use super::super::*; use libc::*; pub enum SSL_METHOD {} pub enum SSL_CIPHER {} cfg_if! { if #[cfg(any(ossl110, libressl280))] { pub enum SSL_SESSION {} } else if #[cfg(libressl251)] { #[repr(C)] pub struct SSL_SESSION { ssl_version: c_int, pub master_key_length: c_int, pub master_key: [c_uchar; 48], session_id_length: c_uint, session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize], sid_ctx_length: c_uint, sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], peer: *mut X509, verify_result: c_long, timeout: c_long, time: time_t, pub references: c_int, cipher: *const SSL_CIPHER, cipher_id: c_long, ciphers: *mut stack_st_SSL_CIPHER, tlsext_hostname: *mut c_char, tlsext_tick: *mut c_uchar, tlsext_ticklen: size_t, tlsext_tick_lifetime_int: c_long, internal: *mut c_void, } } else if #[cfg(libressl)] { #[repr(C)] pub struct SSL_SESSION { ssl_version: c_int, pub master_key_length: c_int, pub master_key: [c_uchar; 48], session_id_length: c_uint, session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize], sid_ctx_length: c_uint, sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], not_resumable: c_int, sess_cert: *mut c_void, peer: *mut X509, verify_result: c_long, timeout: c_long, time: time_t, pub references: c_int, cipher: *const c_void, cipher_id: c_ulong, ciphers: *mut c_void, ex_data: CRYPTO_EX_DATA, prev: *mut c_void, next: *mut c_void, tlsext_hostname: *mut c_char, tlsext_ecpointformatlist_length: size_t, tlsext_ecpointformatlist: *mut u8, tlsext_ellipticcurvelist_length: size_t, tlsext_ellipticcurvelist: *mut u16, tlsext_tick: *mut c_uchar, tlsext_ticklen: size_t, tlsext_tick_lifetime_hint: c_long, } } else { #[repr(C)] pub struct SSL_SESSION { ssl_version: c_int, key_arg_length: c_uint, key_arg: [c_uchar; SSL_MAX_KEY_ARG_LENGTH as usize], pub master_key_length: c_int, pub master_key: [c_uchar; 48], session_id_length: c_uint, session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize], sid_ctx_length: c_uint, sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize], #[cfg(not(osslconf = "OPENSSL_NO_KRB5"))] krb5_client_princ_len: c_uint, #[cfg(not(osslconf = "OPENSSL_NO_KRB5"))] krb5_client_princ: [c_uchar; SSL_MAX_KRB5_PRINCIPAL_LENGTH as usize], #[cfg(not(osslconf = "OPENSSL_NO_PSK"))] psk_identity_hint: *mut c_char, #[cfg(not(osslconf = "OPENSSL_NO_PSK"))] psk_identity: *mut c_char, not_resumable: c_int, sess_cert: *mut c_void, peer: *mut X509, verify_result: c_long, pub references: c_int, timeout: c_long, time: c_long, compress_meth: c_uint, cipher: *const c_void, cipher_id: c_ulong, ciphers: *mut c_void, ex_data: CRYPTO_EX_DATA, prev: *mut c_void, next: *mut c_void, #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))] tlsext_hostname: *mut c_char, #[cfg(all( not(osslconf = "OPENSSL_NO_TLSEXT"), not(osslconf = "OPENSSL_NO_EC") ))] tlsext_ecpointformatlist_length: size_t, #[cfg(all( not(osslconf = "OPENSSL_NO_TLSEXT"), not(osslconf = "OPENSSL_NO_EC") ))] tlsext_ecpointformatlist: *mut c_uchar, #[cfg(all( not(osslconf = "OPENSSL_NO_TLSEXT"), not(osslconf = "OPENSSL_NO_EC") ))] tlsext_ellipticcurvelist_length: size_t, #[cfg(all( not(osslconf = "OPENSSL_NO_TLSEXT"), not(osslconf = "OPENSSL_NO_EC") ))] tlsext_ellipticcurvelist: *mut c_uchar, #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))] tlsext_tick: *mut c_uchar, #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))] tlsext_ticklen: size_t, #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))] tlsext_tick_lifetime_hint: c_long, #[cfg(not(osslconf = "OPENSSL_NO_SRP"))] srp_username: *mut c_char, } } } stack!(stack_st_SSL_CIPHER); #[repr(C)] pub struct SRTP_PROTECTION_PROFILE { pub name: *const c_char, pub id: c_ulong, } stack!(stack_st_SRTP_PROTECTION_PROFILE); pub type tls_session_ticket_ext_cb_fn = Option c_int>; pub type tls_session_secret_cb_fn = Option< unsafe extern "C" fn( *mut SSL, *mut c_void, *mut c_int, *mut stack_st_SSL_CIPHER, *mut *mut SSL_CIPHER, *mut c_void, ) -> c_int, >; #[cfg(ossl111)] pub type SSL_custom_ext_add_cb_ex = Option< unsafe extern "C" fn( ssl: *mut SSL, ext_type: c_uint, context: c_uint, out: *mut *const c_uchar, outlen: *mut size_t, x: *mut X509, chainidx: size_t, al: *mut c_int, add_arg: *mut c_void, ) -> c_int, >; #[cfg(ossl111)] pub type SSL_custom_ext_free_cb_ex = Option< unsafe extern "C" fn( ssl: *mut SSL, ext_type: c_uint, context: c_uint, out: *const c_uchar, add_arg: *mut c_void, ), >; #[cfg(ossl111)] pub type SSL_custom_ext_parse_cb_ex = Option< unsafe extern "C" fn( ssl: *mut SSL, ext_type: c_uint, context: c_uint, input: *const c_uchar, inlen: size_t, x: *mut X509, chainidx: size_t, al: *mut c_int, parse_arg: *mut c_void, ) -> c_int, >; cfg_if! { if #[cfg(ossl300)] { extern "C" { pub fn SSL_CTX_get_options(ctx: *const SSL_CTX) -> u64; pub fn SSL_CTX_set_options(ctx: *mut SSL_CTX, op: u64) -> u64; pub fn SSL_CTX_clear_options(ctx: *mut SSL_CTX, op: u64) -> u64; } } else if #[cfg(ossl110)] { extern "C" { pub fn SSL_CTX_get_options(ctx: *const SSL_CTX) -> c_ulong; pub fn SSL_CTX_set_options(ctx: *mut SSL_CTX, op: c_ulong) -> c_ulong; pub fn SSL_CTX_clear_options(ctx: *mut SSL_CTX, op: c_ulong) -> c_ulong; } } } pub type GEN_SESSION_CB = Option c_int>; extern "C" { pub fn SSL_CTX_sess_set_new_cb( ctx: *mut SSL_CTX, new_session_cb: Option c_int>, ); pub fn SSL_CTX_sess_set_remove_cb( ctx: *mut SSL_CTX, remove_session_cb: Option, ); } cfg_if! { // const change in passed function pointer signature if #[cfg(any(ossl110, libressl280))] { extern "C" { pub fn SSL_CTX_sess_set_get_cb( ctx: *mut SSL_CTX, get_session_cb: Option< unsafe extern "C" fn(*mut SSL, *const c_uchar, c_int, *mut c_int) -> *mut SSL_SESSION, >, ); } } else { extern "C" { pub fn SSL_CTX_sess_set_get_cb( ctx: *mut SSL_CTX, get_session_cb: Option< unsafe extern "C" fn(*mut SSL, *mut c_uchar, c_int, *mut c_int) -> *mut SSL_SESSION, >, ); } } } extern "C" { // FIXME change to unsafe extern "C" fn pub fn SSL_CTX_set_cookie_generate_cb( s: *mut SSL_CTX, cb: Option< extern "C" fn(ssl: *mut SSL, cookie: *mut c_uchar, cookie_len: *mut c_uint) -> c_int, >, ); } cfg_if! { // const change in passed function pointer signature