From d7a4c3770a25e06ebabba1be361da06d766e99c3 Mon Sep 17 00:00:00 2001
From: peizhe <472708703@qq.com>
Date: Mon, 17 Apr 2023 09:23:47 +0800
Subject: [PATCH] upgrade openssl version to 0.10.47
Signed-off-by: peizhe <472708703@qq.com>
---
Cargo.toml | 8 +-
OAT.xml | 65 +
README.md | 174 +-
appveyor.yml | 50 -
openssl-errors/CHANGELOG.md | 20 +
openssl-errors/Cargo.toml | 19 +
openssl-errors/LICENSE-APACHE | 202 ++
openssl-errors/LICENSE-MIT | 19 +
openssl-errors/README.md | 1 +
openssl-errors/build.rs | 13 +
openssl-errors/src/lib.rs | 388 +++
openssl-errors/tests/test.rs | 95 +
openssl-macros/Cargo.toml | 14 +
openssl-macros/LICENSE-APACHE | 202 ++
openssl-macros/LICENSE-MIT | 19 +
openssl-macros/src/lib.rs | 32 +
openssl-sys/CHANGELOG.md | 442 +++
openssl-sys/Cargo.toml | 23 +-
openssl-sys/README.md | 0
openssl-sys/build.rs | 543 ----
openssl-sys/build/cfgs.rs | 94 +
openssl-sys/build/expando.c | 124 +
openssl-sys/build/find_normal.rs | 275 ++
openssl-sys/build/find_vendored.rs | 16 +
openssl-sys/build/main.rs | 426 +++
openssl-sys/build/run_bindgen.rs | 236 ++
openssl-sys/src/aes.rs | 7 +
openssl-sys/src/asn1.rs | 39 +
openssl-sys/src/bio.rs | 72 +
openssl-sys/src/bn.rs | 15 +
openssl-sys/src/cms.rs | 46 +
openssl-sys/src/crypto.rs | 134 +
openssl-sys/src/dtls1.rs | 9 +
openssl-sys/src/ec.rs | 16 +
openssl-sys/src/err.rs | 70 +
openssl-sys/src/evp.rs | 285 ++
openssl-sys/src/handwritten/aes.rs | 40 +
openssl-sys/src/handwritten/asn1.rs | 60 +
openssl-sys/src/handwritten/bio.rs | 107 +
openssl-sys/src/handwritten/bn.rs | 168 +
openssl-sys/src/handwritten/cms.rs | 65 +
openssl-sys/src/handwritten/conf.rs | 7 +
openssl-sys/src/handwritten/crypto.rs | 85 +
openssl-sys/src/handwritten/dh.rs | 50 +
openssl-sys/src/handwritten/dsa.rs | 85 +
openssl-sys/src/handwritten/ec.rs | 255 ++
openssl-sys/src/handwritten/err.rs | 55 +
openssl-sys/src/handwritten/evp.rs | 600 ++++
openssl-sys/src/handwritten/hmac.rs | 30 +
openssl-sys/src/handwritten/kdf.rs | 26 +
openssl-sys/src/handwritten/mod.rs | 65 +
openssl-sys/src/handwritten/object.rs | 30 +
openssl-sys/src/handwritten/ocsp.rs | 89 +
openssl-sys/src/handwritten/pem.rs | 191 ++
openssl-sys/src/handwritten/pkcs12.rs | 53 +
openssl-sys/src/handwritten/pkcs7.rs | 70 +
openssl-sys/src/handwritten/provider.rs | 20 +
openssl-sys/src/handwritten/rand.rs | 12 +
openssl-sys/src/handwritten/rsa.rs | 124 +
openssl-sys/src/handwritten/safestack.rs | 1 +
openssl-sys/src/handwritten/sha.rs | 101 +
openssl-sys/src/handwritten/srtp.rs | 10 +
openssl-sys/src/handwritten/ssl.rs | 913 ++++++
openssl-sys/src/handwritten/stack.rs | 45 +
openssl-sys/src/handwritten/tls1.rs | 28 +
openssl-sys/src/handwritten/types.rs | 1078 +++++++
openssl-sys/src/handwritten/x509.rs | 666 ++++
openssl-sys/src/handwritten/x509_vfy.rs | 132 +
openssl-sys/src/handwritten/x509v3.rs | 104 +
openssl-sys/src/lib.rs | 2879 ++---------------
openssl-sys/src/libressl/mod.rs | 600 ----
openssl-sys/src/libressl/v250.rs | 221 --
openssl-sys/src/libressl/v25x.rs | 89 -
openssl-sys/src/macros.rs | 298 ++
openssl-sys/src/obj_mac.rs | 982 ++++++
openssl-sys/src/ocsp.rs | 35 +
openssl-sys/src/ossl10x.rs | 985 ------
openssl-sys/src/ossl110.rs | 291 --
openssl-sys/src/pem.rs | 3 +
openssl-sys/src/pkcs7.rs | 20 +
openssl-sys/src/rsa.rs | 101 +
openssl-sys/src/sha.rs | 103 +
openssl-sys/src/srtp.rs | 14 +
openssl-sys/src/ssl.rs | 631 ++++
openssl-sys/src/ssl3.rs | 5 +
openssl-sys/src/tls1.rs | 94 +
openssl-sys/src/types.rs | 21 +
openssl-sys/src/x509.rs | 15 +
openssl-sys/src/x509_vfy.rs | 149 +
openssl-sys/src/x509v3.rs | 93 +
openssl/CHANGELOG.md | 749 +++++
openssl/Cargo.toml | 29 +-
openssl/README.md | 0
openssl/build.rs | 110 +-
openssl/examples/mk_certs.rs | 90 +-
openssl/src/aes.rs | 223 +-
openssl/src/asn1.rs | 596 +++-
openssl/src/base64.rs | 128 +
openssl/src/bio.rs | 31 +-
openssl/src/bn.rs | 625 ++--
openssl/src/cipher.rs | 484 +++
openssl/src/cipher_ctx.rs | 841 +++++
openssl/src/cms.rs | 449 ++-
openssl/src/conf.rs | 93 +-
openssl/src/crypto.rs | 6 -
openssl/src/derive.rs | 182 ++
openssl/src/dh.rs | 432 ++-
openssl/src/dsa.rs | 650 +++-
openssl/src/ec.rs | 1119 ++++---
openssl/src/ec_key.rs | 4 -
openssl/src/ecdsa.rs | 224 ++
openssl/src/encrypt.rs | 578 ++++
openssl/src/envelope.rs | 181 ++
openssl/src/error.rs | 256 +-
openssl/src/ex_data.rs | 6 +
openssl/src/fips.rs | 21 +
openssl/src/hash.rs | 591 +++-
openssl/src/lib.rs | 191 +-
openssl/src/lib_ctx.rs | 22 +
openssl/src/macros.rs | 330 +-
openssl/src/md.rs | 235 ++
openssl/src/md_ctx.rs | 540 ++++
openssl/src/memcmp.rs | 7 +-
openssl/src/nid.rs | 2076 ++++++------
openssl/src/ocsp.rs | 188 +-
openssl/src/pkcs12.rs | 322 +-
openssl/src/pkcs5.rs | 414 +--
openssl/src/pkcs7.rs | 446 +++
openssl/src/pkey.rs | 1018 +++++-
openssl/src/pkey_ctx.rs | 804 +++++
openssl/src/provider.rs | 77 +
openssl/src/rand.rs | 26 +-
openssl/src/rsa.rs | 854 +++--
openssl/src/sha.rs | 503 +--
openssl/src/sign.rs | 588 +++-
openssl/src/srtp.rs | 66 +
openssl/src/ssl/bio.rs | 245 +-
openssl/src/ssl/callbacks.rs | 685 +++-
openssl/src/ssl/connector.rs | 803 ++---
openssl/src/ssl/error.rs | 211 +-
openssl/src/ssl/mod.rs | 3750 +++++++++++++++-------
openssl/src/ssl/test/mod.rs | 1493 +++++++++
openssl/src/ssl/test/server.rs | 167 +
openssl/src/ssl/tests/mod.rs | 1416 --------
openssl/src/ssl/tests/select.rs | 74 -
openssl/src/stack.rs | 208 +-
openssl/src/string.rs | 62 +-
openssl/src/symm.rs | 1201 +++++--
openssl/src/types.rs | 5 -
openssl/src/util.rs | 59 +-
openssl/src/verify.rs | 68 -
openssl/src/version.rs | 59 +-
openssl/src/x509/extension.rs | 384 +--
openssl/src/x509/mod.rs | 1859 ++++++++---
openssl/src/x509/store.rs | 246 +-
openssl/src/x509/tests.rs | 879 ++++-
openssl/src/x509/verify.rs | 191 +-
openssl/test/aia_test_cert.pem | 22 +
openssl/test/alt_name_cert.pem | 43 +-
openssl/test/ca.crt | 88 +
openssl/test/cms.p12 | Bin 0 -> 1709 bytes
openssl/test/cms_pubkey.der | Bin 0 -> 688 bytes
openssl/test/crl-ca.crt | 20 +
openssl/test/csr.pem | 62 +
openssl/test/dsa-encrypted.pem | 15 -
openssl/test/intermediate-ca.key | 27 +
openssl/test/intermediate-ca.pem | 22 +
openssl/test/leaf.pem | 21 +
openssl/test/pkcs1.pem.pub | 8 +
openssl/test/pkcs8-nocrypt.der | Bin 0 -> 1216 bytes
openssl/test/subca.crt | 88 +
openssl/test/test.crl | Bin 0 -> 469 bytes
systest/Cargo.toml | 8 +-
systest/build.rs | 106 +-
systest/src/main.rs | 5 +-
test/add_target.sh | 21 -
test/build_openssl.sh | 56 -
177 files changed, 34925 insertions(+), 14344 deletions(-)
create mode 100644 OAT.xml
delete mode 100644 appveyor.yml
create mode 100644 openssl-errors/CHANGELOG.md
create mode 100644 openssl-errors/Cargo.toml
create mode 100644 openssl-errors/LICENSE-APACHE
create mode 100644 openssl-errors/LICENSE-MIT
create mode 100644 openssl-errors/README.md
create mode 100644 openssl-errors/build.rs
create mode 100644 openssl-errors/src/lib.rs
create mode 100644 openssl-errors/tests/test.rs
create mode 100644 openssl-macros/Cargo.toml
create mode 100644 openssl-macros/LICENSE-APACHE
create mode 100644 openssl-macros/LICENSE-MIT
create mode 100644 openssl-macros/src/lib.rs
create mode 100644 openssl-sys/CHANGELOG.md
mode change 120000 => 100644 openssl-sys/README.md
delete mode 100644 openssl-sys/build.rs
create mode 100644 openssl-sys/build/cfgs.rs
create mode 100644 openssl-sys/build/expando.c
create mode 100644 openssl-sys/build/find_normal.rs
create mode 100644 openssl-sys/build/find_vendored.rs
create mode 100644 openssl-sys/build/main.rs
create mode 100644 openssl-sys/build/run_bindgen.rs
create mode 100644 openssl-sys/src/aes.rs
create mode 100644 openssl-sys/src/asn1.rs
create mode 100644 openssl-sys/src/bio.rs
create mode 100644 openssl-sys/src/bn.rs
create mode 100644 openssl-sys/src/cms.rs
create mode 100644 openssl-sys/src/crypto.rs
create mode 100644 openssl-sys/src/dtls1.rs
create mode 100644 openssl-sys/src/ec.rs
create mode 100644 openssl-sys/src/err.rs
create mode 100644 openssl-sys/src/evp.rs
create mode 100644 openssl-sys/src/handwritten/aes.rs
create mode 100644 openssl-sys/src/handwritten/asn1.rs
create mode 100644 openssl-sys/src/handwritten/bio.rs
create mode 100644 openssl-sys/src/handwritten/bn.rs
create mode 100644 openssl-sys/src/handwritten/cms.rs
create mode 100644 openssl-sys/src/handwritten/conf.rs
create mode 100644 openssl-sys/src/handwritten/crypto.rs
create mode 100644 openssl-sys/src/handwritten/dh.rs
create mode 100644 openssl-sys/src/handwritten/dsa.rs
create mode 100644 openssl-sys/src/handwritten/ec.rs
create mode 100644 openssl-sys/src/handwritten/err.rs
create mode 100644 openssl-sys/src/handwritten/evp.rs
create mode 100644 openssl-sys/src/handwritten/hmac.rs
create mode 100644 openssl-sys/src/handwritten/kdf.rs
create mode 100644 openssl-sys/src/handwritten/mod.rs
create mode 100644 openssl-sys/src/handwritten/object.rs
create mode 100644 openssl-sys/src/handwritten/ocsp.rs
create mode 100644 openssl-sys/src/handwritten/pem.rs
create mode 100644 openssl-sys/src/handwritten/pkcs12.rs
create mode 100644 openssl-sys/src/handwritten/pkcs7.rs
create mode 100644 openssl-sys/src/handwritten/provider.rs
create mode 100644 openssl-sys/src/handwritten/rand.rs
create mode 100644 openssl-sys/src/handwritten/rsa.rs
create mode 100644 openssl-sys/src/handwritten/safestack.rs
create mode 100644 openssl-sys/src/handwritten/sha.rs
create mode 100644 openssl-sys/src/handwritten/srtp.rs
create mode 100644 openssl-sys/src/handwritten/ssl.rs
create mode 100644 openssl-sys/src/handwritten/stack.rs
create mode 100644 openssl-sys/src/handwritten/tls1.rs
create mode 100644 openssl-sys/src/handwritten/types.rs
create mode 100644 openssl-sys/src/handwritten/x509.rs
create mode 100644 openssl-sys/src/handwritten/x509_vfy.rs
create mode 100644 openssl-sys/src/handwritten/x509v3.rs
delete mode 100644 openssl-sys/src/libressl/mod.rs
delete mode 100644 openssl-sys/src/libressl/v250.rs
delete mode 100644 openssl-sys/src/libressl/v25x.rs
create mode 100644 openssl-sys/src/macros.rs
create mode 100644 openssl-sys/src/obj_mac.rs
create mode 100644 openssl-sys/src/ocsp.rs
delete mode 100644 openssl-sys/src/ossl10x.rs
delete mode 100644 openssl-sys/src/ossl110.rs
create mode 100644 openssl-sys/src/pem.rs
create mode 100644 openssl-sys/src/pkcs7.rs
create mode 100644 openssl-sys/src/rsa.rs
create mode 100644 openssl-sys/src/sha.rs
create mode 100644 openssl-sys/src/srtp.rs
create mode 100644 openssl-sys/src/ssl.rs
create mode 100644 openssl-sys/src/ssl3.rs
create mode 100644 openssl-sys/src/tls1.rs
create mode 100644 openssl-sys/src/types.rs
create mode 100644 openssl-sys/src/x509.rs
create mode 100644 openssl-sys/src/x509_vfy.rs
create mode 100644 openssl-sys/src/x509v3.rs
create mode 100644 openssl/CHANGELOG.md
mode change 120000 => 100644 openssl/README.md
create mode 100644 openssl/src/base64.rs
create mode 100644 openssl/src/cipher.rs
create mode 100644 openssl/src/cipher_ctx.rs
delete mode 100644 openssl/src/crypto.rs
create mode 100644 openssl/src/derive.rs
delete mode 100644 openssl/src/ec_key.rs
create mode 100644 openssl/src/ecdsa.rs
create mode 100644 openssl/src/encrypt.rs
create mode 100644 openssl/src/envelope.rs
create mode 100644 openssl/src/fips.rs
create mode 100644 openssl/src/lib_ctx.rs
create mode 100644 openssl/src/md.rs
create mode 100644 openssl/src/md_ctx.rs
create mode 100644 openssl/src/pkcs7.rs
create mode 100644 openssl/src/pkey_ctx.rs
create mode 100644 openssl/src/provider.rs
create mode 100644 openssl/src/srtp.rs
create mode 100644 openssl/src/ssl/test/mod.rs
create mode 100644 openssl/src/ssl/test/server.rs
delete mode 100644 openssl/src/ssl/tests/mod.rs
delete mode 100644 openssl/src/ssl/tests/select.rs
delete mode 100644 openssl/src/types.rs
delete mode 100644 openssl/src/verify.rs
create mode 100644 openssl/test/aia_test_cert.pem
create mode 100644 openssl/test/ca.crt
create mode 100644 openssl/test/cms.p12
create mode 100644 openssl/test/cms_pubkey.der
create mode 100644 openssl/test/crl-ca.crt
create mode 100644 openssl/test/csr.pem
delete mode 100644 openssl/test/dsa-encrypted.pem
create mode 100644 openssl/test/intermediate-ca.key
create mode 100644 openssl/test/intermediate-ca.pem
create mode 100644 openssl/test/leaf.pem
create mode 100644 openssl/test/pkcs1.pem.pub
create mode 100644 openssl/test/pkcs8-nocrypt.der
create mode 100644 openssl/test/subca.crt
create mode 100644 openssl/test/test.crl
delete mode 100755 test/add_target.sh
delete mode 100755 test/build_openssl.sh
diff --git a/Cargo.toml b/Cargo.toml
index 2ef99c1..c33c347 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -1,2 +1,8 @@
[workspace]
-members = ["openssl", "openssl-sys", "systest"]
+members = [
+ "openssl",
+ "openssl-errors",
+ "openssl-macros",
+ "openssl-sys",
+ "systest",
+]
diff --git a/OAT.xml b/OAT.xml
new file mode 100644
index 0000000..65fa581
--- /dev/null
+++ b/OAT.xml
@@ -0,0 +1,65 @@
+
+
+
+
+
+ LICENSE-UNICODE|LICENSE-APACHE|LICENSE-MIT
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/README.md b/README.md
index 067a538..50c6d57 100644
--- a/README.md
+++ b/README.md
@@ -1,176 +1,18 @@
# rust-openssl
-[](https://circleci.com/gh/sfackler/rust-openssl) [](https://ci.appveyor.com/project/sfackler/rust-openssl/branch/master)
+[](https://crates.io/crates/openssl)
-[Documentation](https://docs.rs/openssl).
