summaryrefslogtreecommitdiffstats
path: root/third_party/rust/nss-gk-api/bindings/bindings.toml
diff options
context:
space:
mode:
Diffstat (limited to 'third_party/rust/nss-gk-api/bindings/bindings.toml')
-rw-r--r--third_party/rust/nss-gk-api/bindings/bindings.toml285
1 files changed, 285 insertions, 0 deletions
diff --git a/third_party/rust/nss-gk-api/bindings/bindings.toml b/third_party/rust/nss-gk-api/bindings/bindings.toml
new file mode 100644
index 0000000000..572eec7f2a
--- /dev/null
+++ b/third_party/rust/nss-gk-api/bindings/bindings.toml
@@ -0,0 +1,285 @@
+# In this file, every section corresponds to a header file.
+# A corresponding binding file will be created in $OUT_DIR.
+#
+# This configuration is processed by build.rs to populate `exclude` for each
+# header with the types/variables/functions/enums declared for generation in
+# other headers.
+
+[nspr_types]
+types = [
+ "PRBool",
+ "PRIntn",
+ "PRInt16",
+ "PRInt32",
+ "PRInt64",
+ "PROffset32",
+ "PROffset64",
+ "PRSize",
+ "PRStatus",
+ "PRUintn",
+ "PRUint8",
+ "PRUint16",
+ "PRUint32",
+ "PRUint64",
+ "PRUword",
+]
+variables = [
+ "PR_FALSE",
+ "PR_TRUE",
+]
+
+[nss_prelude]
+types = [
+ "SECItem",
+ "SECItemArray",
+ "SECItemStr",
+ "SECStatus",
+]
+functions = [
+ "SECITEM_FreeItem",
+]
+enums = [
+ "_SECStatus",
+ "SECItemType",
+]
+
+[nss_ssl]
+types = [
+ "SSLAlertDescription",
+ "SSLExtensionType",
+ "SSLNamedGroup",
+ "SSLProtocolVariant",
+ "SSLSignatureScheme",
+]
+functions = [
+ "SSL_AlertSentCallback",
+ "SSL_AuthCertificateComplete",
+ "SSL_AuthCertificateHook",
+ "SSL_CipherPrefSet",
+ "SSL_ConfigServerCert",
+ "SSL_ConfigServerSessionIDCache",
+ "SSL_DestroyResumptionTokenInfo",
+ "SSL_GetChannelInfo",
+ "SSL_GetImplementedCiphers",
+ "SSL_GetNextProto",
+ "SSL_GetNumImplementedCiphers",
+ "SSL_GetPreliminaryChannelInfo",
+ "SSL_GetResumptionTokenInfo",
+ "SSL_ForceHandshake",
+ "SSL_ImportFD",
+ "SSL_NamedGroupConfig",
+ "SSL_OptionSet",
+ "SSL_OptionGetDefault",
+ "SSL_PeerCertificate",
+ "SSL_PeerCertificateChain",
+ "SSL_PeerSignedCertTimestamps",
+ "SSL_PeerStapledOCSPResponses",
+ "SSL_ResetHandshake",
+ "SSL_SetNextProtoNego",
+ "SSL_SetURL",
+ "SSL_VersionRangeSet",
+]
+enums = [
+ "SSLAuthType",
+ "SSLCipherAlgorithm",
+ "SSLCompressionMethod",
+ "SSLExtensionType",
+ "SSLKEAType",
+ "SSLMACAlgorithm",
+ "SSLNamedGroup",
+ "SSLNextProtoState",
+ "SSLProtocolVariant",
+ "SSLSignatureScheme",
+]
+variables = [
+ "SSL_LIBRARY_VERSION_TLS_\\d_\\d",
+ "SSL_NumImplementedCiphers",
+ "ssl_preinfo_.*",
+]
+opaque = [
+ "SSLExtraServerCertData",
+]
+
+[nss_sslopt]
+variables = [
+ "SSL_REQUEST_CERTIFICATE",
+ "SSL_REQUIRE_CERTIFICATE",
+ "SSL_NO_LOCKS",
+ "SSL_ENABLE_SESSION_TICKETS",
+ "SSL_ENABLE_OCSP_STAPLING",
+ "SSL_ENABLE_ALPN",
+ "SSL_ENABLE_EXTENDED_MASTER_SECRET",
+ "SSL_ENABLE_SIGNED_CERT_TIMESTAMPS",
+ "SSL_ENABLE_0RTT_DATA",
+ "SSL_RECORD_SIZE_LIMIT",
+ "SSL_ENABLE_TLS13_COMPAT_MODE",
+ "SSL_ENABLE_HELLO_DOWNGRADE_CHECK",
+ "SSL_SUPPRESS_END_OF_EARLY_DATA",
+]
+
+[nss_ciphers]
+variables = ["TLS_.*"]
+exclude = [