if #[cfg(any(ossl110, libressl280))] { extern "C" { pub fn SSL_CTX_set_cookie_verify_cb( s: *mut SSL_CTX, cb: Option< extern "C" fn(ssl: *mut SSL, cookie: *const c_uchar, cookie_len: c_uint) -> c_int, >, ); } } else { extern "C" { pub fn SSL_CTX_set_cookie_verify_cb( s: *mut SSL_CTX, cb: Option c_int>, ); } } } extern "C" { #[cfg(ossl111)] pub fn SSL_CTX_set_stateless_cookie_generate_cb( s: *mut SSL_CTX, cb: Option< unsafe extern "C" fn( ssl: *mut SSL, cookie: *mut c_uchar, cookie_len: *mut size_t, ) -> c_int, >, ); #[cfg(ossl111)] pub fn SSL_CTX_set_stateless_cookie_verify_cb( s: *mut SSL_CTX, cb: Option< unsafe extern "C" fn( ssl: *mut SSL, cookie: *const c_uchar, cookie_len: size_t, ) -> c_int, >, ); pub fn SSL_CTX_set_next_protos_advertised_cb( ssl: *mut SSL_CTX, cb: extern "C" fn( ssl: *mut SSL, out: *mut *const c_uchar, outlen: *mut c_uint, arg: *mut c_void, ) -> c_int, arg: *mut c_void, ); pub fn SSL_CTX_set_next_proto_select_cb( ssl: *mut SSL_CTX, cb: extern "C" fn( ssl: *mut SSL, out: *mut *mut c_uchar, outlen: *mut c_uchar, inbuf: *const c_uchar, inlen: c_uint, arg: *mut c_void, ) -> c_int, arg: *mut c_void, ); pub fn SSL_get0_next_proto_negotiated( s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint, ); pub fn SSL_select_next_proto( out: *mut *mut c_uchar, outlen: *mut c_uchar, inbuf: *const c_uchar, inlen: c_uint, client: *const c_uchar, client_len: c_uint, ) -> c_int; } extern "C" { #[cfg(any(ossl102, libressl261))] pub fn SSL_CTX_set_alpn_protos(s: *mut SSL_CTX, data: *const c_uchar, len: c_uint) -> c_int; #[cfg(any(ossl102, libressl261))] pub fn SSL_set_alpn_protos(s: *mut SSL, data: *const c_uchar, len: c_uint) -> c_int; #[cfg(any(ossl102, libressl261))] #[link_name = "SSL_CTX_set_alpn_select_cb"] pub fn SSL_CTX_set_alpn_select_cb__fixed_rust( ssl: *mut SSL_CTX, cb: Option< unsafe extern "C" fn( ssl: *mut SSL, out: *mut *const c_uchar, outlen: *mut c_uchar, inbuf: *const c_uchar, inlen: c_uint, arg: *mut c_void, ) -> c_int, >, arg: *mut c_void, ); #[cfg(any(ossl102, libressl261))] pub fn SSL_get0_alpn_selected(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint); } #[cfg(not(osslconf = "OPENSSL_NO_PSK"))] extern "C" { pub fn SSL_CTX_set_psk_client_callback( ssl: *mut SSL_CTX, psk_client_cb: Option< extern "C" fn( *mut SSL, *const c_char, *mut c_char, c_uint, *mut c_uchar, c_uint, ) -> c_uint, >, ); pub fn SSL_CTX_set_psk_server_callback( ssl: *mut SSL_CTX, psk_server_cb: Option< extern "C" fn(*mut SSL, *const c_char, *mut c_uchar, c_uint) -> c_uint, >, ); pub fn SSL_get_psk_identity_hint(ssl: *const SSL) -> *const c_char; pub fn SSL_get_psk_identity(ssl: *const SSL) -> *const c_char; } extern "C" { #[cfg(ossl111)] pub fn SSL_CTX_add_custom_ext( ctx: *mut SSL_CTX, ext_type: c_uint, context: c_uint, add_cb: SSL_custom_ext_add_cb_ex, free_cb: SSL_custom_ext_free_cb_ex, add_arg: *mut c_void, parse_cb: SSL_custom_ext_parse_cb_ex, parse_arg: *mut c_void, ) -> c_int; #[cfg(ossl102)] pub fn SSL_extension_supported(ext_type: c_uint) -> c_int; } #[cfg(ossl111)] pub type SSL_CTX_keylog_cb_func = Option; extern "C" { #[cfg(ossl111)] pub fn SSL_CTX_set_keylog_callback(ctx: *mut SSL_CTX, cb: SSL_CTX_keylog_cb_func); #[cfg(any(ossl111, libressl340))] pub fn SSL_CTX_set_max_early_data(ctx: *mut SSL_CTX, max_early_data: u32) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_CTX_get_max_early_data(ctx: *const SSL_CTX) -> u32; #[cfg(any(ossl111, libressl340))] pub fn SSL_set_max_early_data(ctx: *mut SSL, max_early_data: u32) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_get_max_early_data(ctx: *const SSL) -> u32; pub fn SSL_get_finished(s: *const SSL, buf: *mut c_void, count: size_t) -> size_t; pub fn SSL_get_peer_finished(s: *const SSL, buf: *mut c_void, count: size_t) -> size_t; pub fn SSL_CTX_get_verify_mode(ctx: *const SSL_CTX) -> c_int; pub fn SSL_get_verify_mode(s: *const SSL) -> c_int; } const_ptr_api! { extern "C" { #[cfg(ossl110)] pub fn SSL_is_init_finished(s: #[const_ptr_if(ossl111)] SSL) -> c_int; } } cfg_if! { if #[cfg(libressl261)] { extern "C" { pub fn SSL_CTX_set_min_proto_version(ctx: *mut SSL_CTX, version: u16) -> c_int; pub fn SSL_CTX_set_max_proto_version(ctx: *mut SSL_CTX, version: u16) -> c_int; pub fn SSL_set_min_proto_version(s: *mut SSL, version: u16) -> c_int; pub fn SSL_set_max_proto_version(s: *mut SSL, version: u16) -> c_int; } } } cfg_if! { if #[cfg(libressl270)] { extern "C" { pub fn SSL_CTX_get_min_proto_version(ctx: *mut SSL_CTX) -> c_int; pub fn SSL_CTX_get_max_proto_version(ctx: *mut SSL_CTX) -> c_int; pub fn SSL_get_min_proto_version(s: *mut SSL) -> c_int; pub fn SSL_get_max_proto_version(s: *mut SSL) -> c_int; } } } extern "C" { pub fn SSL_CTX_set_cipher_list(ssl: *mut SSL_CTX, s: *const c_char) -> c_int; pub fn SSL_CTX_new(method: *const SSL_METHOD) -> *mut SSL_CTX; pub fn SSL_CTX_free(ctx: *mut SSL_CTX); #[cfg(any(ossl110, libressl273))] pub fn SSL_CTX_up_ref(x: *mut SSL_CTX) -> c_int; pub fn SSL_CTX_get_cert_store(ctx: *const SSL_CTX) -> *mut X509_STORE; pub fn SSL_CTX_set_cert_store(ctx: *mut SSL_CTX, store: *mut X509_STORE); pub fn SSL_get_current_cipher(ssl: *const SSL) -> *const SSL_CIPHER; pub fn SSL_CIPHER_get_bits(cipher: *const SSL_CIPHER, alg_bits: *mut c_int) -> c_int; } const_ptr_api! { extern "C" { pub fn SSL_CIPHER_get_version(cipher: *const SSL_CIPHER) -> #[const_ptr_if(any(ossl110, libressl280))] c_char; } } extern "C" { #[cfg(ossl111)] pub fn SSL_CIPHER_get_handshake_digest(cipher: *const SSL_CIPHER) -> *const EVP_MD; pub fn SSL_CIPHER_get_name(cipher: *const SSL_CIPHER) -> *const c_char; #[cfg(ossl111)] pub fn SSL_CIPHER_standard_name(cipher: *const SSL_CIPHER) -> *const c_char; #[cfg(ossl111)] pub fn OPENSSL_cipher_name(rfc_name: *const c_char) -> *const c_char; pub fn SSL_pending(ssl: *const SSL) -> c_int; pub fn SSL_set_bio(ssl: *mut SSL, rbio: *mut BIO, wbio: *mut BIO); pub fn SSL_get_rbio(ssl: *const SSL) -> *mut BIO; pub fn SSL_get_wbio(ssl: *const SSL) -> *mut BIO; #[cfg(any(ossl111, libressl340))] pub fn SSL_CTX_set_ciphersuites(ctx: *mut SSL_CTX, str: *const c_char) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_set_ciphersuites(ssl: *mut SSL, str: *const c_char) -> c_int; pub fn SSL_set_cipher_list(ssl: *mut SSL, s: *const c_char) -> c_int; pub fn SSL_set_ssl_method(s: *mut SSL, method: *const SSL_METHOD) -> c_int; pub fn SSL_set_verify( ssl: *mut SSL, mode: c_int, // FIXME should be unsafe verify_callback: Option c_int>, ); pub fn SSL_CTX_use_PrivateKey(ctx: *mut SSL_CTX, key: *mut EVP_PKEY) -> c_int; pub fn SSL_CTX_use_certificate(ctx: *mut SSL_CTX, cert: *mut X509) -> c_int; pub fn SSL_CTX_use_PrivateKey_file( ctx: *mut SSL_CTX, key_file: *const c_char, file_type: c_int, ) -> c_int; pub fn SSL_CTX_use_certificate_file( ctx: *mut SSL_CTX, cert_file: *const c_char, file_type: c_int, ) -> c_int; pub fn SSL_CTX_use_certificate_chain_file( ctx: *mut SSL_CTX, cert_chain_file: *const c_char, ) -> c_int; pub fn SSL_use_PrivateKey_file(ssl: *mut SSL, file: *const c_char, type_: c_int) -> c_int; pub fn SSL_use_PrivateKey(ssl: *mut SSL, pkey: *mut EVP_PKEY) -> c_int; pub fn SSL_use_certificate(ssl: *mut SSL, x: *mut X509) -> c_int; #[cfg(any(ossl110, libressl332))] pub fn SSL_use_certificate_chain_file(ssl: *mut SSL, file: *const c_char) -> c_int; pub fn SSL_set_client_CA_list(s: *mut SSL, name_list: *mut stack_st_X509_NAME); pub fn SSL_add_client_CA(ssl: *mut SSL, x: *mut X509) -> c_int; pub fn SSL_load_client_CA_file(file: *const c_char) -> *mut stack_st_X509_NAME; #[cfg(not(ossl110))] pub fn SSL_load_error_strings(); pub fn SSL_state_string(ssl: *const SSL) -> *const c_char; pub fn SSL_state_string_long(ssl: *const SSL) -> *const c_char; pub fn SSL_SESSION_get_time(s: *const SSL_SESSION) -> c_long; pub fn SSL_SESSION_get_timeout(s: *const SSL_SESSION) -> c_long; #[cfg(any(ossl110, libressl270))] pub fn SSL_SESSION_get_protocol_version(s: *const SSL_SESSION) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_SESSION_set_max_early_data(ctx: *mut SSL_SESSION, max_early_data: u32) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_SESSION_get_max_early_data(ctx: *const SSL_SESSION) -> u32; pub fn SSL_SESSION_get_id(s: *const SSL_SESSION, len: *mut c_uint) -> *const c_uchar; #[cfg(any(ossl110, libressl273))] pub fn SSL_SESSION_up_ref(ses: *mut SSL_SESSION) -> c_int; pub fn SSL_SESSION_free(s: *mut SSL_SESSION); } const_ptr_api! { extern "C" { pub fn i2d_SSL_SESSION(s: #[const_ptr_if(ossl300)] SSL_SESSION, pp: *mut *mut c_uchar) -> c_int; } } extern "C" { pub fn SSL_set_session(ssl: *mut SSL, session: *mut SSL_SESSION) -> c_int; pub fn SSL_CTX_add_session(ctx: *mut SSL_CTX, session: *mut SSL_SESSION) -> c_int; pub fn SSL_CTX_remove_session(ctx: *mut SSL_CTX, session: *mut SSL_SESSION) -> c_int; pub fn d2i_SSL_SESSION( a: *mut *mut SSL_SESSION, pp: *mut *const c_uchar, len: c_long, ) -> *mut SSL_SESSION; #[cfg(not(ossl300))] pub fn SSL_get_peer_certificate(ssl: *const SSL) -> *mut X509; #[cfg(ossl300)] pub fn SSL_get1_peer_certificate(ssl: *const SSL) -> *mut X509; pub fn SSL_get_peer_cert_chain(ssl: *const SSL) -> *mut stack_st_X509; pub fn SSL_CTX_set_verify( ctx: *mut SSL_CTX, mode: c_int, verify_callback: Option c_int>, ); pub