-
-## Warning
-
-This README does not correspond to rust-openssl 0.7.x or 0.8.x. See
-[here](https://github.com/sfackler/rust-openssl/blob/b8fb29db5c246175a096260eacca38180cd77dd0/README.md)
-for that README.
-
-## Building
-
-rust-openssl depends on OpenSSL version 1.0.1 or above, or LibreSSL. Both the
-libraries and headers need to be present in the build environment before this
-crate is compiled, and some instructions of how to do this are in the sections
-below.
-
-### Linux
-
-On Linux, you can typically install OpenSSL via your package manager. The
-headers are sometimes provided in a separate package than the runtime libraries
-- look for something like `openssl-devel` or `libssl-dev`. You will also need the
-regular development utilities, like `pkg-config`, as the custom build script relies
-on them.
-
-```bash
-# On Debian and Ubuntu
-sudo apt-get install pkg-config libssl-dev
-# On Arch Linux
-sudo pacman -S openssl
-# On Fedora
-sudo dnf install openssl-devel
-```
-
-If installation via a package manager is not possible, or if you're cross
-compiling to a separate target, you'll typically need to compile OpenSSL from
-source. That can normally be done with:
-
-```
-curl -O https://www.openssl.org/source/openssl-1.1.0f.tar.gz
-tar xf openssl-1.1.0f.tar.gz
-cd openssl-1.1.0f
-export CC=...
-./Configure --prefix=... linux-x86_64 -fPIC
-make -j$(nproc)
-make install
-```
-
-### OSX
-
-Although OpenSSL 0.9.8 is preinstalled on OSX this library is being phased out
-of OSX and this crate also does not support that version of OpenSSL. To use this
-crate on OSX you'll need to install OpenSSL via some alternate means, typically
-Homebrew:
-
-```bash
-brew install openssl
-```
-
-Occasionally an update of XCode or MacOS will cause the linker to fail after compilation, to rectify this you may want to try and run:
-
-```bash
-xcode-select --install
-```
-
-If Homebrew is installed to the default location of `/usr/local`, OpenSSL will be
-automatically detected.
-
-### Windows MSVC
-
-On MSVC it's unfortunately not always a trivial process acquiring OpenSSL. A couple of possibilities
-are downloading precompiled binaries for OpenSSL 1.1.0, or installing OpenSSL 1.0.2 using vcpkg.
-
-#### Installing OpenSSL 1.1.0 using precompiled binaries
-
-Perhaps the easiest way to do this right now is to download [precompiled
-binaries] and install them on your system. Currently it's recommended to
-install the 1.1.0 (non-light) installation if you're choosing this route.
-
-[precompiled binaries]: http://slproweb.com/products/Win32OpenSSL.html
-
-Once a precompiled binary is installed you can configure this crate to find the
-installation via an environment variable:
+OpenSSL bindings for the Rust programming language.
-```
-set OPENSSL_DIR=C:\OpenSSL-Win64
-```
-
-During the installation process if you select "Copy OpenSSL DLLs to: The OpenSSL binaries (/bin)
-directory", you will need to add them to the `PATH` environment variable:
-
-```
-set PATH=%PATH%;C:\OpenSSL-Win64\bin
-```
-
-Now you will need to [install root certificates.](#acquiring-root-certificates)
-
-#### Installing OpenSSL 1.0.2 using vcpkg
-
-Install [vcpkg](https://github.com/Microsoft/vcpkg), and install the OpenSSL port like this:
-
-```Batchfile
-vcpkg install openssl:x64-windows
-set VCPKG_ROOT=c:\path\to\vcpkg\installation
-cargo build
-```
-
-For more information see the vcpkg build helper [documentation](http://docs.rs/vcpkg).
-To finsh setting up OpenSSL you will need to [install root certificates.](#acquiring-root-certificates)
-
-#### Acquiring Root Certificates
-
-Neither of the above OpenSSL distributions ship with any root certificates.
-So to make requests to servers on the internet, you have to install them
-manually. Download the [cacert.pem file from here], copy it somewhere safe
-(`C:\OpenSSL-Win64\certs` is a good place) and point the `SSL_CERT_FILE`
-environment variable there:
-
-```
-set SSL_CERT_FILE=C:\OpenSSL-Win64\certs\cacert.pem
-```
-
-[cacert.pem file from here]: https://curl.haxx.se/docs/caextract.html
-
-After that, you're just a `cargo build` away!
-
-### Windows GNU (MinGW)
-
-The easiest way to acquire OpenSSL when working with MinGW is to ensure you're
-using [MSYS2](http://msys2.github.io) and to then execute:
-
-```
-# 32-bit
-pacman -S mingw-w64-i686-openssl
-
-# 64-bit
-pacman -S mingw-w64-x86_64-openssl
-```
-
-And after that, a `cargo build` should be all you need!
-
-### Manual configuration
-
-rust-openssl's build script will by default attempt to locate OpenSSL via
-pkg-config or other system-specific mechanisms. This will not work in some
-situations however, for example cross compiling or when using a copy of OpenSSL
-other than the normal system install.
-
-The build script can be configured via environment variables:
+[Documentation](https://docs.rs/openssl).
-* `OPENSSL_DIR` - If specified, a directory that will be used to find
- OpenSSL installation. It's expected that under this directory the `include`
- folder has header files and a `lib` folder has the runtime libraries.
-* `OPENSSL_LIB_DIR` - If specified, a directory that will be used to find
- OpenSSL libraries. Overrides the `lib` folder implied by `OPENSSL_DIR`
- (if specified).
-* `OPENSSL_INCLUDE_DIR` - If specified, a directory that will be used to find
- OpenSSL header files. Overrides the `include` folder implied by `OPENSSL_DIR`
- (if specified).
-* `OPENSSL_STATIC` - If specified, OpenSSL libraries will be statically rather
- than dynamically linked.
-* `OPENSSL_LIBS` - If specified, the names of the OpenSSL libraries that will be
- linked, e.g. `ssl:crypto`.
+## Release Support
-If `OPENSSL_DIR` or `OPENSSL_LIB_DIR` and `OPENSSL_INCLUDE_DIR` is specified,
-then the build script will skip the pkg-config step.
+The current supported release of `openssl` is 0.10 and `openssl-sys` is 0.9.
-For target-specific configuration, each of these environment variables can be
-prefixed by an upper-cased target, for example,
-`X86_64_UNKNOWN_LINUX_GNU_OPENSSL_DIR`. This can be useful in cross compilation
-contexts.
+New major versions will be published at most once per year. After a new
+release, the previous major version will be partially supported with bug
+fixes for 3 months, after which support will be dropped entirely.
### Contribution
diff --git a/appveyor.yml b/appveyor.yml
deleted file mode 100644
index bae5d62..0000000
--- a/appveyor.yml
+++ /dev/null
@@ -1,50 +0,0 @@
-environment:
- SSL_CERT_FILE: "C:\\OpenSSL\\cacert.pem"
- matrix:
- # 1.1.0, 64/32 bit
- - TARGET: i686-pc-windows-gnu
- BITS: 32
- MSYS2: 1
- OPENSSL_VERSION: 1_1_0g
- - TARGET: x86_64-pc-windows-msvc
- BITS: 64
- OPENSSL_VERSION: 1_1_0g
- OPENSSL_DIR: C:\OpenSSL
-
- # 1.0.2, 64/32 bit
- - TARGET: x86_64-pc-windows-gnu
- BITS: 64
- MSYS2: 1
- OPENSSL_VERSION: 1_0_2m
- - TARGET: i686-pc-windows-msvc
- BITS: 32
- OPENSSL_VERSION: 1_0_2m
- OPENSSL_DIR: C:\OpenSSL
- - TARGET: x86_64-pc-windows-msvc
- VCPKG_DEFAULT_TRIPLET: x64-windows
- VCPKGRS_DYNAMIC: 1
-install:
- # install OpenSSL
- - mkdir C:\OpenSSL
- - ps: if (Test-Path env:OPENSSL_VERSION) { Start-FileDownload "http://slproweb.com/download/Win${env:BITS}OpenSSL-${env:OPENSSL_VERSION}.exe" }
- - if defined OPENSSL_VERSION Win%BITS%OpenSSL-%OPENSSL_VERSION%.exe /SILENT /VERYSILENT /SP- /DIR="C:\OpenSSL"
- - appveyor DownloadFile https://curl.haxx.se/ca/cacert.pem -FileName C:\OpenSSL\cacert.pem
-
- # Install Rust
- - curl -sSf -o rustup-init.exe https://win.rustup.rs/
- - rustup-init.exe -y --default-host %TARGET%
- - set PATH=%PATH%;C:\Users\appveyor\.cargo\bin
- - if defined MSYS2 set PATH=C:\msys64\mingw%BITS%\bin;%PATH%
- - rustc -V
- - cargo -V
- - if defined VCPKG_DEFAULT_TRIPLET git clone https://github.com/Microsoft/vcpkg c:\projects\vcpkg
- - if defined VCPKG_DEFAULT_TRIPLET c:\projects\vcpkg\bootstrap-vcpkg.bat
- - if defined VCPKG_DEFAULT_TRIPLET set VCPKG_ROOT=c:\projects\vcpkg
- - if defined VCPKG_DEFAULT_TRIPLET echo yes > %VCPKG_ROOT%\Downloads\AlwaysAllowDownloads
- - if defined VCPKG_DEFAULT_TRIPLET %VCPKG_ROOT%\vcpkg.exe install openssl
-
-build: false
-
-test_script:
- - cargo run --manifest-path systest/Cargo.toml --target %TARGET%
- - cargo test --manifest-path openssl/Cargo.toml --target %TARGET%
diff --git a/openssl-errors/CHANGELOG.md b/openssl-errors/CHANGELOG.md
new file mode 100644
index 0000000..50610a9
--- /dev/null
+++ b/openssl-errors/CHANGELOG.md
@@ -0,0 +1,20 @@
+# Change Log
+
+## [Unreleased]
+
+## [v0.2.0] - 2021-06-18
+
+### Changed
+
+* Constructors and accessors on the `Function` and `Reason` types have been made private APIs.
+
+### Added
+
+* Added support for OpenSSL 3.x.x.
+
+## v0.1.0 - 2019-03-14
+
+Initial release
+
+[Unreleased]: https://github.com/sfackler/rust-openssl/compare/openssl-errors-v0.2.0...master
+[v0.2.0]: https://github.com/sfackler/rust-openssl/compare/openssl-errors-v0.1.0...openssl-errors-v0.2.0
diff --git a/openssl-errors/Cargo.toml b/openssl-errors/Cargo.toml
new file mode 100644
index 0000000..1f60f0e
--- /dev/null
+++ b/openssl-errors/Cargo.toml
@@ -0,0 +1,19 @@
+[package]
+name = "openssl-errors"
+version = "0.2.0"
+authors = ["Steven Fackler "]
+edition = "2018"
+license = "MIT/Apache-2.0"
+description = "Custom error library support for the openssl crate."
+repository = "https://github.com/sfackler/rust-openssl"
+readme = "README.md"
+categories = ["api-bindings"]
+
+[dependencies]
+cfg-if = "1.0"
+libc = "0.2"
+
+openssl-sys = { version = "0.9.64", path = "../openssl-sys" }
+
+[dev-dependencies]
+openssl = { version = "0.10.19", path = "../openssl" }
diff --git a/openssl-errors/LICENSE-APACHE b/openssl-errors/LICENSE-APACHE
new file mode 100644
index 0000000..8f71f43
--- /dev/null
+++ b/openssl-errors/LICENSE-APACHE
@@ -0,0 +1,202 @@
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "{}"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+ Copyright {yyyy} {name of copyright owner}
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+
diff --git a/openssl-errors/LICENSE-MIT b/openssl-errors/LICENSE-MIT
new file mode 100644
index 0000000..7c3deb5
--- /dev/null
+++ b/openssl-errors/LICENSE-MIT
@@ -0,0 +1,19 @@
+Copyright (c) 2019 Steven Fackler
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+SOFTWARE.
diff --git a/openssl-errors/README.md b/openssl-errors/README.md
new file mode 100644
index 0000000..32d46ee
--- /dev/null
+++ b/openssl-errors/README.md
@@ -0,0 +1 @@
+../README.md
\ No newline at end of file
diff --git a/openssl-errors/build.rs b/openssl-errors/build.rs
new file mode 100644
index 0000000..5ecd7ba
--- /dev/null
+++ b/openssl-errors/build.rs
@@ -0,0 +1,13 @@
+#![allow(clippy::inconsistent_digit_grouping, clippy::unusual_byte_groupings)]
+
+use std::env;
+
+fn main() {
+ if let Ok(version) = env::var("DEP_OPENSSL_VERSION_NUMBER") {
+ let version = u64::from_str_radix(&version, 16).unwrap();
+
+ if version >= 0x3_00_00_00_0 {
+ println!("cargo:rustc-cfg=ossl300");
+ }
+ }
+}
diff --git a/openssl-errors/src/lib.rs b/openssl-errors/src/lib.rs
new file mode 100644
index 0000000..30abc67
--- /dev/null
+++ b/openssl-errors/src/lib.rs
@@ -0,0 +1,388 @@
+//! Custom error library support for the `openssl` crate.
+//!
+//! OpenSSL allows third-party libraries to integrate with its error API. This crate provides a safe interface to that.
+//!
+//! # Examples
+//!
+//! ```
+//! use openssl_errors::{openssl_errors, put_error};
+//! use openssl::error::Error;
+//!
+//! // Errors are organized at the top level into "libraries". The
+//! // openssl_errors! macro can define these.
+//! //
+//! // Libraries contain a set of functions and reasons. The library itself,
+//! // its functions, and its definitions all all have an associated message
+//! // string. This string is what's shown in OpenSSL errors.
+//! //
+//! // The macro creates a type for each library with associated constants for
+//! // its functions and reasons.
+//! openssl_errors! {
+//! pub library MyLib("my cool library") {
+//! functions {
+//! FIND_PRIVATE_KEY("find_private_key");
+//! }
+//!
+//! reasons {
+//! IO_ERROR("IO error");
+//! BAD_PASSWORD("invalid private key password");
+//! }
+//! }
+//! }
+//!
+//! // The put_error! macro pushes errors onto the OpenSSL error stack.
+//! put_error!(MyLib::FIND_PRIVATE_KEY, MyLib::BAD_PASSWORD);
+//!
+//! // Prints `error:80001002:my cool library:find_private_key:invalid private key password:src/lib.rs:27:`
+//! println!("{}", Error::get().unwrap());
+//!
+//! // You can also optionally attach an extra string of context using the
+//! // standard Rust format syntax.
+//! let tries = 2;
+//! put_error!(MyLib::FIND_PRIVATE_KEY, MyLib::IO_ERROR, "tried {} times", tries);
+//!
+//! // Prints `error:80001001:my cool library:find_private_key:IO error:src/lib.rs:34:tried 2 times`
+//! println!("{}", Error::get().unwrap());
+//! ```
+#![warn(missing_docs)]
+#![doc(html_root_url = "https://docs.rs/openssl-errors/0.2")]
+
+use cfg_if::cfg_if;
+use libc::{c_char, c_int};
+use std::borrow::Cow;
+use std::marker::PhantomData;
+use std::ptr;
+
+#[doc(hidden)]
+pub mod export {
+ pub use libc::{c_char, c_int};
+ pub use openssl_sys::{
+ init, ERR_get_next_error_library, ERR_load_strings, ERR_PACK, ERR_STRING_DATA,
+ };
+ pub use std::borrow::Cow;
+ pub use std::option::Option;
+ pub use std::ptr::null;
+ pub use std::sync::Once;
+}
+
+/// An OpenSSL error library.
+pub trait Library {
+ /// Returns the ID assigned to this library by OpenSSL.
+ fn id() -> c_int;
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ type FunctionInner = *const c_char;
+ } else {
+ type FunctionInner = c_int;
+ }
+}
+
+/// A function declaration, parameterized by its error library.
+pub struct Function(FunctionInner, PhantomData);
+
+// manual impls necessary for the 3.0.0 case
+unsafe impl Sync for Function where T: Sync {}
+unsafe impl Send for Function where T: Send {}
+
+impl Function {
+ /// This is not considered a part of the crate's public API, and is subject to change at any time.
+ ///
+ /// # Safety
+ ///
+ /// The inner value must be valid for the lifetime of the process.
+ #[doc(hidden)]
+ #[inline]
+ pub const unsafe fn __from_raw(raw: FunctionInner) -> Function {
+ Function(raw, PhantomData)
+ }
+
+ /// This is not considered a part of the crate's public API, and is subject to change at any time.
+ #[doc(hidden)]
+ #[inline]
+ pub const fn __as_raw(&self) -> FunctionInner {
+ self.0
+ }
+}
+
+/// A reason declaration, parameterized by its error library.
+pub struct Reason(c_int, PhantomData);
+
+impl Reason {
+ /// This is not considered a part of the crate's public API, and is subject to change at any time.
+ #[doc(hidden)]
+ #[inline]
+ pub const fn __from_raw(raw: c_int) -> Reason {
+ Reason(raw, PhantomData)
+ }
+
+ /// This is not considered a part of the crate's public API, and is subject to change at any time.
+ #[doc(hidden)]
+ #[inline]
+ pub const fn __as_raw(&self) -> c_int {
+ self.0
+ }
+}
+
+/// This is not considered part of this crate's public API. It is subject to change at any time.
+///
+/// # Safety
+///
+/// `file` and `message` must be null-terminated.
