diff options
Diffstat (limited to 'vendor/security-framework-sys/src/secure_transport.rs')
| -rw-r--r-- | vendor/security-framework-sys/src/secure_transport.rs | 278 |
1 files changed, 0 insertions, 278 deletions
diff --git a/vendor/security-framework-sys/src/secure_transport.rs b/vendor/security-framework-sys/src/secure_transport.rs deleted file mode 100644 index 19f3300b..00000000 --- a/vendor/security-framework-sys/src/secure_transport.rs +++ /dev/null @@ -1,278 +0,0 @@ -use core_foundation_sys::array::CFArrayRef; -use core_foundation_sys::base::CFAllocatorRef; -#[cfg(target_os = "macos")] -use core_foundation_sys::base::CFTypeRef; -use core_foundation_sys::base::{Boolean, OSStatus}; -use std::os::raw::{c_char, c_int, c_void}; - -use crate::cipher_suite::SSLCipherSuite; -use crate::trust::SecTrustRef; - -pub enum SSLContext {} -pub type SSLContextRef = *mut SSLContext; - -pub type SSLConnectionRef = *const c_void; - -pub type SSLProtocol = c_int; -pub const kSSLProtocolUnknown: SSLProtocol = 0; -pub const kSSLProtocol3: SSLProtocol = 2; -pub const kTLSProtocol1: SSLProtocol = 4; -pub const kTLSProtocol11: SSLProtocol = 7; -pub const kTLSProtocol12: SSLProtocol = 8; -pub const kDTLSProtocol1: SSLProtocol = 9; -pub const kTLSProtocol13: SSLProtocol = 10; -pub const kSSLProtocol2: SSLProtocol = 1; -pub const kSSLProtocol3Only: SSLProtocol = 3; -pub const kTLSProtocol1Only: SSLProtocol = 5; -pub const kSSLProtocolAll: SSLProtocol = 6; - -pub type SSLSessionOption = c_int; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionBreakOnServerAuth: SSLSessionOption = 0; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionBreakOnCertRequested: SSLSessionOption = 1; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionBreakOnClientAuth: SSLSessionOption = 2; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionFalseStart: SSLSessionOption = 3; -pub const kSSLSessionOptionSendOneByteRecord: SSLSessionOption = 4; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionAllowServerIdentityChange: SSLSessionOption = 5; -#[cfg(target_os = "macos")] -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionFallback: SSLSessionOption = 6; -#[deprecated(note = "deprecated by Apple")] -pub const kSSLSessionOptionBreakOnClientHello: SSLSessionOption = 7; - -pub type SSLSessionState = c_int; -pub const kSSLIdle: SSLSessionState = 0; -pub const kSSLHandshake: SSLSessionState = 1; -pub const kSSLConnected: SSLSessionState = 2; -pub const kSSLClosed: SSLSessionState = 3; -pub const kSSLAborted: SSLSessionState = 4; - -pub type SSLReadFunc = unsafe extern "C" fn( - connection: SSLConnectionRef, - data: *mut c_void, - dataLength: *mut usize, -) -> OSStatus; - -pub type SSLWriteFunc = unsafe extern "C" fn( - connection: SSLConnectionRef, - data: *const c_void, - dataLength: *mut usize, -) -> OSStatus; - -pub type SSLProtocolSide = c_int; -pub const kSSLServerSide: SSLProtocolSide = 0; -pub const kSSLClientSide: SSLProtocolSide = 1; - -pub type SSLConnectionType = c_int; -pub const kSSLStreamType: SSLConnectionType = 0; -pub const kSSLDatagramType: SSLConnectionType = 1; - -pub const errSSLProtocol: OSStatus = -9800; -pub const errSSLNegotiation: OSStatus = -9801; -pub const errSSLFatalAlert: OSStatus = -9802; -pub const errSSLWouldBlock: OSStatus = -9803; -pub const errSSLSessionNotFound: OSStatus = -9804; -pub const errSSLClosedGraceful: OSStatus = -9805; -pub const errSSLClosedAbort: OSStatus = -9806; -pub const errSSLXCertChainInvalid: OSStatus = -9807; -pub const errSSLBadCert: OSStatus = -9808; -pub const errSSLCrypto: OSStatus = -9809; -pub const errSSLInternal: OSStatus = -9810; -pub const errSSLModuleAttach: OSStatus = -9811; -pub const