fn SSL_CTX_set_verify_depth(ctx: *mut SSL_CTX, depth: c_int); #[cfg(any(ossl111, libressl340))] pub fn SSL_CTX_set_post_handshake_auth(ctx: *mut SSL_CTX, val: c_int); pub fn SSL_CTX_check_private_key(ctx: *const SSL_CTX) -> c_int; pub fn SSL_CTX_set_session_id_context( ssl: *mut SSL_CTX, sid_ctx: *const c_uchar, sid_ctx_len: c_uint, ) -> c_int; pub fn SSL_new(ctx: *mut SSL_CTX) -> *mut SSL; #[cfg(any(ossl102, libressl261))] pub fn SSL_CTX_get0_param(ctx: *mut SSL_CTX) -> *mut X509_VERIFY_PARAM; #[cfg(any(ossl102, libressl261))] pub fn SSL_get0_param(ssl: *mut SSL) -> *mut X509_VERIFY_PARAM; } #[cfg(ossl111)] pub type SSL_client_hello_cb_fn = Option c_int>; extern "C" { #[cfg(ossl111)] pub fn SSL_CTX_set_client_hello_cb( c: *mut SSL_CTX, cb: SSL_client_hello_cb_fn, arg: *mut c_void, ); #[cfg(ossl111)] pub fn SSL_client_hello_isv2(s: *mut SSL) -> c_int; #[cfg(ossl111)] pub fn SSL_client_hello_get0_legacy_version(s: *mut SSL) -> c_uint; #[cfg(ossl111)] pub fn SSL_client_hello_get0_random(s: *mut SSL, out: *mut *const c_uchar) -> size_t; #[cfg(ossl111)] pub fn SSL_client_hello_get0_session_id(s: *mut SSL, out: *mut *const c_uchar) -> size_t; #[cfg(ossl111)] pub fn SSL_client_hello_get0_ciphers(s: *mut SSL, out: *mut *const c_uchar) -> size_t; #[cfg(ossl111)] pub fn SSL_client_hello_get0_compression_methods( s: *mut SSL, out: *mut *const c_uchar, ) -> size_t; #[cfg(ossl111)] pub fn SSL_client_hello_get1_extensions_present( s: *mut SSL, out: *mut *mut c_int, outlen: *mut size_t, ) -> c_int; #[cfg(ossl111)] pub fn SSL_client_hello_get0_ext( s: *mut SSL, type_: c_uint, out: *mut *const c_uchar, outlen: *mut size_t, ) -> c_int; pub fn SSL_free(ssl: *mut SSL); pub fn SSL_accept(ssl: *mut SSL) -> c_int; #[cfg(ossl111)] pub fn SSL_stateless(s: *mut SSL) -> c_int; pub fn SSL_connect(ssl: *mut SSL) -> c_int; pub fn SSL_read(ssl: *mut SSL, buf: *mut c_void, num: c_int) -> c_int; pub fn SSL_peek(ssl: *mut SSL, buf: *mut c_void, num: c_int) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_read_early_data( s: *mut SSL, buf: *mut c_void, num: size_t, readbytes: *mut size_t, ) -> c_int; #[cfg(ossl111)] pub fn SSL_bytes_to_cipher_list( s: *mut SSL, bytes: *const c_uchar, len: size_t, isv2format: c_int, sk: *mut *mut stack_st_SSL_CIPHER, scsvs: *mut *mut stack_st_SSL_CIPHER, ) -> c_int; } extern "C" { pub fn SSL_write(ssl: *mut SSL, buf: *const c_void, num: c_int) -> c_int; #[cfg(any(ossl111, libressl340))] pub fn SSL_write_early_data( s: *mut SSL, buf: *const c_void, num: size_t, written: *mut size_t, ) -> c_int; pub fn SSL_ctrl(ssl: *mut SSL, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long; pub fn SSL_CTX_ctrl(ctx: *mut SSL_CTX, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long; #[link_name = "SSL_CTX_callback_ctrl"] pub fn SSL_CTX_callback_ctrl__fixed_rust( ctx: *mut SSL_CTX, cmd: c_int, fp: Option, ) -> c_long; } cfg_if! { if #[cfg(any(ossl110, libressl291))] { extern "C" { pub fn TLS_method() -> *const SSL_METHOD; pub fn DTLS_method() -> *const SSL_METHOD; pub fn TLS_server_method() -> *const SSL_METHOD; pub