+#[doc(hidden)]
+pub unsafe fn __put_error(
+ func: Function,
+ reason: Reason,
+ file: &'static str,
+ line: u32,
+ message: Option>,
+) where
+ T: Library,
+{
+ put_error_inner(T::id(), func.0, reason.0, file, line, message)
+}
+
+unsafe fn put_error_inner(
+ library: c_int,
+ func: FunctionInner,
+ reason: c_int,
+ file: &'static str,
+ line: u32,
+ message: Option>,
+) {
+ cfg_if! {
+ if #[cfg(ossl300)] {
+ openssl_sys::ERR_new();
+ openssl_sys::ERR_set_debug(
+ file.as_ptr() as *const c_char,
+ line as c_int,
+ func,
+ );
+ openssl_sys::ERR_set_error(library, reason, ptr::null());
+ } else {
+ openssl_sys::ERR_put_error(
+ library,
+ func,
+ reason,
+ file.as_ptr() as *const c_char,
+ line as c_int,
+ );
+ }
+ }
+
+ let data = match message {
+ Some(Cow::Borrowed(s)) => Some((s.as_ptr() as *const c_char as *mut c_char, 0)),
+ Some(Cow::Owned(s)) => {
+ let ptr = openssl_sys::CRYPTO_malloc(
+ s.len() as _,
+ concat!(file!(), "\0").as_ptr() as *const c_char,
+ line!() as c_int,
+ ) as *mut c_char;
+ if ptr.is_null() {
+ None
+ } else {
+ ptr::copy_nonoverlapping(s.as_ptr(), ptr as *mut u8, s.len());
+ Some((ptr, openssl_sys::ERR_TXT_MALLOCED))
+ }
+ }
+ None => None,
+ };
+ if let Some((ptr, flags)) = data {
+ openssl_sys::ERR_set_error_data(ptr, flags | openssl_sys::ERR_TXT_STRING);
+ }
+}
+
+/// Pushes an error onto the OpenSSL error stack.
+///
+/// A function and reason are required, and must be associated with the same error library. An additional formatted
+/// message string can also optionally be provided.
+#[macro_export]
+macro_rules! put_error {
+ ($function:expr, $reason:expr) => {
+ unsafe {
+ $crate::__put_error(
+ $function,
+ $reason,
+ concat!(file!(), "\0"),
+ line!(),
+ $crate::export::Option::None,
+ );
+ }
+ };
+ ($function:expr, $reason:expr, $message:expr) => {
+ unsafe {
+ $crate::__put_error(
+ $function,
+ $reason,
+ concat!(file!(), "\0"),
+ line!(),
+ // go through format_args to ensure the message string is handled in the same way as the args case
+ $crate::export::Option::Some($crate::export::Cow::Borrowed(
+ format_args!(concat!($message, "\0")).as_str().unwrap(),
+ )),
+ );
+ }
+ };
+ ($function:expr, $reason:expr, $message:expr, $($args:tt)*) => {
+ unsafe {
+ $crate::__put_error(
+ $function,
+ $reason,
+ concat!(file!(), "\0"),
+ line!(),
+ $crate::export::Option::Some($crate::export::Cow::Owned(
+ format!(concat!($message, "\0"), $($args)*)),
+ ),
+ );
+ }
+ };
+}
+
+/// Defines custom OpenSSL error libraries.
+///
+/// The created libraries can be used with the `put_error!` macro to create custom OpenSSL errors.
+#[macro_export]
+macro_rules! openssl_errors {
+ ($(
+ $(#[$lib_attr:meta])*
+ $lib_vis:vis library $lib_name:ident($lib_str:expr) {
+ functions {
+ $(
+ $(#[$func_attr:meta])*
+ $func_name:ident($func_str:expr);
+ )*
+ }
+
+ reasons {
+ $(
+ $(#[$reason_attr:meta])*
+ $reason_name:ident($reason_str:expr);
+ )*
+ }
+ }
+ )*) => {$(
+ $(#[$lib_attr])*
+ $lib_vis enum $lib_name {}
+
+ impl $crate::Library for $lib_name {
+ fn id() -> $crate::export::c_int {
+ static INIT: $crate::export::Once = $crate::export::Once::new();
+ static mut LIB_NUM: $crate::export::c_int = 0;
+ $crate::__openssl_errors_helper! {
+ @strings $lib_name($lib_str)
+ functions { $($func_name($func_str);)* }
+ reasons { $($reason_name($reason_str);)* }
+ }
+
+ unsafe {
+ INIT.call_once(|| {
+ $crate::export::init();
+ LIB_NUM = $crate::export::ERR_get_next_error_library();
+ STRINGS[0].error = $crate::export::ERR_PACK(LIB_NUM, 0, 0);
+ $crate::export::ERR_load_strings(LIB_NUM, STRINGS.as_mut_ptr());
+ });
+
+ LIB_NUM
+ }
+ }
+ }
+
+ impl $lib_name {
+ $crate::openssl_errors!(@func_consts $lib_name; 1; $($(#[$func_attr])* $func_name($func_str);)*);
+ $crate::openssl_errors!(@reason_consts $lib_name; 1; $($(#[$reason_attr])* $reason_name;)*);
+ }
+ )*};
+ (@func_consts $lib_name:ident; $n:expr; $(#[$attr:meta])* $name:ident($str:expr); $($tt:tt)*) => {
+ $(#[$attr])*
+ pub const $name: $crate::Function<$lib_name> = unsafe {
+ $crate::Function::__from_raw($crate::__openssl_errors_helper!(@func_value $n, $str))
+ };
+ $crate::openssl_errors!(@func_consts $lib_name; $n + 1; $($tt)*);
+ };
+ (@func_consts $lib_name:ident; $n:expr;) => {};
+ (@reason_consts $lib_name:ident; $n:expr; $(#[$attr:meta])* $name:ident; $($tt:tt)*) => {
+ $(#[$attr])*
+ pub const $name: $crate::Reason<$lib_name> = $crate::Reason::__from_raw($n);
+ $crate::openssl_errors!(@reason_consts $lib_name; $n + 1; $($tt)*);
+ };
+ (@reason_consts $lib_name:ident; $n:expr;) => {};
+ (@count $i:ident; $($tt:tt)*) => {
+ 1 + $crate::openssl_errors!(@count $($tt)*)
+ };
+ (@count) => { 0 };
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ #[doc(hidden)]
+ #[macro_export]
+ macro_rules! __openssl_errors_helper {
+ (
+ @strings $lib_name:ident($lib_str:expr)
+ functions { $($func_name:ident($func_str:expr);)* }
+ reasons { $($reason_name:ident($reason_str:expr);)* }
+ ) => {
+ static mut STRINGS: [
+ $crate::export::ERR_STRING_DATA;
+ 2 + $crate::openssl_errors!(@count $($reason_name;)*)
+ ] = [
+ $crate::export::ERR_STRING_DATA {
+ error: 0,
+ string: concat!($lib_str, "\0").as_ptr() as *const $crate::export::c_char,
+ },
+ $(
+ $crate::export::ERR_STRING_DATA {
+ error: $crate::export::ERR_PACK(0, 0, $lib_name::$reason_name.__as_raw()),
+ string: concat!($reason_str, "\0").as_ptr() as *const $crate::export::c_char,
+ },
+ )*
+ $crate::export::ERR_STRING_DATA {
+ error: 0,
+ string: $crate::export::null(),
+ }
+ ];
+ };
+ (@func_value $n:expr, $func_str:expr) => {
+ concat!($func_str, "\0").as_ptr() as *const $crate::export::c_char
+ };
+ }
+ } else {
+ #[doc(hidden)]
+ #[macro_export]
+ macro_rules! __openssl_errors_helper {
+ (
+ @strings $lib_name:ident($lib_str:expr)
+ functions { $($func_name:ident($func_str:expr);)* }
+ reasons { $($reason_name:ident($reason_str:expr);)* }
+ ) => {
+ static mut STRINGS: [
+ $crate::export::ERR_STRING_DATA;
+ 2 + $crate::openssl_errors!(@count $($func_name;)* $($reason_name;)*)
+ ] = [
+ $crate::export::ERR_STRING_DATA {
+ error: 0,
+ string: concat!($lib_str, "\0").as_ptr() as *const $crate::export::c_char,
+ },
+ $(
+ $crate::export::ERR_STRING_DATA {
+ error: $crate::export::ERR_PACK(0, $lib_name::$func_name.__as_raw(), 0),
+ string: concat!($func_str, "\0").as_ptr() as *const $crate::export::c_char,
+ },
+ )*
+ $(
+ $crate::export::ERR_STRING_DATA {
+ error: $crate::export::ERR_PACK(0, 0, $lib_name::$reason_name.__as_raw()),
+ string: concat!($reason_str, "\0").as_ptr() as *const $crate::export::c_char,
+ },
+ )*
+ $crate::export::ERR_STRING_DATA {
+ error: 0,
+ string: $crate::export::null(),
+ }
+ ];
+ };
+ (@func_value $n:expr, $func_str:expr) => {$n};
+ }
+ }
+}
diff --git a/openssl-errors/tests/test.rs b/openssl-errors/tests/test.rs
new file mode 100644
index 0000000..98259b9
--- /dev/null
+++ b/openssl-errors/tests/test.rs
@@ -0,0 +1,95 @@
+use cfg_if::cfg_if;
+use openssl::error::Error;
+
+openssl_errors::openssl_errors! {
+ library Test("test library") {
+ functions {
+ FOO("function foo");
+ BAR("function bar");
+ }
+
+ reasons {
+ NO_MILK("out of milk");
+ NO_BACON("out of bacon");
+ }
+ }
+}
+
+#[test]
+fn basic() {
+ openssl_errors::put_error!(Test::FOO, Test::NO_MILK);
+
+ let error = Error::get().unwrap();
+ assert_eq!(error.library().unwrap(), "test library");
+ assert_eq!(error.function().unwrap(), "function foo");
+ assert_eq!(error.reason().unwrap(), "out of milk");
+ // Replace Windows `\` separators with `/`
+ assert_eq!(
+ error.file().replace('\\', "/"),
+ "openssl-errors/tests/test.rs"
+ );
+ assert_eq!(error.line(), line!() - 11);
+ cfg_if! {
+ if #[cfg(ossl300)] {
+ // https://github.com/openssl/openssl/issues/12530
+ assert!(error.data().is_none() || error.data() == Some(""));
+ } else {
+ assert_eq!(error.data(), None);
+ }
+ }
+}
+
+#[test]
+fn static_data() {
+ openssl_errors::put_error!(Test::BAR, Test::NO_BACON, "foobar {{}}");
+
+ let error = Error::get().unwrap();
+ assert_eq!(error.library().unwrap(), "test library");
+ assert_eq!(error.function().unwrap(), "function bar");
+ assert_eq!(error.reason().unwrap(), "out of bacon");
+ // Replace Windows `\` separators with `/`
+ assert_eq!(
+ error.file().replace('\\', "/"),
+ "openssl-errors/tests/test.rs"
+ );
+ assert_eq!(error.line(), line!() - 11);
+ assert_eq!(error.data(), Some("foobar {}"));
+}
+
+#[test]
+fn dynamic_data() {
+ openssl_errors::put_error!(Test::BAR, Test::NO_MILK, "hello {}", "world");
+
+ let error = Error::get().unwrap();
+ assert_eq!(error.library().unwrap(), "test library");
+ assert_eq!(error.function().unwrap(), "function bar");
+ assert_eq!(error.reason().unwrap(), "out of milk");
+ // Replace Windows `\` separators with `/`
+ assert_eq!(
+ error.file().replace('\\', "/"),
+ "openssl-errors/tests/test.rs"
+ );
+ assert_eq!(error.line(), line!() - 11);
+ assert_eq!(error.data(), Some("hello world"));
+}
+
+#[test]
+fn deferred_error_render() {
+ openssl_errors::put_error!(Test::BAR, Test::NO_MILK);
+
+ let error = Error::get().unwrap();
+
+ for _ in 0..100 {
+ openssl_errors::put_error!(Test::FOO, Test::NO_BACON);
+ }
+
+ assert_eq!(error.function().unwrap(), "function bar");
+ // Replace Windows `\` separators with `/`
+ assert_eq!(
+ error.file().replace('\\', "/"),
+ "openssl-errors/tests/test.rs"
+ );
+
+ // clear out the stack for other tests on the same thread
+ while Error::get().is_some() {}
+}
diff --git a/openssl-macros/Cargo.toml b/openssl-macros/Cargo.toml
new file mode 100644
index 0000000..d55f226
--- /dev/null
+++ b/openssl-macros/Cargo.toml
@@ -0,0 +1,14 @@
+[package]
+name = "openssl-macros"
+version = "0.1.0"
+edition = "2018"
+license = "MIT/Apache-2.0"
+description = "Internal macros used by the openssl crate."
+
+[lib]
+proc-macro = true
+
+[dependencies]
+proc-macro2 = "1"
+quote = "1"
+syn = { version = "1", features = ["full"] }
diff --git a/openssl-macros/LICENSE-APACHE b/openssl-macros/LICENSE-APACHE
new file mode 100644
index 0000000..8f71f43
--- /dev/null
+++ b/openssl-macros/LICENSE-APACHE
@@ -0,0 +1,202 @@
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "{}"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+ Copyright {yyyy} {name of copyright owner}
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+
diff --git a/openssl-macros/LICENSE-MIT b/openssl-macros/LICENSE-MIT
new file mode 100644
index 0000000..743bbf8
--- /dev/null
+++ b/openssl-macros/LICENSE-MIT
@@ -0,0 +1,19 @@
+Copyright (c) 2022 Steven Fackler
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+SOFTWARE.
diff --git a/openssl-macros/src/lib.rs b/openssl-macros/src/lib.rs
new file mode 100644
index 0000000..99db988
--- /dev/null
+++ b/openssl-macros/src/lib.rs
@@ -0,0 +1,32 @@
+#![allow(clippy::uninlined_format_args)]
+
+use proc_macro::TokenStream;
+use proc_macro2::Ident;
+use quote::quote;
+use syn::{parse_macro_input, ItemFn};
+
+#[proc_macro_attribute]
+pub fn corresponds(attr: TokenStream, item: TokenStream) -> TokenStream {
+ let function = parse_macro_input!(attr as Ident);
+ let item = parse_macro_input!(item as ItemFn);
+
+ let function = function.to_string();
+ let line = format!(
+ "This corresponds to [`{0}`](https://www.openssl.org/docs/manmaster/man3/{0}.html).",
+ function
+ );
+
+ let attrs = item.attrs;
+ let vis = item.vis;
+ let sig = item.sig;
+ let block = item.block;
+
+ let out = quote! {
+ #(#attrs)*
+ #[doc = ""]
+ #[doc = #line]
+ #[doc(alias = #function)]
+ #vis #sig #block
+ };
+ out.into()
+}
diff --git a/openssl-sys/CHANGELOG.md b/openssl-sys/CHANGELOG.md
new file mode 100644
index 0000000..3cb0711
--- /dev/null
+++ b/openssl-sys/CHANGELOG.md
@@ -0,0 +1,442 @@
+# Change Log
+
+## [Unreleased]
+
+## [v0.9.82] - 2023-03-19
+
+### Added
+
+* Added support for LibreSSL 3.7.1.
+* Added support for X25519 and Ed25519 on LibreSSL and BoringSSL.
+
+## [v0.9.81] - 2023-03-14
+
+### Fixed
+
+Fixed builds against OpenSSL built with `no-cast`.
+
+### Added
+
+* Added experimental bindgen support for BoringSSL.
+* Added `X509_VERIFY_PARAM_set_auth_level`, `X509_VERIFY_PARAM_get_auth_level`, and `X509_VERIFY_PARAM_set_purpose`.
+* Added `X509_PURPOSE_*` consts.
+* Added `X509_NAME_add_entry`.
+* Added `X509_load_crl_file`.
+* Added `SSL_set_cipher_list`, `SSL_set_ssl_method`, `SSL_use_PrivateKey_file`, `SSL_use_PrivateKey`, `SSL_use_certificate`, `SSL_use_certificate_chain_file`, `SSL_set_client_CA_list`, `SSL_add_client_CA`, and `SSL_set0_verify_cert_store`.
+* Added `X509_PURPOSE`, `X509_STORE_set_purpose`, and `X509_STORE_set_trust`.
+* Added `SSL_CTX_set_num_tickets`, `SSL_set_num_tickets`, `SSL_CTX_get_num_tickets`, and `SSL_get_num_tickets`.
+* Added `CMS_verify`.
+
+### Removed
+
+* Removed an unnecessary link to libatomic for 32-bit android targets.
+
+## [v0.9.80] - 2022-12-20
+
+### Fixed
+
+* Added `NO_DEPRECATED_3_0` cfg checks for more APIs.
+
+### Added
+
+* Added support for LibreSSL 3.7.0.
+* Added `SSL_CTRL_CHAIN_CERT` and `SSL_add0_chain_cert`.
+* Added `EVP_PKEY_get_security_bits` and `EVP_PKEY_security_bits`.
+* Added `OSSL_PROVIDER_set_default_search_path`.
+
+## [v0.9.79] - 2022-12-06
+
+### Added
+
+* Added `EVP_CIPHER_CTX_num`.
+* Added `X509_LOOKUP_file` and `X509_load_cert_file`.
+
+## [v0.9.78] - 2022-11-23
+
+### Added
+
+* Added support for LibreSSL 3.6.x.
+* Added `NID_brainpoolP256r1`, `NID_brainpoolP384r1`, and `NID_brainpool512r1`.
+* Added `EVP_camellia_128_cfb128`, `EVP_camellia_128_ecb`, `EVP_camellia_192_cfb128`, `EVP_camellia_192_ecb`,
+ `EVP_camellia_256_cfb128`, and `EVP_camellia_256_ecb`.