+ ".*_(?:EXPORT(?:1024)?|anon|DES|RC4)_.*",
+ ".*_(?:MD5|NULL_SHA)",
+]
+
+[nss_secerr]
+types = ["SECErrorCodes"]
+enums = ["SECErrorCodes"]
+
+[nss_sslerr]
+types = ["SSLErrorCodes"]
+enums = ["SSLErrorCodes"]
+
+[nss_init]
+functions = [
+ "NSS_Initialize",
+ "NSS_IsInitialized",
+ "NSS_NoDB_Init",
+ "NSS_SetDomesticPolicy",
+ "NSS_Shutdown",
+ "NSS_VersionCheck",
+]
+variables = [
+ "NSS_INIT_READONLY",
+ "SECMOD_DB",
+]
+
+[nss_p11]
+types = [
+ "CERTCertList",
+ "CERTCertListNode",
+ "HpkeAeadId",
+ "HpkeKdfId",
+ "HpkeKemId",
+]
+functions = [
+ "CERT_DestroyCertificate",
+ "CERT_DestroyCertList",
+ "CERT_GetCertificateDer",
+ "PK11_CipherOp",
+ "PK11_CreateContextBySymKey",
+ "PK11_Decrypt",
+ "PK11_DestroyContext",
+ "PK11_DigestOp",
+ "PK11_DigestFinal",
+ "PK11_Encrypt",
+ "PK11_ExportDERPrivateKeyInfo",
+ "PK11_ExtractKeyValue",
+ "PK11_FindCertFromNickname",
+ "PK11_FindKeyByAnyCert",
+ "PK11_FreeSlot",
+ "PK11_FreeSymKey",
+ "PK11_GenerateKeyPairWithOpFlags",
+ "PK11_GenerateRandom",
+ "PK11_GetBlockSize",
+ "PK11_GetInternalSlot",
+ "PK11_GetKeyData",
+ "PK11_GetMechanism",
+ "PK11_HashBuf",
+ "PK11_HPKE_Serialize",
+ "PK11_ImportDataKey",
+ "PK11_ImportDERPrivateKeyInfoAndReturnKey",
+ "PK11_ImportSymKey",
+ "PK11_PubDeriveWithKDF",
+ "PK11_ReadRawAttribute",
+ "PK11_ReferenceSymKey",
+ "PK11_SignWithMechanism",
+ "PK11_VerifyWithMechanism",
+ "PK11_WrapPrivKey",
+ "SECKEY_CopyPrivateKey",
+ "SECKEY_CopyPublicKey",
+ "SECKEY_DecodeDERSubjectPublicKeyInfo",
+ "SECKEY_DestroyPrivateKey",
+ "SECKEY_DestroyPublicKey",
+ "SECKEY_DestroySubjectPublicKeyInfo",
+ "SECKEY_ExtractPublicKey",
+ "SECKEY_ConvertToPublicKey",
+ "SECOID_FindOIDByTag",
+]
+enums = [
+ "HpkeAeadId",
+ "HpkeKdfId",
+ "HpkeKemId",
+ "PK11ObjectType",
+ "PK11Origin",
+ "SECOidTag",
+]
+opaque = [
+ "CERTCertificateStr",
+ "PK11ContextStr",
+ "PK11SlotInfoStr",
+ "PK11SymKeyStr",
+ "SECKEYPrivateKeyStr",
+ "SECKEYPublicKeyStr",
+]
+variables = [
+ "AES_BLOCK_SIZE",
+ "PK11_ATTR_EXTRACTABLE",
+ "PK11_ATTR_INSENSITIVE",
+ "PK11_ATTR_PRIVATE",
+ "PK11_ATTR_PUBLIC",
+ "PK11_ATTR_SENSITIVE",
+ "PK11_ATTR_SESSION",
+ "SEC_ASN1_OBJECT_ID",
+ "SHA256_LENGTH",
+]
+
+[nspr_err]
+variables = ["PR_.*_ERROR"]
+
+[nspr_error]
+types = [
+ "PRErrorCode",
+]
+functions = [
+ "PR_ErrorToName",
+ "PR_ErrorToString",
+ "PR_GetError",
+ "PR_SetError",
+]
+variables = [
+ "PR_LANGUAGE_I_DEFAULT",
+]
+
+[nspr_io]
+types = [
+ "PRFileDesc",
+ "PRFileInfo",
+ "PRFileInfo64",
+ "PRFilePrivate",
+ "PRIOMethods",
+ "PRIOVec",
+ "PRSeekFN",
+ "PRSeek64FN",
+]
+functions = [
+ "PR_Close",
+ "PR_CreateIOLayerStub",
+ "PR_GetUniqueIdentity",
+]
+variables = [
+ "PR_AF_INET",
+]
+# opaque is for the stuff we don't plan to use, but we need for function signatures.
+opaque = [
+ "PRFileDesc",
+ "PRFileInfo",
+ "PRFileInfo64",
+ "PRFilePrivate",
+ "PRIOVec",
+]
+enums = [
+ "PRDescType",
+ "PRSeekWhence",
+]
+
+[nspr_time]
+types = ["PRTime"]
+functions = ["PR_Now"]
+
+[mozpkix]
+cplusplus = true
+types = ["mozilla::pkix::ErrorCode"]
+enums = ["mozilla::pkix::ErrorCode"]