errSSLUnknownRootCert: OSStatus = -9812; -pub const errSSLNoRootCert: OSStatus = -9813; -pub const errSSLCertExpired: OSStatus = -9814; -pub const errSSLCertNotYetValid: OSStatus = -9815; -pub const errSSLClosedNoNotify: OSStatus = -9816; -pub const errSSLBufferOverflow: OSStatus = -9817; -pub const errSSLBadCipherSuite: OSStatus = -9818; -pub const errSSLPeerUnexpectedMsg: OSStatus = -9819; -pub const errSSLPeerBadRecordMac: OSStatus = -9820; -pub const errSSLPeerDecryptionFail: OSStatus = -9821; -pub const errSSLPeerRecordOverflow: OSStatus = -9822; -pub const errSSLPeerDecompressFail: OSStatus = -9823; -pub const errSSLPeerHandshakeFail: OSStatus = -9824; -pub const errSSLPeerBadCert: OSStatus = -9825; -pub const errSSLPeerUnsupportedCert: OSStatus = -9826; -pub const errSSLPeerCertRevoked: OSStatus = -9827; -pub const errSSLPeerCertExpired: OSStatus = -9828; -pub const errSSLPeerCertUnknown: OSStatus = -9829; -pub const errSSLIllegalParam: OSStatus = -9830; -pub const errSSLPeerUnknownCA: OSStatus = -9831; -pub const errSSLPeerAccessDenied: OSStatus = -9832; -pub const errSSLPeerDecodeError: OSStatus = -9833; -pub const errSSLPeerDecryptError: OSStatus = -9834; -pub const errSSLPeerExportRestriction: OSStatus = -9835; -pub const errSSLPeerProtocolVersion: OSStatus = -9836; -pub const errSSLPeerInsufficientSecurity: OSStatus = -9837; -pub const errSSLPeerInternalError: OSStatus = -9838; -pub const errSSLPeerUserCancelled: OSStatus = -9839; -pub const errSSLPeerNoRenegotiation: OSStatus = -9840; -pub const errSSLPeerAuthCompleted: OSStatus = -9841; -pub const errSSLClientCertRequested: OSStatus = -9842; -pub const errSSLHostNameMismatch: OSStatus = -9843; -pub const errSSLConnectionRefused: OSStatus = -9844; -pub const errSSLDecryptionFail: OSStatus = -9845; -pub const errSSLBadRecordMac: OSStatus = -9846; -pub const errSSLRecordOverflow: OSStatus = -9847; -pub const errSSLBadConfiguration: OSStatus = -9848; -pub const errSSLClientHelloReceived: OSStatus = -9851; - -pub type SSLAuthenticate = c_int; -pub const kNeverAuthenticate: SSLAuthenticate = 0; -pub const kAlwaysAuthenticate: SSLAuthenticate = 1; -pub const kTryAuthenticate: SSLAuthenticate = 2; - -pub type SSLClientCertificateState = c_int; -pub const kSSLClientCertNone: SSLClientCertificateState = 0; -pub const kSSLClientCertRequested: SSLClientCertificateState = 1; -pub const kSSLClientCertSent: SSLClientCertificateState = 2; -pub const kSSLClientCertRejected: SSLClientCertificateState = 3; - -extern "C" { - pub fn SSLContextGetTypeID() -> ::core_foundation_sys::base::CFTypeID; - pub fn SSLCreateContext( - alloc: CFAllocatorRef, - protocolSide: SSLProtocolSide, - connectionType: SSLConnectionType, - ) -> SSLContextRef; - #[cfg(target_os = "macos")] - pub fn SSLNewContext(isServer: Boolean, contextPtr: *mut SSLContextRef) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLDisposeContext(context: SSLContextRef) -> OSStatus; - pub fn SSLSetConnection(context: SSLContextRef, connection: SSLConnectionRef) -> OSStatus; - pub fn SSLGetConnection(context: SSLContextRef, connection: *mut SSLConnectionRef) -> OSStatus; - pub fn SSLSetIOFuncs( - context: SSLContextRef, - read: SSLReadFunc, - write: SSLWriteFunc, - ) -> OSStatus; - pub fn SSLHandshake(context: SSLContextRef) -> OSStatus; - pub fn SSLClose(context: SSLContextRef) -> OSStatus; - pub fn SSLRead( - context: SSLContextRef, - data: *mut c_void, - dataLen: usize, - processed: *mut usize, - ) -> OSStatus; - pub fn SSLWrite( - context: SSLContextRef, - data: *const c_void, - dataLen: usize, - processed: *mut usize, - ) -> OSStatus; - pub fn SSLSetPeerDomainName( - context: SSLContextRef, - peerName: *const c_char, - peerNameLen: usize, - ) -> OSStatus; - pub fn SSLGetPeerDomainNameLength(context: SSLContextRef, peerNameLen: *mut usize) -> OSStatus; - pub fn SSLGetPeerDomainName( - context: SSLContextRef, - peerName: *mut c_char, - peerNameLen: *mut usize, - ) -> OSStatus; - pub fn SSLSetCertificate(context: SSLContextRef, certRefs: CFArrayRef) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLSetCertificateAuthorities( - context: SSLContextRef, - certificateOrArray: CFTypeRef, - replaceExisting: Boolean, - ) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLCopyCertificateAuthorities( - context: SSLContextRef, - certificates: *mut CFArrayRef, - ) -> OSStatus; - pub fn SSLSetSessionOption( - context: SSLContextRef, - option: SSLSessionOption, - value: Boolean, - ) -> OSStatus; - pub fn SSLGetSessionOption( - context: SSLContextRef, - option: SSLSessionOption, - value: *mut Boolean, - ) -> OSStatus; - pub fn SSLCopyPeerTrust(context: SSLContextRef, trust: *mut SecTrustRef) -> OSStatus; - pub fn SSLGetSessionState(context: SSLContextRef, state: *mut SSLSessionState) -> OSStatus; - pub fn SSLGetSupportedCiphers( - context: SSLContextRef, - ciphers: *mut SSLCipherSuite, - numCiphers: *mut usize, - ) -> OSStatus; - pub fn SSLGetNumberSupportedCiphers( - context: SSLContextRef, - numCiphers: *mut usize, - ) -> OSStatus; - pub fn SSLGetEnabledCiphers( - context: SSLContextRef, - ciphers: *mut SSLCipherSuite, - numCiphers: *mut usize, - ) -> OSStatus; - pub fn SSLGetNumberEnabledCiphers(context: SSLContextRef, numCiphers: *mut usize) -> OSStatus; - pub fn SSLSetEnabledCiphers( - context: SSLContextRef, - ciphers: *const SSLCipherSuite, - numCiphers: usize, - ) -> OSStatus; - pub fn SSLGetNegotiatedCipher(context: SSLContextRef, cipher: *mut SSLCipherSuite) -> OSStatus; - pub fn SSLSetClientSideAuthenticate(context: SSLContextRef, auth: SSLAuthenticate) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLSetDiffieHellmanParams( - context: SSLContextRef, - dhParams: *const c_void, - dhParamsLen: usize, - ) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLGetDiffieHellmanParams( - context: SSLContextRef, - dhParams: *mut *const c_void, - dhParamsLen: *mut usize, - ) -> OSStatus; - pub fn SSLSetPeerID( - context: SSLContextRef, - peerID: *const c_void, - peerIDLen: usize, - ) -> OSStatus; - pub fn SSLGetPeerID( - context: SSLContextRef, - peerID: *mut *const c_void, - peerIDLen: *mut usize, - ) -> OSStatus; - pub fn SSLGetBufferedReadSize(context: SSLContextRef, bufSize: *mut usize) -> OSStatus; - pub fn SSLGetClientCertificateState( - context: SSLContextRef, - clientState: *mut SSLClientCertificateState, - ) -> OSStatus; - pub fn SSLGetNegotiatedProtocolVersion( - context: SSLContextRef, - protocol: *mut SSLProtocol, - ) -> OSStatus; - pub fn SSLGetProtocolVersionMax( - context: SSLContextRef, - maxVersion: *mut SSLProtocol, - ) -> OSStatus; - pub fn SSLGetProtocolVersionMin( - context: SSLContextRef, - minVersion: *mut SSLProtocol, - ) -> OSStatus; - pub fn SSLSetProtocolVersionMax(context: SSLContextRef, maxVersion: SSLProtocol) -> OSStatus; - pub fn SSLSetProtocolVersionMin(context: SSLContextRef, minVersion: SSLProtocol) -> OSStatus; - #[cfg(target_os = "macos")] - pub fn SSLSetProtocolVersionEnabled( - context: SSLContextRef, - protocol: SSLProtocol, - enable: Boolean, - ) -> OSStatus; - #[cfg(feature = "OSX_10_13")] - pub fn SSLSetALPNProtocols(context: SSLContextRef, protocols: CFArrayRef) -> OSStatus; - #[cfg(feature = "OSX_10_13")] - pub fn SSLCopyALPNProtocols(context: SSLContextRef, protocols: *mut CFArrayRef) -> OSStatus; - #[cfg(feature = "OSX_10_13")] - pub fn SSLSetSessionTicketsEnabled(context: SSLContextRef, enabled: Boolean) -> OSStatus; -} |