+* Added `EVP_cast5_cfb64` and `EVP_cast5_ecb`.
+* Added `EVP_idea_cfb64` and `EVP_idea_ecb`.
+* Added `DSA_SIG`, `d2i_DSA_SIG`, `i2d_DSA_SIG`, `DSA_SIG_new`, `DSA_SIG_free`, `DSA_SIG_get0`, and `DSA_SIG_set0`.
+* Added `X509_STORE_set1_param`, `X509_VERIFY_PARAM_new`, `X509_VERIFY_PARAM_set_time`, and
+ `X509_VERIFY_PARAM_set_depth`.
+
+## [v0.9.77] - 2022-10-22
+
+### Added
+
+* Added support for LibreSSL 3.6.0
+* Added `assume_init`.
+
+## [v0.9.76] - 2022-09-26
+
+### Added
+
+* Added `SSL_get_psk_identity_hint` and `SSL_get_psk_identity`.
+* Added SHA-3 NID constants.
+* Added `SSL_OP_PRIORITIZE_CHACHA`.
+* Added `X509_REQ_print`.
+* Added `EVP_MD_CTX_size` and `EVP_MD_CTX_get_size`
+* Added `EVP_MD_CTX_reset`.
+* Added experimental, unstable support for BoringSSL.
+
+### Fixed
+
+* Fixed the deprecation note on `SSL_CTX_set_alpn_select_cb`.
+
+## [v0.9.75] - 2022-07-09
+
+### Added
+
+* Added SM4 bindings.
+* Added `EC_GROUP_set_generator` and `EC_POINT_set_affine_coordinates_GFp`.
+
+## [v0.9.74] - 2022-06-01
+
+### Added
+
+* Added `EVP_MD_block_size`.
+* Added `X509V3_EXT_add_alias`.
+* Added `X509_V_ERR_INVALID_CA` back when building against OpenSSL 3.0.
+
+## [v0.9.73] - 2022-05-02
+
+### Added
+
+* Added support for installations that place libraries in `$OPENSSL_DIR/lib64` in addition to `$OPENSSL_DIR/lib`.
+* Added `X509_issuer_name_hash`.
+* Added `ASN1_string_set`.
+* Added `X509_CRL_dup`, `X509_REQ_dup`, `X509_NAME_dup`, and `X509_dup`.
+* Added `X509_print`.
+* Added support for LibreSSL 3.5.x.
+
+## [v0.9.72] - 2021-12-11
+
+### Changed
+
+* Temporarily downgraded the vendored OpenSSL back to 1.1.1 due to significant performance regressions. We will move
+ back to 3.0.0 when a future release resolves those issues.
+
+### Added
+
+* Added `PKCS12_set_mac`.
+* Added `EVP_PKEY_sign_init`, `EVP_PKEY_sign`, `EVP_PKEY_verify_init`, and `EVP_PKEY_verify`.
+* Added support for LibreSSL 3.4.x.
+
+## [v0.9.71]
+
+### Fixed
+
+* Fixed linkage to static OpenSSL 3.0.0 libraries on some 32 bit Android targets.
+
+### Added
+
+* Added support for LibreSSL 3.4.1.
+* Added `SSL_get_extms_support` and `SSL_CTRL_GET_EXTMS_SUPPORT`.
+* Added `OBJ_create`.
+* Added `EVP_CIPHER_CTX_get0_cipher`, `EVP_CIPHER_CTX_get_block_size`, `EVP_CIPHER_CTX_get_key_length`,
+ `EVP_CIPHER_CTX_get_iv_length`, and `EVP_CIPHER_CTX_get_tag_length`.
+* Added `EVP_CIPHER_free`.
+* Added `EVP_CIPHER_CTX_rand_key`.
+* Added `OSSL_LIB_CTX_new` and `OSSL_LIB_CTX_free`.
+* Added `EVP_CIPHER_fetch`.
+* Added `EVP_MD_fetch` and `EVP_MD_free`.
+* Added `OPENSSL_malloc` and `OPENSSL_free`.
+* Added `EVP_DigestSignUpdate` and `EVP_DigestVerifyUpdate`.
+
+## [v0.9.70] - 2021-10-31
+
+### Fixed
+
+* Fixed linkage to static 3.0.0 OpenSSL libraries on some 32 bit architectures.
+
+## [v0.9.69] - 2021-10-31
+
+### Changed
+
+* Upgraded the vendored OpenSSL to 3.0.0.
+
+### Added
+
+* Added support for automatic detection of Homebrew `openssl@3` installs.
+* Added `EVP_PKEY_Q_keygen` and `EVP_EC_gen`.
+
+## [v0.9.68] - 2021-10-27
+
+### Added
+
+* Added `BN_bn2binpad`.
+* Added `i2d_X509_NAME` and `d2i_X509_NAME`.
+* Added `BN_FLG_MALLOCED`, `BN_FLG_STATIC_DATA`, `BN_FLG_CONSTTIME`, and `BN_FLG_SECURE`.
+* Added `BN_CTX_secure_new`, `BN_secure_new`, `BN_set_flags`, and `BN_get_flags`.
+
+## [v0.9.67] - 2021-09-21
+
+### Added
+
+* Added support for LibreSSL 3.4.0
+
+## [v0.9.66] - 2021-08-17
+
+### Added
+
+* Added `EVP_seed_cbc`, `EVP_seed_cfb128`, `EVP_seed_ecb`, and `EVP_seed_ofb`.
+* Added `OBJ_length` and `OBJ_get0_data`.
+* Added `i2d_PKCS8PrivateKey_bio`.
+
+## [v0.9.65] - 2021-06-21
+
+### Fixed
+
+* Restored the accidentally deleted `PEM_read_bio_X509_CRL` function.
+
+## [v0.9.64] - 2021-06-18
+
+### Added
+
+* Added support for OpenSSL 3.x.x.
+* Added `SSL_peek`.
+* Added `ERR_LIB_ASN1` and `ASN1_R_HEADER_TOO_LONG`.
+* Added `d2i_X509_bio`.
+* Added `OBJ_nid2obj`.
+* Added `RAND_add`.
+* Added `SSL_CTX_set_post_handshake_auth`.
+* Added `COMP_get_type`.
+* Added `X509_get_default_cert_file_env`, `X509_get_default_cert_file`, `X509_get_default_cert_dir_env`, and
+ `X509_get_default_cirt_dir`.
+
+## [v0.9.63] - 2021-05-06
+
+### Added
+
+* Added support for LibreSSL 3.3.x.
+
+## [v0.9.62] - 2021-04-28
+
+### Added
+
+* Added support for LibreSSL 3.3.2.
+* Added `DH_set0_key`.
+* Added `EC_POINT_get_affine_coordinates`.
+
+## [v0.9.61] - 2021-03-13
+
+### Added
+
+* Added support for automatic detection of OpenSSL installations via pkgsrc and MacPorts on macOS.
+* Added various `V_ASN1_*` constants.
+* Added `DH_generate_parameters_ex`.
+* Added `EC_POINT_is_at_infinity` and `EC_POINT_is_on_curve`.
+* Added `EVP_CIPHER_nid`.
+* Added `EVP_sm3`.
+* Added `NID_*` constants related to SM3.
+* Added `PKCS7_get0_signers`.
+* Added `EVP_PKEY_CTX_set0_rsa_oaep_label`.
+* Added `ACCESS_DESCRIPTION` and `ACCESS_DESCRIPTION_free`.
+
+## [v0.9.60] - 2020-12-24
+
+### Added
+
+* Added support for the default Homebrew install directory on ARM.
+* Added `EVP_PKEY_CTX_set_rsa_oaep_md` and `EVP_PKEY_CTRL_RSA_OAEP_MD`.
+
+## [v0.9.59] - 2020-12-09
+
+### Added
+
+* Added support for LibreSSL 3.2.x, 3.3.0, and 3.3.1.
+* Added `DH_generate_parameters`, `DH_generate_key`, `DH_compute_key`, and `DH_size`.
+* Added `NID_X25519`, `NID_X448`, `EVP_PKEY_x25519` and `EVP_PKEY_x448`.
+* Added `OBJ_txt2obj`.
+* Added `d2i_PKCS7` and `i2d_PKCS7`.
+* Added `SRTP_AEAD_AES_128_GCM` and `SRTP_AEAD_AES_256_GCM`.
+
+## [v0.9.58] - 2020-06-05
+
+### Added
+
+* Added `SSL_set_mtu`.
+* Added support for LibreSSL 3.2.0.
+* Added `PEM_read_bio_EC_PUBKEY`, `PEM_write_bio_EC_PUBKEY`, `d2i_EC_PUBKEY`, and `i2d_EC_PUBKEY`.
+* Added `EVP_PKEY_encrypt_init`, `EVP_PKEY_encrypt`, `EVP_PKEY_decrypt_init`, `EVP_PKEY_decrypt`,
+ `EVP_PKEY_get_raw_public_key`, `EVP_PKEY_new_raw_public_key`, `EVP_PKEY_get_raw_private_key`,
+ and `EVP_PKEY_new_raw_private_key`.
+* Added `OBJ_sn2nid`.
+
+## [v0.9.57] - 2020-05-24
+
+### Added
+
+* Added support for LibreSSL 3.1.x.
+
+## [v0.9.56] - 2020-05-07
+
+### Fixed
+
+* Fixed vendored builds on windows-gnu targets.
+
+### Added
+
+* Added support for LibreSSL 3.0.0.
+
+## [v0.9.55] - 2020-04-07
+
+### Fixed
+
+* Fixed windows-msvc library names when using OpenSSL from vcpkg.
+
+### Added
+
+* If the `OPENSSL_NO_VENDOR` environment variable is set, vendoring will not be used even if enabled.
+* Added `SSL_CTX_get_verify_mode` and `SSL_get_verify_mode`.
+* Added `SSL_is_init_finished`.
+* Added `SSL_CTX_set_cert_store`.
+* Added `TLS_server_method` and `TLS_client_method`.
+* Added `X509_STORE_get0_objects`.
+* Added `X509_OBJECT_free`, `X509_OBJECT_get_type`, and `X509_OBJECT_get0_X509`.
+
+## [v0.9.54] - 2020-01-29
+
+### Added
+
+* Added `BIO_CTRL_DGRAM_QUERY_MTU`.
+* Added `EVP_EncryptInit_ex`, `EVP_EncryptFinal_ex`, `EVP_DecryptInit_ex`, and `EVP_DecryptFinal_ex`.
+* Added `EVP_md_null`.
+* Added `EVP_PKCS82PKEY`.
+* Added `PKCS8_PRIV_KEY_INFO`, `d2i_PKCS8_PRIV_KEY_INFO`, and `PKCS8_PRIV_KEY_INFO_free`.
+* Added `SSL_OP_NO_RENEGOTIATION`.
+
+## [v0.9.53] - 2019-11-22
+
+### Added
+
+* Added `ASN1_TIME_diff`.
+* Added `EC_GROUP_order_bits`.
+* Added `EVP_EncodeBlock` and `EVP_DecodeBlock`.
+* Added `SSL_CTRL_SET_GROUPS_LIST`, `SSL_CTRL_SET_SIGALGS_LIST`, `SSL_CTX_set1_groups_list`, and
+ `SSL_CTX_set1_sigalgs_list`.
+* Added `Clone` implementations to `SHA_CTX`, `SHA256_CTX`, and `SHA512_CTX`.
+
+## [v0.9.52] - 2019-10-19
+
+### Added
+
+* Added support for LibreSSL 3.0.x.
+
+## [v0.9.51] - 2019-10-02
+
+### Added
+
+* Added support for LibreSSL 3.0.1.
+
+## [v0.9.50] - 2019-10-02
+
+### Added
+
+* Added `CRYPTO_LOCK_EVP_PKEY`.
+* Added `EVP_PKEY_ED25519` and `EVP_PKEY_ED448`.
+* Added `EVP_DigestSign` and `EVP_DigestVerify`.
+* Added `EVP_PKEY_up_ref`.
+* Added `NID_ED25519` and `NID_ED448`.
+
+## [v0.9.49] - 2019-08-15
+
+### Added
+
+* Added support for LibreSSL 3.0.0.
+
+## [v0.9.48] - 2019-07-19
+
+### Added
+
+* Added `AES_wrap_key` and `AES_unwrap_key`.
+* Added `EC_GROUP_get_cofactor`, `EC_GROUP_get0_generator`, and `EC_POINT_dup`.
+* Added `EVP_aes_128_ofb`, `EVP_aes_192_ecb`, `EVP_aes_192_cbc`, `EVP_aes_192_cfb1`, `EVP_aes_192_cfb8`,
+ `EVP_aes_192_cfb_128`, `EVP_aes_192_ctr`, `EVP_aes_192_ccm`, `EVP_aes_192_gcm`, `EVP_aes_192_ofb`, and
+ `EVP_aes_256_ofb`.
+* Added `PEM_read_bio_CMS` and `PEM_write_bio_CMS`.
+
+## [v0.9.47] - 2019-05-18
+
+### Added
+
+* Added `SSL_CTX_add_client_CA`.
+
+## [v0.9.46] - 2019-05-08
+
+### Added
+
+* Added support for the LibreSSL 2.9.x series.
+
+## [v0.9.45] - 2019-05-03
+
+### Fixed
+
+* Reverted a change to windows-gnu library names that caused regressions.
+
+## [v0.9.44] - 2019-04-30
+
+### Added
+
+* The `DEP_OPENSSL_VENDORED` environment variable tells downstream build scripts if the vendored feature was enabled.
+* Added `EVP_SealInit`, `EVP_SealFinal`, `EVP_EncryptUpdate`, `EVP_OpenInit`, `EVP_OpenFinal`, and `EVP_DecryptUpdate`.
+* Added `EVP_PKEY_size`.
+
+### Fixed
+
+* Fixed library names when targeting windows-gnu and pkg-config fails.
+
+## [v0.9.43] - 2019-03-20
+
+### Added
+
+* Added `d2i_CMS_ContentInfo` and `CMS_encrypt`.
+* Added `X509_verify` and `X509_REQ_verify`.
+* Added `EVP_MD_type` and `EVP_GROUP_get_curve_name`.
+
+[Unreleased]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.82..master
+[v0.9.82]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.81...openssl-sys-v0.9.82
+[v0.9.81]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.80...openssl-sys-v0.9.81
+[v0.9.80]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.79...openssl-sys-v0.9.80
+[v0.9.79]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.78...openssl-sys-v0.9.79
+[v0.9.78]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.77...openssl-sys-v0.9.78
+[v0.9.77]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.76...openssl-sys-v0.9.77
+[v0.9.76]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.75...openssl-sys-v0.9.76
+[v0.9.75]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.74...openssl-sys-v0.9.75
+[v0.9.74]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.73...openssl-sys-v0.9.74
+[v0.9.73]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.72...openssl-sys-v0.9.73
+[v0.9.72]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.71...openssl-sys-v0.9.72
+[v0.9.71]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.70...openssl-sys-v0.9.71
+[v0.9.70]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.69...openssl-sys-v0.9.70
+[v0.9.69]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.68...openssl-sys-v0.9.69
+[v0.9.68]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.67...openssl-sys-v0.9.68
+[v0.9.67]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.66...openssl-sys-v0.9.67
+[v0.9.66]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.65...openssl-sys-v0.9.66
+[v0.9.65]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.64...openssl-sys-v0.9.65
+[v0.9.64]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.63...openssl-sys-v0.9.64
+[v0.9.63]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.62...openssl-sys-v0.9.63
+[v0.9.62]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.61...openssl-sys-v0.9.62
+[v0.9.61]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.60...openssl-sys-v0.9.61
+[v0.9.60]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.59...openssl-sys-v0.9.60
+[v0.9.59]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.58...openssl-sys-v0.9.59
+[v0.9.58]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.57...openssl-sys-v0.9.58
+[v0.9.57]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.56...openssl-sys-v0.9.57
+[v0.9.56]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.55...openssl-sys-v0.9.56
+[v0.9.55]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.54...openssl-sys-v0.9.55
+[v0.9.54]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.53...openssl-sys-v0.9.54
+[v0.9.53]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.52...openssl-sys-v0.9.53
+[v0.9.52]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.51...openssl-sys-v0.9.52
+[v0.9.51]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.50...openssl-sys-v0.9.51
+[v0.9.50]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.49...openssl-sys-v0.9.50
+[v0.9.49]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.48...openssl-sys-v0.9.49
+[v0.9.48]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.47...openssl-sys-v0.9.48
+[v0.9.47]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.46...openssl-sys-v0.9.47
+[v0.9.46]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.45...openssl-sys-v0.9.46
+[v0.9.45]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.44...openssl-sys-v0.9.45
+[v0.9.44]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.43...openssl-sys-v0.9.44
+[v0.9.43]: https://github.com/sfackler/rust-openssl/compare/openssl-sys-v0.9.42...openssl-sys-v0.9.43
diff --git a/openssl-sys/Cargo.toml b/openssl-sys/Cargo.toml
index 01d6359..ed3161c 100644
--- a/openssl-sys/Cargo.toml
+++ b/openssl-sys/Cargo.toml
@@ -1,25 +1,36 @@
[package]
name = "openssl-sys"
-version = "0.9.23"
-authors = ["Alex Crichton ",
- "Steven Fackler "]
+version = "0.9.82"
+authors = [
+ "Alex Crichton ",
+ "Steven Fackler ",
+]
license = "MIT"
description = "FFI bindings to OpenSSL"
repository = "https://github.com/sfackler/rust-openssl"
readme = "README.md"
categories = ["cryptography", "external-ffi-bindings"]
links = "openssl"
-build = "build.rs"
+build = "build/main.rs"
+edition = "2018"
+
+[features]
+vendored = ['openssl-src']
+unstable_boringssl = ['bssl-sys']
[dependencies]
libc = "0.2"
+bssl-sys = { version = "0.1.0", optional = true }
[build-dependencies]
-pkg-config = "0.3.9"
+bindgen = { version = "0.64.0", optional = true, features = ["experimental"] }
cc = "1.0"
+openssl-src = { version = "111", optional = true }
+pkg-config = "0.3.9"
+autocfg = "1.0"
[target.'cfg(target_env = "msvc")'.build-dependencies]
-vcpkg = "0.2"
+vcpkg = "0.2.8"
# We don't actually use metadeps for annoying reasons but this is still here for tooling
[package.metadata.pkg-config]
diff --git a/openssl-sys/README.md b/openssl-sys/README.md
deleted file mode 120000
index 32d46ee..0000000
--- a/openssl-sys/README.md
+++ /dev/null
@@ -1 +0,0 @@
-../README.md
\ No newline at end of file
diff --git a/openssl-sys/README.md b/openssl-sys/README.md
new file mode 100644
index 0000000..32d46ee
--- /dev/null
+++ b/openssl-sys/README.md
@@ -0,0 +1 @@
+../README.md
\ No newline at end of file
diff --git a/openssl-sys/build.rs b/openssl-sys/build.rs
deleted file mode 100644
index ff875be..0000000
--- a/openssl-sys/build.rs
+++ /dev/null
@@ -1,543 +0,0 @@
-extern crate pkg_config;
-#[cfg(target_env = "msvc")]
-extern crate vcpkg;
-extern crate cc;
-
-use std::collections::HashSet;
-use std::env;
-use std::ffi::OsString;
-use std::fs::File;
-use std::io::{BufWriter, Write};
-use std::path::{Path, PathBuf};
-use std::panic::{self, AssertUnwindSafe};
-use std::process::Command;
-
-// The set of `OPENSSL_NO_`s that we care about.