fn TLS_client_method() -> *const SSL_METHOD; } } else { extern "C" { #[cfg(not(osslconf = "OPENSSL_NO_SSL3_METHOD"))] pub fn SSLv3_method() -> *const SSL_METHOD; pub fn SSLv23_method() -> *const SSL_METHOD; pub fn SSLv23_client_method() -> *const SSL_METHOD; pub fn SSLv23_server_method() -> *const SSL_METHOD; pub fn TLSv1_method() -> *const SSL_METHOD; pub fn TLSv1_1_method() -> *const SSL_METHOD; pub fn TLSv1_2_method() -> *const SSL_METHOD; pub fn DTLSv1_method() -> *const SSL_METHOD; #[cfg(ossl102)] pub fn DTLSv1_2_method() -> *const SSL_METHOD; } } } extern "C" { pub fn SSL_get_error(ssl: *const SSL, ret: c_int) -> c_int; pub fn SSL_get_version(ssl: *const SSL) -> *const c_char; pub fn SSL_do_handshake(ssl: *mut SSL) -> c_int; pub fn SSL_shutdown(ssl: *mut SSL) -> c_int; pub fn SSL_CTX_set_client_CA_list(ctx: *mut SSL_CTX, list: *mut stack_st_X509_NAME); pub fn SSL_CTX_add_client_CA(ctx: *mut SSL_CTX, cacert: *mut X509) -> c_int; pub fn SSL_CTX_set_default_verify_paths(ctx: *mut SSL_CTX) -> c_int; pub fn SSL_CTX_load_verify_locations( ctx: *mut SSL_CTX, CAfile: *const c_char, CApath: *const c_char, ) -> c_int; } const_ptr_api! { extern "C" { pub fn SSL_get_ssl_method(ssl: #[const_ptr_if(ossl111b)] SSL) -> *const SSL_METHOD; } } extern "C" { pub fn SSL_set_connect_state(s: *mut SSL); pub fn SSL_set_accept_state(s: *mut SSL); #[cfg(not(ossl110))] pub fn SSL_library_init() -> c_int; pub fn SSL_CIPHER_description( cipher: *const SSL_CIPHER, buf: *mut c_char, size: c_int, ) -> *mut c_char; pub fn SSL_get_certificate(ssl: *const SSL) -> *mut X509; } const_ptr_api! { extern "C" { pub fn SSL_get_privatekey(ssl: #[const_ptr_if(any(ossl102, libressl280))] SSL) -> *mut EVP_PKEY; } } extern "C" { #[cfg(any(ossl102, libressl270))] pub fn SSL_CTX_get0_certificate(ctx: *const SSL_CTX) -> *mut X509; #[cfg(any(ossl102, libressl340))] pub fn SSL_CTX_get0_privatekey(ctx: *const SSL_CTX) -> *mut EVP_PKEY; pub fn SSL_set_shutdown(ss: *mut SSL, mode: c_int); pub fn SSL_get_shutdown(ssl: *const SSL) -> c_int; pub fn SSL_version(ssl: *const SSL) -> c_int; pub fn SSL_get_session(s: *const SSL) -> *mut SSL_SESSION; pub fn SSL_get_SSL_CTX(ssl: *const SSL) -> *mut SSL_CTX; pub fn SSL_set_SSL_CTX(ssl: *mut SSL, ctx: *mut SSL_CTX) -> *mut SSL_CTX; pub fn SSL_get_verify_result(ssl: *const SSL) -> c_long; #[cfg(ossl110)] pub fn SSL_get0_verified_chain(ssl: *const SSL) -> *mut stack_st_X509; #[cfg(any(ossl110, libressl270))] pub fn SSL_get_client_random(ssl: *const SSL, out: *mut c_uchar, len: size_t) -> size_t; #[cfg(any(ossl110, libressl270))] pub fn SSL_get_server_random(ssl: *const SSL, out: *mut c_uchar, len: size_t) -> size_t; #[cfg(any(ossl110, libressl273))] pub fn SSL_SESSION_get_master_key( session: *const SSL_SESSION, out: *mut c_uchar, outlen: size_t, ) -> size_t; } extern "C" { #[cfg(not(ossl110))] pub fn SSL_get_ex_new_index( argl: c_long, argp: *mut c_void, new_func: Option, dup_func: Option, free_func: Option, ) -> c_int; pub fn SSL_set_ex_data(ssl: *mut SSL, idx: c_int, data: *mut c_void) -> c_int; pub fn SSL_get_ex_data(ssl: *const SSL, idx: c_int) -> *mut c_void; #[cfg(not(ossl110))] pub fn SSL_CTX_get_ex_new_index( argl: c_long, argp: *mut c_void, new_func: Option, dup_func: Option, free_func: Option, ) -> c_int; pub fn SSL_CTX_set_ex_data(ctx: *mut SSL_CTX, idx: c_int, data: *mut c_void) -> c_int; pub fn SSL_CTX_get_ex_data(ctx: *const SSL_CTX, idx: c_int) -> *mut c_void; pub fn SSL_get_ex_data_X509_STORE_CTX_idx() -> c_int; } extern "C" { #[link_name = "SSL_CTX_set_tmp_dh_callback"] pub fn SSL_CTX_set_tmp_dh_callback__fixed_rust( ctx: *mut SSL_CTX, dh: Option< unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH, >, ); #[link_name = "SSL_set_tmp_dh_callback"] pub fn SSL_set_tmp_dh_callback__fixed_rust( ctx: *mut SSL, dh: Option< unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH, >, ); #[cfg(not(ossl110))] #[link_name = "SSL_CTX_set_tmp_ecdh_callback"] pub fn SSL_CTX_set_tmp_ecdh_callback__fixed_rust( ctx: *mut SSL_CTX, ecdh: Option< unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut EC_KEY, >, ); #[cfg(not(ossl110))] #[link_name = "SSL_set_tmp_ecdh_callback"] pub fn SSL_set_tmp_ecdh_callback__fixed_rust( ssl: *mut SSL, ecdh: Option< unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut EC_KEY, >, ); } cfg_if! { if #[cfg(libressl)] { extern "C" { pub fn SSL_get_current_compression(ssl: *mut SSL) -> *const libc::c_void; } } else if #[cfg(not(osslconf = "OPENSSL_NO_COMP"))] { const_ptr_api! { extern "C" { pub fn SSL_get_current_compression(ssl: #[const_ptr_if(ossl111b)] SSL) -> *const COMP_METHOD; } } } } cfg_if! { if #[cfg(libressl)] { extern "C" { pub fn SSL_COMP_get_name(comp: *const libc::c_void) -> *const c_char; } } else if #[cfg(not(osslconf = "OPENSSL_NO_COMP"))] { extern "C" { pub fn SSL_COMP_get_name(comp: *const COMP_METHOD) -> *const c_char; } } } #[cfg(not(osslconf = "OPENSSL_NO_COMP"))] extern "C" { #[cfg(ossl110)] pub fn COMP_get_type(meth: *const COMP_METHOD) -> i32; } extern "C" { #[cfg(any(ossl110, libressl270))] pub fn SSL_CIPHER_get_cipher_nid(c: *const SSL_CIPHER) -> c_int; #[cfg(any(ossl110, libressl270))] pub fn SSL_CIPHER_get_digest_nid(c: *const SSL_CIPHER) -> c_int; } const_ptr_api! { extern "C" { #[cfg(ossl110)] pub fn SSL_session_reused(ssl: #[const_ptr_if(ossl111c)] SSL) -> c_int; } } const_ptr_api! { extern "C" { #[cfg(any(ossl102, libressl273))] pub fn SSL_is_server(s: #[const_ptr_if(any(ossl110f, libressl273))] SSL) -> c_int; } } extern "C" { #[cfg(ossl110)] pub fn OPENSSL_init_ssl(opts: u64, settings: *const OPENSSL_INIT_SETTINGS) -> c_int; } extern "C" { #[cfg(ossl111)] pub fn SSL_CTX_set_num_tickets(ctx: *mut SSL_CTX, num_tickets: size_t) -> c_int; #[cfg(ossl111)] pub fn SSL_set_num_tickets(s: *mut SSL, num_tickets: size_t) -> c_int; #[cfg(ossl111b)] pub fn SSL_CTX_get_num_tickets(ctx: *const SSL_CTX) -> size_t; #[cfg(all(ossl111, not(ossl111b)))] pub fn SSL_CTX_get_num_tickets(ctx: *mut SSL_CTX) -> size_t; #[cfg(ossl111b)] pub fn SSL_get_num_tickets(s: *const SSL) -> size_t; #[cfg(all(ossl111, not(ossl111b)))] pub fn SSL_get_num_tickets(s: *mut SSL) -> size_t; }