo_bytes(unsigned char *buf, int num);
+ const char *RAND_file_name(char *buf, size_t len);
+ int RAND_load_file(const char *name, long maxbytes);
+ int RAND_write_file(const char *name);
+
+ int RAND_egd_bytes(const char *path, int bytes);
+#define RAND_egd(p) RAND_egd_bytes((p), 255)
+
+/* message digest functions */
+
+#define MD5_DIGEST_LENGTH 16
+
+ void MD5_Init(MD5_CTX * ctx);
+ void MD5_Update(MD5_CTX * ctx, const void *buf, int len);
+ void MD5_Final(unsigned char *md, MD5_CTX * ctx);
+ unsigned char *MD5(const unsigned char *buf, unsigned long len,
+ unsigned char *md);
+
+ void RIPEMD160_Init(RIPEMD160_CTX * ctx);
+ void RIPEMD160_Update(RIPEMD160_CTX * ctx, const void *buf,
+ int len);
+ void RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX * ctx);
+ unsigned char *RIPEMD160(const unsigned char *buf,
+ unsigned long len, unsigned char *md);
+
+#ifdef __cplusplus
+}
+#endif
+#endif