-const DEFINES: &'static [&'static str] = &[
- "OPENSSL_NO_BUF_FREELISTS",
- "OPENSSL_NO_COMP",
- "OPENSSL_NO_EC",
- "OPENSSL_NO_EC2M",
- "OPENSSL_NO_ENGINE",
- "OPENSSL_NO_KRB5",
- "OPENSSL_NO_NEXTPROTONEG",
- "OPENSSL_NO_PSK",
- "OPENSSL_NO_RFC3779",
- "OPENSSL_NO_SHA",
- "OPENSSL_NO_SRP",
- "OPENSSL_NO_SSL3_METHOD",
- "OPENSSL_NO_TLSEXT",
-];
-
-enum Version {
- Openssl110,
- Openssl102,
- Openssl101,
- Libressl,
-}
-
-fn env(name: &str) -> Option {
- let prefix = env::var("TARGET").unwrap().to_uppercase().replace("-", "_");
- let prefixed = format!("{}_{}", prefix, name);
- println!("cargo:rerun-if-env-changed={}", prefixed);
-
- if let Some(var) = env::var_os(&prefixed) {
- return Some(var);
- }
-
- println!("cargo:rerun-if-env-changed={}", name);
- env::var_os(name)
-}
-
-fn main() {
- let target = env::var("TARGET").unwrap();
-
- let lib_dir = env("OPENSSL_LIB_DIR").map(PathBuf::from);
- let include_dir = env("OPENSSL_INCLUDE_DIR").map(PathBuf::from);
-
- let (lib_dir, include_dir) = if lib_dir.is_none() || include_dir.is_none() {
- let openssl_dir = env("OPENSSL_DIR").unwrap_or_else(|| find_openssl_dir(&target));
- let openssl_dir = Path::new(&openssl_dir);
- let lib_dir = lib_dir.unwrap_or_else(|| openssl_dir.join("lib"));
- let include_dir = include_dir.unwrap_or_else(|| openssl_dir.join("include"));
- (lib_dir, include_dir)
- } else {
- (lib_dir.unwrap(), include_dir.unwrap())
- };
-
- if !Path::new(&lib_dir).exists() {
- panic!(
- "OpenSSL library directory does not exist: {}",
- lib_dir.to_string_lossy()
- );
- }
- if !Path::new(&include_dir).exists() {
- panic!(
- "OpenSSL include directory does not exist: {}",
- include_dir.to_string_lossy()
- );
- }
-
- println!(
- "cargo:rustc-link-search=native={}",
- lib_dir.to_string_lossy()
- );
- println!("cargo:include={}", include_dir.to_string_lossy());
-
- let version = validate_headers(&[include_dir.clone().into()]);
-
- let libs_env = env("OPENSSL_LIBS");
- let libs = match libs_env.as_ref().and_then(|s| s.to_str()) {
- Some(ref v) => v.split(":").collect(),
- None => {
- match version {
- Version::Openssl101 |
- Version::Openssl102 if target.contains("windows") => vec!["ssleay32", "libeay32"],
- Version::Openssl110 if target.contains("windows") => vec!["libssl", "libcrypto"],
- _ => vec!["ssl", "crypto"],
- }
- }
- };
-
-
- let kind = determine_mode(Path::new(&lib_dir), &libs);
- for lib in libs.into_iter() {
- println!("cargo:rustc-link-lib={}={}", kind, lib);
- }
-}
-
-fn find_openssl_dir(target: &str) -> OsString {
- let host = env::var("HOST").unwrap();
-
- if host.contains("apple-darwin") && target.contains("apple-darwin") {
- let homebrew = Path::new("/usr/local/opt/openssl@1.1");
- if homebrew.exists() {
- return homebrew.to_path_buf().into();
- }
- let homebrew = Path::new("/usr/local/opt/openssl");
- if homebrew.exists() {
- return homebrew.to_path_buf().into();
- }
- }
-
- try_pkg_config();
- try_vcpkg();
-
- let mut msg = format!(
- "
-
-Could not find directory of OpenSSL installation, and this `-sys` crate cannot
-proceed without this knowledge. If OpenSSL is installed and this crate had
-trouble finding it, you can set the `OPENSSL_DIR` environment variable for the
-compilation process.
-
-If you're in a situation where you think the directory *should* be found
-automatically, please open a bug at https://github.com/sfackler/rust-openssl
-and include information about your system as well as this message.
-
- $HOST = {}
- $TARGET = {}
- openssl-sys = {}
-
-",
- host,
- target,
- env!("CARGO_PKG_VERSION")
- );
-
- if host.contains("apple-darwin") && target.contains("apple-darwin") {
- let system = Path::new("/usr/lib/libssl.0.9.8.dylib");
- if system.exists() {
- msg.push_str(&format!(
- "
-
-It looks like you're compiling on macOS, where the system contains a version of
-OpenSSL 0.9.8. This crate no longer supports OpenSSL 0.9.8.
-
-As a consumer of this crate, you can fix this error by using Homebrew to
-install the `openssl` package, or as a maintainer you can use the openssl-sys
-0.7 crate for support with OpenSSL 0.9.8.
-
-Unfortunately though the compile cannot continue, so aborting.
-
-"
- ));
- }
- }
-
- if host.contains("unknown-linux") && target.contains("unknown-linux-gnu") {
- if Command::new("pkg-config").output().is_err() {
- msg.push_str(&format!(
- "
-It looks like you're compiling on Linux and also targeting Linux. Currently this
-requires the `pkg-config` utility to find OpenSSL but unfortunately `pkg-config`
-could not be found. If you have OpenSSL installed you can likely fix this by
-installing `pkg-config`.
-
-"
- ));
- }
- }
-
- if host.contains("windows") && target.contains("windows-gnu") {
- msg.push_str(&format!(
- "
-It looks like you're compiling for MinGW but you may not have either OpenSSL or
-pkg-config installed. You can install these two dependencies with:
-
- pacman -S openssl-devel pkg-config
-
-and try building this crate again.
-
-"
- ));
- }
-
- if host.contains("windows") && target.contains("windows-msvc") {
- msg.push_str(&format!(
- "
-It looks like you're compiling for MSVC but we couldn't detect an OpenSSL
-installation. If there isn't one installed then you can try the rust-openssl
-README for more information about how to download precompiled binaries of
-OpenSSL:
-
- https://github.com/sfackler/rust-openssl#windows
-
-"
- ));
- }
-
- panic!(msg);
-}
-
-/// Attempt to find OpenSSL through pkg-config.
-///
-/// Note that if this succeeds then the function does not return as pkg-config
-/// typically tells us all the information that we need.
-fn try_pkg_config() {
- let target = env::var("TARGET").unwrap();
- let host = env::var("HOST").unwrap();
-
- // If we're going to windows-gnu we can use pkg-config, but only so long as
- // we're coming from a windows host.
- //
- // Otherwise if we're going to windows we probably can't use pkg-config.
- if target.contains("windows-gnu") && host.contains("windows") {
- env::set_var("PKG_CONFIG_ALLOW_CROSS", "1");
- } else if target.contains("windows") {
- return;
- }
-
- let lib = match pkg_config::Config::new().print_system_libs(false).find(
- "openssl",
- ) {
- Ok(lib) => lib,
- Err(e) => {
- println!("run pkg_config fail: {:?}", e);
- return;
- }
- };
-
- validate_headers(&lib.include_paths);
-
- for include in lib.include_paths.iter() {
- println!("cargo:include={}", include.display());
- }
-
- std::process::exit(0);
-}
-
-/// Attempt to find OpenSSL through vcpkg.
-///
-/// Note that if this succeeds then the function does not return as vcpkg
-/// should emit all of the cargo metadata that we need.
-#[cfg(target_env = "msvc")]
-fn try_vcpkg() {
-
- // vcpkg will not emit any metadata if it can not find libraries
- // appropriate for the target triple with the desired linkage.
-
- let mut lib = vcpkg::Config::new()
- .emit_includes(true)
- .lib_name("libcrypto")
- .lib_name("libssl")
- .probe("openssl");
-
- if let Err(e) = lib {
- println!("note: vcpkg did not find openssl as libcrypto and libssl : {:?}",
- e);
- lib = vcpkg::Config::new()
- .emit_includes(true)
- .lib_name("libeay32")
- .lib_name("ssleay32")
- .probe("openssl");
- }
- if let Err(e) = lib {
- println!("note: vcpkg did not find openssl as ssleay32 and libeay32: {:?}",
- e);
- return;
- }
-
- let lib = lib.unwrap();
- validate_headers(&lib.include_paths);
-
- println!("cargo:rustc-link-lib=user32");
- println!("cargo:rustc-link-lib=gdi32");
- println!("cargo:rustc-link-lib=crypt32");
-
- std::process::exit(0);
-}
-
-#[cfg(not(target_env = "msvc"))]
-fn try_vcpkg() {}
-
-/// Validates the header files found in `include_dir` and then returns the
-/// version string of OpenSSL.
-fn validate_headers(include_dirs: &[PathBuf]) -> Version {
- // This `*-sys` crate only works with OpenSSL 1.0.1, 1.0.2, and 1.1.0. To
- // correctly expose the right API from this crate, take a look at
- // `opensslv.h` to see what version OpenSSL claims to be.
- //
- // OpenSSL has a number of build-time configuration options which affect
- // various structs and such. Since OpenSSL 1.1.0 this isn't really a problem
- // as the library is much more FFI-friendly, but 1.0.{1,2} suffer this problem.
- //
- // To handle all this conditional compilation we slurp up the configuration
- // file of OpenSSL, `opensslconf.h`, and then dump out everything it defines
- // as our own #[cfg] directives. That way the `ossl10x.rs` bindings can
- // account for compile differences and such.
- let mut path = PathBuf::from(env::var_os("OUT_DIR").unwrap());
- path.push("expando.c");
- let mut file = BufWriter::new(File::create(&path).unwrap());
-
- write!(
- file,
- "\
-#include
-#include
-
-#if LIBRESSL_VERSION_NUMBER >= 0x20700000
-RUST_LIBRESSL_NEW
-#elif LIBRESSL_VERSION_NUMBER >= 0x20603000
-RUST_LIBRESSL_26X
-#elif LIBRESSL_VERSION_NUMBER >= 0x20602000
-RUST_LIBRESSL_262
-#elif LIBRESSL_VERSION_NUMBER >= 0x20601000
-RUST_LIBRESSL_261
-#elif LIBRESSL_VERSION_NUMBER >= 0x20600000
-RUST_LIBRESSL_260
-#elif LIBRESSL_VERSION_NUMBER >= 0x20503000
-RUST_LIBRESSL_25X
-#elif LIBRESSL_VERSION_NUMBER >= 0x20502000
-RUST_LIBRESSL_252
-#elif LIBRESSL_VERSION_NUMBER >= 0x20501000
-RUST_LIBRESSL_251
-#elif LIBRESSL_VERSION_NUMBER >= 0x20500000
-RUST_LIBRESSL_250
-#elif defined (LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x20500000
-RUST_LIBRESSL_OLD
-#elif OPENSSL_VERSION_NUMBER >= 0x10101000
-RUST_OPENSSL_NEW
-#elif OPENSSL_VERSION_NUMBER >= 0x10100060
-RUST_OPENSSL_110F
-#elif OPENSSL_VERSION_NUMBER >= 0x10100000
-RUST_OPENSSL_110
-#elif OPENSSL_VERSION_NUMBER >= 0x10002000
-RUST_OPENSSL_102
-#elif OPENSSL_VERSION_NUMBER >= 0x10001000
-RUST_OPENSSL_101
-#else
-RUST_OPENSSL_OLD
-#endif
-"
- ).unwrap();
-
- for define in DEFINES {
- write!(
- file,
- "\
-#ifdef {define}
-RUST_{define}_RUST
-#endif
-",
- define = define
- ).unwrap();
- }
-
- file.flush().unwrap();
- drop(file);
-
- let mut gcc = cc::Build::new();
- for include_dir in include_dirs {
- gcc.include(include_dir);
- }
- // https://github.com/alexcrichton/gcc-rs/issues/133
- let expanded = match panic::catch_unwind(AssertUnwindSafe(|| gcc.file(&path).expand())) {
- Ok(expanded) => expanded,
- Err(_) => {
- panic!(
- "
-Failed to find OpenSSL development headers.
-
-You can try fixing this setting the `OPENSSL_DIR` environment variable
-pointing to your OpenSSL installation or installing OpenSSL headers package
-specific to your distribution:
-
- # On Ubuntu
- sudo apt-get install libssl-dev
- # On Arch Linux
- sudo pacman -S openssl
- # On Fedora
- sudo dnf install openssl-devel
-
-See rust-openssl README for more information:
-
- https://github.com/sfackler/rust-openssl#linux
-"
- );
- }
- };
- let expanded = String::from_utf8(expanded).unwrap();
-
- let mut enabled = vec![];
- for &define in DEFINES {
- if expanded.contains(&format!("RUST_{}_RUST", define)) {
- println!("cargo:rustc-cfg=osslconf=\"{}\"", define);
- enabled.push(define);
- }
- }
- println!("cargo:conf={}", enabled.join(","));
-
- if expanded.contains("RUST_LIBRESSL_250") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl250");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=250");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_251") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl251");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=251");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_252") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl252");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=252");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_25X") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl25x");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=25x");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_260") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl260");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=260");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_261") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl261");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=261");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_262") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl262");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=262");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_LIBRESSL_26X") {
- println!("cargo:rustc-cfg=libressl");
- println!("cargo:rustc-cfg=libressl26x");
- println!("cargo:libressl=true");
- println!("cargo:libressl_version=26x");
- println!("cargo:version=101");
- Version::Libressl
- } else if expanded.contains("RUST_OPENSSL_110F") {
- println!("cargo:rustc-cfg=ossl110");
- println!("cargo:rustc-cfg=ossl110f");
- println!("cargo:version=110");
- println!("cargo:patch=f");
- Version::Openssl110
- } else if expanded.contains("RUST_OPENSSL_110") {
- println!("cargo:rustc-cfg=ossl110");
- println!("cargo:version=110");
- Version::Openssl110
- } else if expanded.contains("RUST_OPENSSL_102") {
- println!("cargo:rustc-cfg=ossl102");
- println!("cargo:version=102");
- Version::Openssl102
- } else if expanded.contains("RUST_OPENSSL_101") {
- println!("cargo:rustc-cfg=ossl101");
- println!("cargo:version=101");
- Version::Openssl101
- } else {
- panic!(
- "
-
-This crate is only compatible with OpenSSL 1.0.1, 1.0.2, and 1.1.0, or LibreSSL
-2.5 and 2.6.0, but a different version of OpenSSL was found. The build is now
-aborting due to this version mismatch.
-
-"
- );
- }
-}
-
-/// Given a libdir for OpenSSL (where artifacts are located) as well as the name
-/// of the libraries we're linking to, figure out whether we should link them
-/// statically or dynamically.
-fn determine_mode(libdir: &Path, libs: &[&str]) -> &'static str {
- // First see if a mode was explicitly requested
- let kind = env("OPENSSL_STATIC");
- match kind.as_ref().and_then(|s| s.to_str()).map(|s| &s[..]) {
- Some("0") => return "dylib",
- Some(_) => return "static",
- None => {}
- }
-
- // Next, see what files we actually have to link against, and see what our
- // possibilities even are.
- let files = libdir
- .read_dir()
- .unwrap()
- .map(|e| e.unwrap())
- .map(|e| e.file_name())
- .filter_map(|e| e.into_string().ok())
- .collect::>();
- let can_static = libs.iter().all(|l| {
- files.contains(&format!("lib{}.a", l)) || files.contains(&format!("{}.lib", l))
- });
- let can_dylib = libs.iter().all(|l| {
- files.contains(&format!("lib{}.so", l)) || files.contains(&format!("{}.dll", l)) ||
- files.contains(&format!("lib{}.dylib", l))
- });
- match (can_static, can_dylib) {
- (true, false) => return "static",
- (false, true) => return "dylib",
- (false, false) => {
- panic!(
- "OpenSSL libdir at `{}` does not contain the required files \
- to either statically or dynamically link OpenSSL",
- libdir.display()
- );
- }
- (true, true) => {}
- }
-
- // Ok, we've got not explicit preference and can *either* link statically or
- // link dynamically. In the interest of "security upgrades" and/or "best
- // practices with security libs", let's link dynamically.
- "dylib"
-}
diff --git a/openssl-sys/build/cfgs.rs b/openssl-sys/build/cfgs.rs
new file mode 100644
index 0000000..d925d90
--- /dev/null
+++ b/openssl-sys/build/cfgs.rs
@@ -0,0 +1,94 @@
+pub fn get(openssl_version: Option, libressl_version: Option) -> Vec<&'static str> {
+ let mut cfgs = vec![];
+
+ if let Some(libressl_version) = libressl_version {
+ cfgs.push("libressl");
+
+ if libressl_version >= 0x2_05_01_00_0 {
+ cfgs.push("libressl251");
+ }
+ if libressl_version >= 0x2_05_02_00_0 {
+ cfgs.push("libressl252");
+ }
+ if libressl_version >= 0x2_06_01_00_0 {
+ cfgs.push("libressl261");
+ }
+ if libressl_version >= 0x2_07_00_00_0 {
+ cfgs.push("libressl270");
+ }
+ if libressl_version >= 0x2_07_01_00_0 {
+ cfgs.push("libressl271");
+ }
+ if libressl_version >= 0x2_07_03_00_0 {
+ cfgs.push("libressl273");
+ }
+ if libressl_version >= 0x2_08_00_00_0 {
+ cfgs.push("libressl280");
+ }
+ if libressl_version >= 0x2_08_01_00_0 {
+ cfgs.push("libressl281");
+ }
+ if libressl_version >= 0x2_09_01_00_0 {
+ cfgs.push("libressl291");
+ }
+ if libressl_version >= 0x3_02_01_00_0 {
+ cfgs.push("libressl321");
+ }
+ if libressl_version >= 0x3_03_02_00_0 {
+ cfgs.push("libressl332");
+ }
+ if libressl_version >= 0x3_04_00_00_0 {
+ cfgs.push("libressl340");
+ }
+ if libressl_version >= 0x3_05_00_00_0 {
+ cfgs.push("libressl350");
+ }
+ if libressl_version >= 0x3_06_00_00_0 {
+ cfgs.push("libressl360");
+ }
+ if libressl_version >= 0x3_07_00_00_0 {
+ cfgs.push("libressl370");
+ }
+ } else {
+ let openssl_version = openssl_version.unwrap();
+
+ if openssl_version >= 0x3_00_00_00_0 {
+ cfgs.push("ossl300");
+ }
+ if openssl_version >= 0x1_00_01_00_0 {
+ cfgs.push("ossl101");
+ }
+ if openssl_version >= 0x1_00_02_00_0 {
+ cfgs.push("ossl102");
+ }
+ if openssl_version >= 0x1_00_02_06_0 {
+ cfgs.push("ossl102f");
+ }
+ if openssl_version >= 0x1_00_02_08_0 {
+ cfgs.push("ossl102h");
+ }
+ if openssl_version >= 0x1_01_00_00_0 {
+ cfgs.push("ossl110");
+ }
+ if openssl_version >= 0x1_01_00_06_0 {
+ cfgs.push("ossl110f");
+ }
+ if openssl_version >= 0x1_01_00_07_0 {
+ cfgs.push("ossl110g");
+ }
+ if openssl_version >= 0x1_01_00_08_0 {
+ cfgs.push("ossl110h");
+ }
+ if openssl_version >= 0x1_01_01_00_0 {
+ cfgs.push("ossl111");
+ }
+ if openssl_version >= 0x1_01_01_02_0 {
+ cfgs.push("ossl111b");
+ }
+ if openssl_version >= 0x1_01_01_03_0 {
+ cfgs.push("ossl111c");
+ }
+ }
+
+ cfgs
+}
diff --git a/openssl-sys/build/expando.c b/openssl-sys/build/expando.c
new file mode 100644
index 0000000..11fb04d
--- /dev/null
+++ b/openssl-sys/build/expando.c
@@ -0,0 +1,124 @@
+#include
+#include
+
+#define VERSION2(n, v) RUST_VERSION_##n##_##v
+#define VERSION(n, v) VERSION2(n, v)
+
+#define NEW_VERSION2(a, b, c) RUST_VERSION_NEW_OPENSSL_##a##_##b##_##c
+#define NEW_VERSION(a, b, c) NEW_VERSION2(a, b, c)
+
+#ifdef LIBRESSL_VERSION_NUMBER
+VERSION(LIBRESSL, LIBRESSL_VERSION_NUMBER)
+#elif defined OPENSSL_VERSION_MAJOR
+NEW_VERSION(OPENSSL_VERSION_MAJOR, OPENSSL_VERSION_MINOR, OPENSSL_VERSION_PATCH)
+#else
+VERSION(OPENSSL, OPENSSL_VERSION_NUMBER)
+#endif
+
+#ifdef OPENSSL_IS_BORINGSSL
+RUST_OPENSSL_IS_BORINGSSL
+#endif
+
+#ifdef OPENSSL_NO_BF
+RUST_CONF_OPENSSL_NO_BF
+#endif
+
+#ifdef OPENSSL_NO_BUF_FREELISTS
+RUST_CONF_OPENSSL_NO_BUF_FREELISTS
+#endif
+
+#ifdef OPENSSL_NO_CHACHA
+RUST_CONF_OPENSSL_NO_CHACHA
+#endif
+
+#ifdef OPENSSL_NO_IDEA
+RUST_CONF_OPENSSL_NO_IDEA
+#endif
+
+#ifdef OPENSSL_NO_CAMELLIA
+RUST_CONF_OPENSSL_NO_CAMELLIA
+#endif
+
+#ifdef OPENSSL_NO_CAST
+RUST_CONF_OPENSSL_NO_CAST
+#endif
+
+#ifdef OPENSSL_NO_CMS
+RUST_CONF_OPENSSL_NO_CMS
+#endif
+
+#ifdef OPENSSL_NO_COMP
+RUST_CONF_OPENSSL_NO_COMP
+#endif
+
+#ifdef OPENSSL_NO_EC
+RUST_CONF_OPENSSL_NO_EC
+#endif
+
+#ifdef OPENSSL_NO_EC2M
+RUST_CONF_OPENSSL_NO_EC2M
+#endif
+
+#ifdef OPENSSL_NO_ENGINE
+RUST_CONF_OPENSSL_NO_ENGINE
+#endif
+
+#ifdef OPENSSL_NO_KRB5
+RUST_CONF_OPENSSL_NO_KRB5
+#endif
+
+#ifdef OPENSSL_NO_NEXTPROTONEG
+RUST_CONF_OPENSSL_NO_NEXTPROTONEG
+#endif
+
+#ifdef OPENSSL_NO_OCSP
+RUST_CONF_OPENSSL_NO_OCSP
+#endif
+
+#ifdef OPENSSL_NO_PSK
+RUST_CONF_OPENSSL_NO_PSK
+#endif
+
+#ifdef OPENSSL_NO_RFC3779
+RUST_CONF_OPENSSL_NO_RFC3779
+#endif
+
+#ifdef OPENSSL_NO_RMD160
+RUST_CONF_OPENSSL_NO_RMD160
+#endif
+
+#ifdef OPENSSL_NO_SHA
+RUST_CONF_OPENSSL_NO_SHA
+#endif
+
+#ifdef OPENSSL_NO_SRP
+RUST_CONF_OPENSSL_NO_SRP
+#endif
+
+#ifdef OPENSSL_NO_SSL3_METHOD
+RUST_CONF_OPENSSL_NO_SSL3_METHOD
+#endif
+
+#ifdef OPENSSL_NO_TLSEXT
+RUST_CONF_OPENSSL_NO_TLSEXT
+#endif
+
+#ifdef OPENSSL_NO_STDIO
+RUST_CONF_OPENSSL_NO_STDIO
+#endif
+
+#ifdef OPENSSL_NO_SM3
+RUST_CONF_OPENSSL_NO_SM3
+#endif
+
+#ifdef OPENSSL_NO_SM4
+RUST_CONF_OPENSSL_NO_SM4
+#endif
+
+#ifdef OPENSSL_NO_DEPRECATED_3_0
+RUST_CONF_OPENSSL_NO_DEPRECATED_3_0
+#endif
+
+#ifdef OPENSSL_NO_SEED
+RUST_CONF_OPENSSL_NO_SEED
+#endif
diff --git a/openssl-sys/build/find_normal.rs b/openssl-sys/build/find_normal.rs
new file mode 100644
index 0000000..791fc33
--- /dev/null
+++ b/openssl-sys/build/find_normal.rs
@@ -0,0 +1,275 @@
+use std::ffi::OsString;
+use std::path::{Path, PathBuf};
+use std::process::{self, Command};
+
+use super::env;
+
+pub fn get_openssl(target: &str) -> (Vec, PathBuf) {
+ let lib_dir = env("OPENSSL_LIB_DIR").map(PathBuf::from);
+ let include_dir = env("OPENSSL_INCLUDE_DIR").map(PathBuf::from);
+
+ match (lib_dir, include_dir) {
+ (Some(lib_dir), Some(include_dir)) => (vec![lib_dir], include_dir),
+ (lib_dir, include_dir) => {
+ let openssl_dir = env("OPENSSL_DIR").unwrap_or_else(|| find_openssl_dir(target));
+ let openssl_dir = Path::new(&openssl_dir);
+ let lib_dir = lib_dir.map(|d| vec![d]).unwrap_or_else(|| {
+ let mut lib_dirs = vec![];
+ // OpenSSL 3.0 now puts it's libraries in lib64/ by default,
+ // check for both it and lib/.
+ if openssl_dir.join("lib64").exists() {
+ lib_dirs.push(openssl_dir.join("lib64"));
+ }
+ if openssl_dir.join("lib").exists() {
+ lib_dirs.push(openssl_dir.join("lib"));
+ }
+ lib_dirs
+ });
+ let include_dir = include_dir.unwrap_or_else(|| openssl_dir.join("include"));
+ (lib_dir, include_dir)
+ }
+ }
+}
+
+fn resolve_with_wellknown_homebrew_location(dir: &str) -> Option {
+ let versions = ["openssl@3", "openssl@1.1"];
+
+ // Check up default aarch 64 Homebrew installation location first
+ // for quick resolution if possible.
+ // `pkg-config` on brew doesn't necessarily contain settings for openssl apparently.
+ for version in &versions {
+ let homebrew = Path::new(dir).join(format!("opt/{}", version));
+ if homebrew.exists() {
+ return Some(homebrew);
+ }
+ }
+
+ for version in &versions {
+ // Calling `brew --prefix ` command usually slow and
+ // takes seconds, and will be used only as a last resort.
+ let output = execute_command_and_get_output("brew", &["--prefix", version]);
+ if let Some(ref output) = output {
+ let homebrew = Path::new(&output);
+ if homebrew.exists() {
+ return Some(homebrew.to_path_buf());
+ }
+ }
+ }
+
+ None
+}
+
+fn resolve_with_wellknown_location(dir: &str) -> Option {
+ let root_dir = Path::new(dir);
+ let include_openssl = root_dir.join("include/openssl");
+ if include_openssl.exists() {
+ Some(root_dir.to_path_buf())
+ } else {
+ None
+ }
+}
+
+fn find_openssl_dir(target: &str) -> OsString {
+ let host = env::var("HOST").unwrap();
+
+ if host == target && target.ends_with("-apple-darwin") {
+ let homebrew_dir = match target {
+ "aarch64-apple-darwin" => "/opt/homebrew",
+ _ => "/usr/local",
+ };
+
+ if let Some(dir) = resolve_with_wellknown_homebrew_location(homebrew_dir) {
+ return dir.into();
+ } else if let Some(dir) = resolve_with_wellknown_location("/opt/pkg") {
+ // pkgsrc
+ return dir.into();
+ } else if let Some(dir) = resolve_with_wellknown_location("/opt/local") {
+ // MacPorts
+ return dir.into();
+ }
+ }
+
+ try_pkg_config();
+ try_vcpkg();
+
+ // FreeBSD ships with OpenSSL but doesn't include a pkg-config file :(
+ if host == target && target.contains("freebsd") {
+ return OsString::from("/usr");
+ }
+
+ // DragonFly has libressl (or openssl) in ports, but this doesn't include a pkg-config file
+ if host == target && target.contains("dragonfly") {
+ return OsString::from("/usr/local");
+ }
+
+ let mut msg = format!(
+ "
+
+Could not find directory of OpenSSL installation, and this `-sys` crate cannot
+proceed without this knowledge. If OpenSSL is installed and this crate had
+trouble finding it, you can set the `OPENSSL_DIR` environment variable for the
+compilation process.
+
+Make sure you also have the development packages of openssl installed.
+For example, `libssl-dev` on Ubuntu or `openssl-devel` on Fedora.
+
+If you're in a situation where you think the directory *should* be found
+automatically, please open a bug at https://github.com/sfackler/rust-openssl
+and include information about your system as well as this message.
+
+$HOST = {}
+$TARGET = {}
+openssl-sys = {}
+
+",
+ host,
+ target,
+ env!("CARGO_PKG_VERSION")
+ );
+
+ if host.contains("apple-darwin") && target.contains("apple-darwin") {
+ let system = Path::new("/usr/lib/libssl.0.9.8.dylib");
+ if system.exists() {
+ msg.push_str(
+ "
+
+openssl-sys crate build failed: no supported version of OpenSSL found.
+
+Ways to fix it:
+- Use the `vendored` feature of openssl-sys crate to build OpenSSL from source.
+- Use Homebrew to install the `openssl` package.
+
+",
+ );
+ }
+ }
+
+ if host.contains("unknown-linux")
+ && target.contains("unknown-linux-gnu")
+ && Command::new("pkg-config").output().is_err()
+ {
+ msg.push_str(
+ "
+It looks like you're compiling on Linux and also targeting Linux. Currently this
+requires the `pkg-config` utility to find OpenSSL but unfortunately `pkg-config`
+could not be found. If you have OpenSSL installed you can likely fix this by
+installing `pkg-config`.
+
+",
+ );
+ }
+
+ if host.contains("windows") && target.contains("windows-gnu") {
+ msg.push_str(
+ "
+It looks like you're compiling for MinGW but you may not have either OpenSSL or
+pkg-config installed. You can install these two dependencies with:
+
+pacman -S openssl-devel pkg-config
+
+and try building this crate again.
+
+",
+ );
+ }
+
+ if host.contains("windows") && target.contains("windows-msvc") {
+ msg.push_str(
+ "
+It looks like you're compiling for MSVC but we couldn't detect an OpenSSL
+installation. If there isn't one installed then you can try the rust-openssl
+README for more information about how to download precompiled binaries of
+OpenSSL:
+
+https://github.com/sfackler/rust-openssl#windows
+
+",
+ );
+ }
+
+ panic!("{}", msg);
+}
+
+/// Attempt to find OpenSSL through pkg-config.
+///
+/// Note that if this succeeds then the function does not return as pkg-config
+/// typically tells us all the information that we need.
+fn try_pkg_config() {
+ let target = env::var("TARGET").unwrap();
+ let host = env::var("HOST").unwrap();
+
+ // If we're going to windows-gnu we can use pkg-config, but only so long as
+ // we're coming from a windows host.
+ //
+ // Otherwise if we're going to windows we probably can't use pkg-config.
+ if target.contains("windows-gnu") && host.contains("windows") {
+ env::set_var("PKG_CONFIG_ALLOW_CROSS", "1");
+ } else if target.contains("windows") {
+ return;
+ }
+
+ let lib = match pkg_config::Config::new()
+ .print_system_libs(false)
+ .probe("openssl")
+ {
+ Ok(lib) => lib,
+ Err(e) => {
+ println!("run pkg_config fail: {:?}", e);
+ return;
+ }
+ };
+
+ super::postprocess(&lib.include_paths);
+
+ for include in lib.include_paths.iter() {
+ println!("cargo:include={}", include.display());
+ }
+
+ process::exit(0);
+}
+
+/// Attempt to find OpenSSL through vcpkg.
+///
+/// Note that if this succeeds then the function does not return as vcpkg
+/// should emit all of the cargo metadata that we need.
+#[cfg(target_env = "msvc")]
+fn try_vcpkg() {
+ // vcpkg will not emit any metadata if it can not find libraries
+ // appropriate for the target triple with the desired linkage.
+
+ let lib = match vcpkg::Config::new()
+ .emit_includes(true)
+ .find_package("openssl")
+ {
+ Ok(lib) => lib,
+ Err(e) => {
+ println!("note: vcpkg did not find openssl: {}", e);
+ return;
+ }
+ };
+
+ super::postprocess(&lib.include_paths);
+
+ println!("cargo:rustc-link-lib=user32");
+ println!("cargo:rustc-link-lib=gdi32");
+ println!("cargo:rustc-link-lib=crypt32");
+
+ process::exit(0);
+}
+
+#[cfg(not(target_env = "msvc"))]
+fn try_vcpkg() {}
+
+fn execute_command_and_get_output(cmd: &str, args: &[&str]) -> Option {
+ let out = Command::new(cmd).args(args).output();
+ if let Ok(ref r1) = out {
+ if r1.status.success() {
+ let r2 = String::from_utf8(r1.stdout.clone());
+ if let Ok(r3) = r2 {
+ return Some(r3.trim().to_string());
+ }
+ }
+ }
+
+ None
+}
diff --git a/openssl-sys/build/find_vendored.rs b/openssl-sys/build/find_vendored.rs
new file mode 100644
index 0000000..c92b2bd
--- /dev/null
+++ b/openssl-sys/build/find_vendored.rs
@@ -0,0 +1,16 @@
+use openssl_src;
+use std::path::PathBuf;
+
+pub fn get_openssl(_target: &str) -> (Vec, PathBuf) {
+ let artifacts = openssl_src::Build::new().build();
+ println!("cargo:vendored=1");
+ println!(
+ "cargo:root={}",
+ artifacts.lib_dir().parent().unwrap().display()
+ );
+
+ (
+ vec![artifacts.lib_dir().to_path_buf()],
+ artifacts.include_dir().to_path_buf(),
+ )
+}
diff --git a/openssl-sys/build/main.rs b/openssl-sys/build/main.rs
new file mode 100644
index 0000000..3357518
--- /dev/null
+++ b/openssl-sys/build/main.rs
@@ -0,0 +1,426 @@
+#![allow(
+ clippy::inconsistent_digit_grouping,
+ clippy::uninlined_format_args,
+ clippy::unusual_byte_groupings
+)]
+
+extern crate autocfg;
+#[cfg(feature = "bindgen")]
+extern crate bindgen;
+extern crate cc;
+#[cfg(feature = "vendored")]
+extern crate openssl_src;
+extern crate pkg_config;
+#[cfg(target_env = "msvc")]
+extern crate vcpkg;
+
+use std::collections::HashSet;
+use std::env;
+use std::ffi::OsString;
+use std::path::{Path, PathBuf};
+mod cfgs;
+
+mod find_normal;
+#[cfg(feature = "vendored")]
+mod find_vendored;
+mod run_bindgen;
+
+#[derive(PartialEq)]
+enum Version {
+ Openssl3xx,
+ Openssl11x,
+ Openssl10x,
+ Libressl,
+ Boringssl,
+}
+
+fn env_inner(name: &str) -> Option {
+ let var = env::var_os(name);
+ println!("cargo:rerun-if-env-changed={}", name);
+
+ match var {
+ Some(ref v) => println!("{} = {}", name, v.to_string_lossy()),
+ None => println!("{} unset", name),
+ }
+
+ var
+}
+
+fn env(name: &str) -> Option {
+ let prefix = env::var("TARGET").unwrap().to_uppercase().replace('-', "_");
+ let prefixed = format!("{}_{}", prefix, name);
+ env_inner(&prefixed).or_else(|| env_inner(name))
+}
+
+fn find_openssl(target: &str) -> (Vec, PathBuf) {
+ #[cfg(feature = "vendored")]
+ {
+ // vendor if the feature is present, unless
+ // OPENSSL_NO_VENDOR exists and isn't `0`
+ if env("OPENSSL_NO_VENDOR").map_or(true, |s| s == "0") {
+ return find_vendored::get_openssl(target);
+ }
+ }
+ find_normal::get_openssl(target)
+}
+
+fn check_ssl_kind() {
+ if cfg!(feature = "unstable_boringssl") {
+ println!("cargo:rustc-cfg=boringssl");
+ println!("cargo:boringssl=true");
+ // BoringSSL does not have any build logic, exit early
+ std::process::exit(0);
+ }
+}
+
+fn main() {
+ check_rustc_versions();
+
+ check_ssl_kind();
+
+ let target = env::var("TARGET").unwrap();
+
+ let (lib_dirs, include_dir) = find_openssl(&target);
+
+ if !lib_dirs.iter().all(|p| Path::new(p).exists()) {
+ panic!("OpenSSL library directory does not exist: {:?}", lib_dirs);
+ }
+ if !Path::new(&include_dir).exists() {
+ panic!(
+ "OpenSSL include directory does not exist: {}",
+ include_dir.to_string_lossy()
+ );
+ }
+
+ for lib_dir in lib_dirs.iter() {
+ println!(
+ "cargo:rustc-link-search=native={}",
+ lib_dir.to_string_lossy()
+ );
+ }
+ println!("cargo:include={}", include_dir.to_string_lossy());
+
+ let version = postprocess(&[include_dir]);
+
+ let libs_env = env("OPENSSL_LIBS");
+ let libs = match libs_env.as_ref().and_then(|s| s.to_str()) {
+ Some(v) => {
+ if v.is_empty() {
+ vec![]
+ } else {
+ v.split(':').collect()
+ }
+ }
+ None => match version {
+ Version::Openssl10x if target.contains("windows") => vec!["ssleay32", "libeay32"],
+ Version::Openssl3xx | Version::Openssl11x if target.contains("windows-msvc") => {
+ vec!["libssl", "libcrypto"]
+ }
+ _ => vec!["ssl", "crypto"],
+ },
+ };
+
+ let kind = determine_mode(&lib_dirs, &libs);
+ for lib in libs.into_iter() {
+ println!("cargo:rustc-link-lib={}={}", kind, lib);
+ }
+
+ if kind == "static" && target.contains("windows") {
+ println!("cargo:rustc-link-lib=dylib=gdi32");
+ println!("cargo:rustc-link-lib=dylib=user32");
+ println!("cargo:rustc-link-lib=dylib=crypt32");
+ println!("cargo:rustc-link-lib=dylib=ws2_32");
+ println!("cargo:rustc-link-lib=dylib=advapi32");
+ }
+}
+
+fn check_rustc_versions() {
+ let cfg = autocfg::new();
+
+ if cfg.probe_rustc_version(1, 31) {
+ println!("cargo:rustc-cfg=const_fn");
+ }
+}
+
+#[allow(clippy::let_and_return)]
+fn postprocess(include_dirs: &[PathBuf]) -> Version {
+ let version = validate_headers(include_dirs);
+
+ // Never run bindgen for BoringSSL, if it was needed we already ran it.
+ if version != Version::Boringssl {
+ #[cfg(feature = "bindgen")]
+ run_bindgen::run(&include_dirs);
+ }
+
+ version
+}
+
+/// Validates the header files found in `include_dir` and then returns the
+/// version string of OpenSSL.
+#[allow(clippy::manual_strip)] // we need to support pre-1.45.0
+fn validate_headers(include_dirs: &[PathBuf]) -> Version {
+ // This `*-sys` crate only works with OpenSSL 1.0.1, 1.0.2, 1.1.0, 1.1.1 and 3.0.0.
+ // To correctly expose the right API from this crate, take a look at
+ // `opensslv.h` to see what version OpenSSL claims to be.
+ //
+ // OpenSSL has a number of build-time configuration options which affect
+ // various structs and such. Since OpenSSL 1.1.0 this isn't really a problem
+ // as the library is much more FFI-friendly, but 1.0.{1,2} suffer this problem.
+ //
+ // To handle all this conditional compilation we slurp up the configuration
+ // file of OpenSSL, `opensslconf.h`, and then dump out everything it defines
+ // as our own #[cfg] directives. That way the `ossl10x.rs` bindings can
+ // account for compile differences and such.
+ println!("cargo:rerun-if-changed=build/expando.c");
+ let mut gcc = cc::Build::new();
+ for include_dir in include_dirs {
+ gcc.include(include_dir);
+ }
+ let expanded = match gcc.file("build/expando.c").try_expand() {
+ Ok(expanded) => expanded,
+ Err(e) => {
+ panic!(
+ "
+Header expansion error:
+{:?}
+
+Failed to find OpenSSL development headers.
+
+You can try fixing this setting the `OPENSSL_DIR` environment variable
+pointing to your OpenSSL installation or installing OpenSSL headers package
+specific to your distribution:
+
+ # On Ubuntu
+ sudo apt-get install libssl-dev
+ # On Arch Linux
+ sudo pacman -S openssl
+ # On Fedora
+ sudo dnf install openssl-devel
+ # On Alpine Linux
+ apk add openssl-dev
+
+See rust-openssl documentation for more information:
+
+ https://docs.rs/openssl
+",
+ e
+ );
+ }
+ };
+ let expanded = String::from_utf8(expanded).unwrap();
+
+ let mut enabled = vec![];
+ let mut openssl_version = None;
+ let mut libressl_version = None;
+ let mut is_boringssl = false;
+ for line in expanded.lines() {
+ let line = line.trim();
+
+ let openssl_prefix = "RUST_VERSION_OPENSSL_";
+ let new_openssl_prefix = "RUST_VERSION_NEW_OPENSSL_";
+ let libressl_prefix = "RUST_VERSION_LIBRESSL_";
+ let boringsl_prefix = "RUST_OPENSSL_IS_BORINGSSL";
+ let conf_prefix = "RUST_CONF_";
+ if line.starts_with(openssl_prefix) {
+ let version = &line[openssl_prefix.len()..];
+ openssl_version = Some(parse_version(version));
+ } else if line.starts_with(new_openssl_prefix) {
+ let version = &line[new_openssl_prefix.len()..];
+ openssl_version = Some(parse_new_version(version));
+ } else if line.starts_with(libressl_prefix) {
+ let version = &line[libressl_prefix.len()..];
+ libressl_version = Some(parse_version(version));
+ } else if line.starts_with(conf_prefix) {
+ enabled.push(&line[conf_prefix.len()..]);
+ } else if line.starts_with(boringsl_prefix) {
+ is_boringssl = true;
+ }
+ }
+
+ if is_boringssl {
+ println!("cargo:rustc-cfg=boringssl");
+ println!("cargo:boringssl=true");
+ run_bindgen::run_boringssl(include_dirs);
+ return Version::Boringssl;
+ }
+
+ // We set this for any non-BoringSSL lib.
+ println!("cargo:rustc-cfg=openssl");
+
+ for enabled in &enabled {
+ println!("cargo:rustc-cfg=osslconf=\"{}\"", enabled);
+ }
+ println!("cargo:conf={}", enabled.join(","));
+
+ for cfg in cfgs::get(openssl_version, libressl_version) {
+ println!("cargo:rustc-cfg={}", cfg);
+ }
+
+ if let Some(libressl_version) = libressl_version {
+ println!("cargo:libressl_version_number={:x}", libressl_version);
+
+ let major = (libressl_version >> 28) as u8;
+ let minor = (libressl_version >> 20) as u8;
+ let fix = (libressl_version >> 12) as u8;
+ let (major, minor, fix) = match (major, minor, fix) {
+ (2, 5, 0) => ('2', '5', '0'),
+ (2, 5, 1) => ('2', '5', '1'),
+ (2, 5, 2) => ('2', '5', '2'),
+ (2, 5, _) => ('2', '5', 'x'),
+ (2, 6, 0) => ('2', '6', '0'),
+ (2, 6, 1) => ('2', '6', '1'),
+ (2, 6, 2) => ('2', '6', '2'),
+ (2, 6, _) => ('2', '6', 'x'),
+ (2, 7, _) => ('2', '7', 'x'),
+ (2, 8, 0) => ('2', '8', '0'),
+ (2, 8, 1) => ('2', '8', '1'),
+ (2, 8, _) => ('2', '8', 'x'),
+ (2, 9, 0) => ('2', '9', '0'),
+ (2, 9, _) => ('2', '9', 'x'),
+ (3, 0, 0) => ('3', '0', '0'),
+ (3, 0, 1) => ('3', '0', '1'),
+ (3, 0, _) => ('3', '0', 'x'),
+ (3, 1, 0) => ('3', '1', '0'),
+ (3, 1, _) => ('3', '1', 'x'),
+ (3, 2, 0) => ('3', '2', '0'),
+ (3, 2, 1) => ('3', '2', '1'),
+ (3, 2, _) => ('3', '2', 'x'),
+ (3, 3, 0) => ('3', '3', '0'),
+ (3, 3, 1) => ('3', '3', '1'),
+ (3, 3, _) => ('3', '3', 'x'),
+ (3, 4, 0) => ('3', '4', '0'),
+ (3, 4, _) => ('3', '4', 'x'),
+ (3, 5, _) => ('3', '5', 'x'),
+ (3, 6, 0) => ('3', '6', '0'),
+ (3, 6, _) => ('3', '6', 'x'),
+ (3, 7, 0) => ('3', '7', '0'),
+ (3, 7, 1) => ('3', '7', '1'),
+ _ => version_error(),
+ };
+
+ println!("cargo:libressl=true");
+ println!("cargo:libressl_version={}{}{}", major, minor, fix);
+ println!("cargo:version=101");
+ Version::Libressl
+ } else {
+ let openssl_version = openssl_version.unwrap();
+ println!("cargo:version_number={:x}", openssl_version);
+
+ if openssl_version >= 0x4_00_00_00_0 {
+ version_error()
+ } else if openssl_version >= 0x3_00_00_00_0 {
+ Version::Openssl3xx
+ } else if openssl_version >= 0x1_01_01_00_0 {
+ println!("cargo:version=111");
+ Version::Openssl11x
+ } else if openssl_version >= 0x1_01_00_06_0 {
+ println!("cargo:version=110");
+ println!("cargo:patch=f");
+ Version::Openssl11x
+ } else if openssl_version >= 0x1_01_00_00_0 {
+ println!("cargo:version=110");
+ Version::Openssl11x
+ } else if openssl_version >= 0x1_00_02_00_0 {
+ println!("cargo:version=102");
+ Version::Openssl10x
+ } else if openssl_version >= 0x1_00_01_00_0 {
+ println!("cargo:version=101");
+ Version::Openssl10x
+ } else {
+ version_error()
+ }
+ }
+}
+
+fn version_error() -> ! {
+ panic!(
+ "
+
+This crate is only compatible with OpenSSL (version 1.0.1 through 1.1.1, or 3.0.0), or LibreSSL 2.5
+through 3.7.1, but a different version of OpenSSL was found. The build is now aborting
+due to this version mismatch.
+
+"
+ );
+}
+
+// parses a string that looks like "0x100020cfL"
+#[allow(deprecated)] // trim_right_matches is now trim_end_matches
+#[allow(clippy::match_like_matches_macro)] // matches macro requires rust 1.42.0
+fn parse_version(version: &str) -> u64 {
+ // cut off the 0x prefix
+ assert!(version.starts_with("0x"));
+ let version = &version[2..];
+
+ // and the type specifier suffix
+ let version = version.trim_right_matches(|c: char| match c {
+ '0'..='9' | 'a'..='f' | 'A'..='F' => false,
+ _ => true,
+ });
+
+ u64::from_str_radix(version, 16).unwrap()
+}
+
+// parses a string that looks like 3_0_0
+fn parse_new_version(version: &str) -> u64 {
+ println!("version: {}", version);
+ let mut it = version.split('_');
+ let major = it.next().unwrap().parse::().unwrap();
+ let minor = it.next().unwrap().parse::().unwrap();
+ let patch = it.next().unwrap().parse::().unwrap();
+
+ (major << 28) | (minor << 20) | (patch << 4)
+}
+
+/// Given a libdir for OpenSSL (where artifacts are located) as well as the name
+/// of the libraries we're linking to, figure out whether we should link them
+/// statically or dynamically.
+fn determine_mode(libdirs: &[PathBuf], libs: &[&str]) -> &'static str {
+ // First see if a mode was explicitly requested
+ let kind = env("OPENSSL_STATIC");
+ match kind.as_ref().and_then(|s| s.to_str()) {
+ Some("0") => return "dylib",
+ Some(_) => return "static",
+ None => {}
+ }
+
+ // Next, see what files we actually have to link against, and see what our
+ // possibilities even are.
+ let mut files = HashSet::new();
+ for dir in libdirs {
+ for path in dir
+ .read_dir()
+ .unwrap()
+ .map(|e| e.unwrap())
+ .map(|e| e.file_name())
+ .filter_map(|e| e.into_string().ok())
+ {
+ files.insert(path);
+ }
+ }
+ let can_static = libs
+ .iter()
+ .all(|l| files.contains(&format!("lib{}.a", l)) || files.contains(&format!("{}.lib", l)));
+ let can_dylib = libs.iter().all(|l| {
+ files.contains(&format!("lib{}.so", l))
+ || files.contains(&format!("{}.dll", l))
+ || files.contains(&format!("lib{}.dylib", l))
+ });
+ match (can_static, can_dylib) {
+ (true, false) => return "static",
+ (false, true) => return "dylib",
+ (false, false) => {
+ panic!(
+ "OpenSSL libdir at `{:?}` does not contain the required files \
+ to either statically or dynamically link OpenSSL",
+ libdirs
+ );
+ }
+ (true, true) => {}
+ }
+
+ // Ok, we've got not explicit preference and can *either* link statically or
+ // link dynamically. In the interest of "security upgrades" and/or "best
+ // practices with security libs", let's link dynamically.
+ "dylib"
+}
diff --git a/openssl-sys/build/run_bindgen.rs b/openssl-sys/build/run_bindgen.rs
new file mode 100644
index 0000000..0c127ae
--- /dev/null
+++ b/openssl-sys/build/run_bindgen.rs
@@ -0,0 +1,236 @@
+#[cfg(feature = "bindgen")]
+use bindgen::callbacks::{MacroParsingBehavior, ParseCallbacks};
+#[cfg(feature = "bindgen")]
+use bindgen::{MacroTypeVariation, RustTarget};
+use std::io::Write;
+use std::path::PathBuf;
+#[cfg(not(feature = "bindgen"))]
+use std::process;
+use std::{env, fs};
+
+const INCLUDES: &str = "
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+
+// this must be included after ssl.h for libressl!
+#include
+
+#if !defined(LIBRESSL_VERSION_NUMBER) && !defined(OPENSSL_IS_BORINGSSL)
+#include
+#endif
+
+#if !defined(OPENSSL_IS_BORINGSSL)
+#include
+#include
+#endif
+
+#if !defined(LIBRESSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000
+#include
+#endif
+
+#if OPENSSL_VERSION_NUMBER >= 0x30000000
+#include
+#endif
+";
+
+#[cfg(feature = "bindgen")]
+pub fn run(include_dirs: &[PathBuf]) {
+ let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
+
+ let mut builder = bindgen::builder()
+ .parse_callbacks(Box::new(OpensslCallbacks))
+ .rust_target(RustTarget::Stable_1_47)
+ .ctypes_prefix("::libc")
+ .raw_line("use libc::*;")
+ .raw_line("type evp_pkey_st = EVP_PKEY;")
+ .allowlist_file(".*/openssl/[^/]+\\.h")
+ .allowlist_recursively(false)
+ // libc is missing pthread_once_t on macOS
+ .blocklist_type("CRYPTO_ONCE")
+ .blocklist_function("CRYPTO_THREAD_run_once")
+ // we don't want to mess with va_list
+ .blocklist_function("BIO_vprintf")
+ .blocklist_function("BIO_vsnprintf")
+ .blocklist_function("ERR_vset_error")
+ .blocklist_function("ERR_add_error_vdata")
+ .blocklist_function("EVP_KDF_vctrl")
+ .blocklist_type("OSSL_FUNC_core_vset_error_fn")
+ .blocklist_type("OSSL_FUNC_BIO_vprintf_fn")
+ .blocklist_type("OSSL_FUNC_BIO_vsnprintf_fn")
+ // Maintain compatibility for existing enum definitions
+ .rustified_enum("point_conversion_form_t")
+ // Maintain compatibility for pre-union definitions
+ .blocklist_type("GENERAL_NAME")
+ .blocklist_type("GENERAL_NAME_st")
+ .blocklist_type("EVP_PKEY")
+ .blocklist_type("evp_pkey_st")
+ .layout_tests(false)
+ .header_contents("includes.h", INCLUDES);
+
+ for include_dir in include_dirs {
+ builder = builder
+ .clang_arg("-I")
+ .clang_arg(include_dir.display().to_string());
+ }
+
+ builder
+ .generate()
+ .unwrap()
+ .write_to_file(out_dir.join("bindgen.rs"))
+ .unwrap();
+}
+
+#[cfg(feature = "bindgen")]
+pub fn run_boringssl(include_dirs: &[PathBuf]) {
+ let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
+ let mut builder = bindgen::builder()
+ .rust_target(RustTarget::Stable_1_47)
+ .ctypes_prefix("::libc")
+ .derive_default(false)
+ .enable_function_attribute_detection()
+ .size_t_is_usize(true)
+ .default_macro_constant_type(MacroTypeVariation::Signed)
+ .rustified_enum("point_conversion_form_t")
+ .allowlist_file(".*/openssl/[^/]+\\.h")
+ .wrap_static_fns(true)
+ .wrap_static_fns_path(out_dir.join("boring_static_wrapper").display().to_string())
+ .layout_tests(false)
+ .header_contents("includes.h", INCLUDES);
+
+ for include_dir in include_dirs {
+ builder = builder
+ .clang_arg("-I")
+ .clang_arg(include_dir.display().to_string());
+ }
+
+ builder
+ .generate()
+ .unwrap()
+ .write_to_file(out_dir.join("bindgen.rs"))
+ .unwrap();
+
+ fs::File::create(out_dir.join("boring_static_wrapper.h"))
+ .expect("Failed to create boring_static_wrapper.h")
+ .write_all(INCLUDES.as_bytes())
+ .expect("Failed to write contents to boring_static_wrapper.h");
+
+ cc::Build::new()
+ .file(out_dir.join("boring_static_wrapper.c"))
+ .includes(include_dirs)
+ .flag("-include")
+ .flag(
+ &out_dir
+ .join("boring_static_wrapper.h")
+ .display()
+ .to_string(),
+ )
+ .compile("boring_static_wrapper");
+}
+
+#[cfg(not(feature = "bindgen"))]
+pub fn run_boringssl(include_dirs: &[PathBuf]) {
+ let out_dir = PathBuf::from(env::var_os("OUT_DIR").unwrap());
+
+ fs::File::create(out_dir.join("boring_static_wrapper.h"))
+ .expect("Failed to create boring_static_wrapper.h")
+ .write_all(INCLUDES.as_bytes())
+ .expect("Failed to write contents to boring_static_wrapper.h");
+
+ let mut bindgen_cmd = process::Command::new("bindgen");
+ bindgen_cmd
+ .arg("-o")
+ .arg(out_dir.join("bindgen.rs"))
+ .arg("--rust-target=1.47")
+ .arg("--ctypes-prefix=::libc")
+ .arg("--no-derive-default")
+ .arg("--enable-function-attribute-detection")
+ .arg("--size_t-is-usize")
+ .arg("--default-macro-constant-type=signed")
+ .arg("--rustified-enum=point_conversion_form_t")
+ .arg("--allowlist-file=.*/openssl/[^/]+\\.h")
+ .arg("--experimental")
+ .arg("--wrap-static-fns")
+ .arg("--wrap-static-fns-path")
+ .arg(out_dir.join("boring_static_wrapper").display().to_string())
+ .arg("--no-layout-tests")
+ .arg(out_dir.join("boring_static_wrapper.h"))
+ .arg("--")
+ .arg(format!("--target={}", env::var("TARGET").unwrap()));
+
+ for include_dir in include_dirs {
+ bindgen_cmd.arg("-I").arg(include_dir.display().to_string());
+ }
+
+ let result = bindgen_cmd.status().expect("bindgen failed to execute");
+ assert!(result.success());
+
+ cc::Build::new()
+ .file(out_dir.join("boring_static_wrapper.c"))
+ .includes(include_dirs)
+ .flag("-include")
+ .flag(
+ &out_dir
+ .join("boring_static_wrapper.h")
+ .display()
+ .to_string(),
+ )
+ .compile("boring_static_wrapper");
+}
+
+#[derive(Debug)]
+struct OpensslCallbacks;
+
+#[cfg(feature = "bindgen")]
+impl ParseCallbacks for OpensslCallbacks {
+ // for now we'll continue hand-writing constants
+ fn will_parse_macro(&self, _name: &str) -> MacroParsingBehavior {
+ MacroParsingBehavior::Ignore
+ }
+
+ fn item_name(&self, original_item_name: &str) -> Option {
+ match original_item_name {
+ // Our original definitions of these are wrong, so rename to avoid breakage
+ "CRYPTO_EX_new"
+ | "CRYPTO_EX_dup"
+ | "CRYPTO_EX_free"
+ | "BIO_meth_set_write"
+ | "BIO_meth_set_read"
+ | "BIO_meth_set_puts"
+ | "BIO_meth_set_ctrl"
+ | "BIO_meth_set_create"
+ | "BIO_meth_set_destroy"
+ | "CRYPTO_set_locking_callback"
+ | "CRYPTO_set_id_callback"
+ | "SSL_CTX_set_tmp_dh_callback"
+ | "SSL_set_tmp_dh_callback"
+ | "SSL_CTX_set_tmp_ecdh_callback"
+ | "SSL_set_tmp_ecdh_callback"
+ | "SSL_CTX_callback_ctrl"
+ | "SSL_CTX_set_alpn_select_cb" => Some(format!("{}__fixed_rust", original_item_name)),
+ _ => None,
+ }
+ }
+}
diff --git a/openssl-sys/src/aes.rs b/openssl-sys/src/aes.rs
new file mode 100644
index 0000000..ade6e84
--- /dev/null
+++ b/openssl-sys/src/aes.rs
@@ -0,0 +1,7 @@
+use libc::*;
+
+pub const AES_ENCRYPT: c_int = 1;
+pub const AES_DECRYPT: c_int = 0;
+
+pub const AES_MAXNR: c_int = 14;
+pub const AES_BLOCK_SIZE: c_int = 16;
diff --git a/openssl-sys/src/asn1.rs b/openssl-sys/src/asn1.rs
new file mode 100644
index 0000000..caf14f7
--- /dev/null
+++ b/openssl-sys/src/asn1.rs
@@ -0,0 +1,39 @@
+use libc::*;
+
+use super::*;
+
+// ASN.1 tag values
+pub const V_ASN1_EOC: c_int = 0;
+pub const V_ASN1_BOOLEAN: c_int = 1;
+pub const V_ASN1_INTEGER: c_int = 2;
+pub const V_ASN1_BIT_STRING: c_int = 3;
+pub const V_ASN1_OCTET_STRING: c_int = 4;
+pub const V_ASN1_NULL: c_int = 5;
+pub const V_ASN1_OBJECT: c_int = 6;
+pub const V_ASN1_OBJECT_DESCRIPTOR: c_int = 7;
+pub const V_ASN1_EXTERNAL: c_int = 8;
+pub const V_ASN1_REAL: c_int = 9;
+pub const V_ASN1_ENUMERATED: c_int = 10;
+pub const V_ASN1_UTF8STRING: c_int = 12;
+pub const V_ASN1_SEQUENCE: c_int = 16;
+pub const V_ASN1_SET: c_int = 17;
+pub const V_ASN1_NUMERICSTRING: c_int = 18;
+pub const V_ASN1_PRINTABLESTRING: c_int = 19;
+pub const V_ASN1_T61STRING: c_int = 20;
+pub const V_ASN1_TELETEXSTRING: c_int = 20; // alias
+pub const V_ASN1_VIDEOTEXSTRING: c_int = 21;
+pub const V_ASN1_IA5STRING: c_int = 22;
+pub const V_ASN1_UTCTIME: c_int = 23;
+pub const V_ASN1_GENERALIZEDTIME: c_int = 24;
+pub const V_ASN1_GRAPHICSTRING: c_int = 25;
+pub const V_ASN1_ISO64STRING: c_int = 26;
+pub const V_ASN1_VISIBLESTRING: c_int = 26; // alias
+pub const V_ASN1_GENERALSTRING: c_int = 27;
+pub const V_ASN1_UNIVERSALSTRING: c_int = 28;
+pub const V_ASN1_BMPSTRING: c_int = 30;
+
+pub const MBSTRING_FLAG: c_int = 0x1000;
+pub const MBSTRING_UTF8: c_int = MBSTRING_FLAG;
+pub const MBSTRING_ASC: c_int = MBSTRING_FLAG | 1;
+pub const MBSTRING_BMP: c_int = MBSTRING_FLAG | 2;
+pub const MBSTRING_UNIV: c_int = MBSTRING_FLAG | 4;
diff --git a/openssl-sys/src/bio.rs b/openssl-sys/src/bio.rs
new file mode 100644
index 0000000..ea6053b
--- /dev/null
+++ b/openssl-sys/src/bio.rs
@@ -0,0 +1,72 @@
+use libc::*;
+
+use super::*;
+
+pub const BIO_TYPE_NONE: c_int = 0;
+
+pub const BIO_CTRL_EOF: c_int = 2;
+pub const BIO_CTRL_INFO: c_int = 3;
+pub const BIO_CTRL_FLUSH: c_int = 11;
+pub const BIO_CTRL_DGRAM_QUERY_MTU: c_int = 40;
+pub const BIO_C_SET_BUF_MEM_EOF_RETURN: c_int = 130;
+
+pub unsafe fn BIO_set_retry_read(b: *mut BIO) {
+ BIO_set_flags(b, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY)
+}
+
+pub unsafe fn BIO_set_retry_write(b: *mut BIO) {
+ BIO_set_flags(b, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY)
+}
+
+pub unsafe fn BIO_clear_retry_flags(b: *mut BIO) {
+ BIO_clear_flags(b, BIO_FLAGS_RWS | BIO_FLAGS_SHOULD_RETRY)
+}
+
+pub const BIO_FLAGS_READ: c_int = 0x01;
+pub const BIO_FLAGS_WRITE: c_int = 0x02;
+pub const BIO_FLAGS_IO_SPECIAL: c_int = 0x04;
+pub const BIO_FLAGS_RWS: c_int = BIO_FLAGS_READ | BIO_FLAGS_WRITE | BIO_FLAGS_IO_SPECIAL;
+pub const BIO_FLAGS_SHOULD_RETRY: c_int = 0x08;
+
+pub unsafe fn BIO_get_mem_data(b: *mut BIO, pp: *mut *mut c_char) -> c_long {
+ BIO_ctrl(b, BIO_CTRL_INFO, 0, pp as *mut c_void)
+}
+
+extern "C" {
+ #[deprecated(note = "use BIO_meth_set_write__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_write(
+ biom: *mut BIO_METHOD,
+ write: unsafe extern "C" fn(*mut BIO, *const c_char, c_int) -> c_int,
+ ) -> c_int;
+ #[deprecated(note = "use BIO_meth_set_read__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_read(
+ biom: *mut BIO_METHOD,
+ read: unsafe extern "C" fn(*mut BIO, *mut c_char, c_int) -> c_int,
+ ) -> c_int;
+ #[deprecated(note = "use BIO_meth_set_puts__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_puts(
+ biom: *mut BIO_METHOD,
+ read: unsafe extern "C" fn(*mut BIO, *const c_char) -> c_int,
+ ) -> c_int;
+ #[deprecated(note = "use BIO_meth_set_ctrl__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_ctrl(
+ biom: *mut BIO_METHOD,
+ read: unsafe extern "C" fn(*mut BIO, c_int, c_long, *mut c_void) -> c_long,
+ ) -> c_int;
+ #[deprecated(note = "use BIO_meth_set_create__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_create(
+ biom: *mut BIO_METHOD,
+ create: unsafe extern "C" fn(*mut BIO) -> c_int,
+ ) -> c_int;
+ #[deprecated(note = "use BIO_meth_set_destroy__fixed_rust instead")]
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_set_destroy(
+ biom: *mut BIO_METHOD,
+ destroy: unsafe extern "C" fn(*mut BIO) -> c_int,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/bn.rs b/openssl-sys/src/bn.rs
new file mode 100644
index 0000000..a6bbcce
--- /dev/null
+++ b/openssl-sys/src/bn.rs
@@ -0,0 +1,15 @@
+use libc::*;
+
+#[cfg(target_pointer_width = "64")]
+pub type BN_ULONG = c_ulonglong;
+#[cfg(target_pointer_width = "32")]
+pub type BN_ULONG = c_uint;
+
+#[cfg(ossl110)]
+pub const BN_FLG_MALLOCED: c_int = 0x01;
+#[cfg(ossl110)]
+pub const BN_FLG_STATIC_DATA: c_int = 0x02;
+#[cfg(ossl110)]
+pub const BN_FLG_CONSTTIME: c_int = 0x04;
+#[cfg(ossl110)]
+pub const BN_FLG_SECURE: c_int = 0x08;
diff --git a/openssl-sys/src/cms.rs b/openssl-sys/src/cms.rs
new file mode 100644
index 0000000..f008adb
--- /dev/null
+++ b/openssl-sys/src/cms.rs
@@ -0,0 +1,46 @@
+use libc::*;
+
+#[cfg(ossl101)]
+pub const CMS_TEXT: c_uint = 0x1;
+#[cfg(ossl101)]
+pub const CMS_NOCERTS: c_uint = 0x2;
+#[cfg(ossl101)]
+pub const CMS_NO_CONTENT_VERIFY: c_uint = 0x4;
+#[cfg(ossl101)]
+pub const CMS_NO_ATTR_VERIFY: c_uint = 0x8;
+#[cfg(ossl101)]
+pub const CMS_NOSIGS: c_uint = 0x4 | 0x8;
+#[cfg(ossl101)]
+pub const CMS_NOINTERN: c_uint = 0x10;
+#[cfg(ossl101)]
+pub const CMS_NO_SIGNER_CERT_VERIFY: c_uint = 0x20;
+#[cfg(ossl101)]
+pub const CMS_NOVERIFY: c_uint = 0x20;
+#[cfg(ossl101)]
+pub const CMS_DETACHED: c_uint = 0x40;
+#[cfg(ossl101)]
+pub const CMS_BINARY: c_uint = 0x80;
+#[cfg(ossl101)]
+pub const CMS_NOATTR: c_uint = 0x100;
+#[cfg(ossl101)]
+pub const CMS_NOSMIMECAP: c_uint = 0x200;
+#[cfg(ossl101)]
+pub const CMS_NOOLDMIMETYPE: c_uint = 0x400;
+#[cfg(ossl101)]
+pub const CMS_CRLFEOL: c_uint = 0x800;
+#[cfg(ossl101)]
+pub const CMS_STREAM: c_uint = 0x1000;
+#[cfg(ossl101)]
+pub const CMS_NOCRL: c_uint = 0x2000;
+#[cfg(ossl101)]
+pub const CMS_PARTIAL: c_uint = 0x4000;
+#[cfg(ossl101)]
+pub const CMS_REUSE_DIGEST: c_uint = 0x8000;
+#[cfg(ossl101)]
+pub const CMS_USE_KEYID: c_uint = 0x10000;
+#[cfg(ossl101)]
+pub const CMS_DEBUG_DECRYPT: c_uint = 0x20000;
+#[cfg(ossl102)]
+pub const CMS_KEY_PARAM: c_uint = 0x40000;
+#[cfg(ossl110)]
+pub const CMS_ASCIICRLF: c_uint = 0x80000;
diff --git a/openssl-sys/src/crypto.rs b/openssl-sys/src/crypto.rs
new file mode 100644
index 0000000..35be07e
--- /dev/null
+++ b/openssl-sys/src/crypto.rs
@@ -0,0 +1,134 @@
+use super::*;
+use libc::*;
+
+extern "C" {
+ #[deprecated(note = "use CRYPTO_set_locking_callback__fixed_rust instead")]
+ #[cfg(not(ossl110))]
+ pub fn CRYPTO_set_locking_callback(
+ func: unsafe extern "C" fn(mode: c_int, n: c_int, file: *const c_char, line: c_int),
+ );
+
+ #[deprecated(note = "use CRYPTO_set_id_callback__fixed_rust instead")]
+ #[cfg(not(ossl110))]
+ pub fn CRYPTO_set_id_callback(func: unsafe extern "C" fn() -> c_ulong);
+}
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ type CRYPTO_EX_new_ret = ();
+ type CRYPTO_EX_dup_from = *const CRYPTO_EX_DATA;
+ } else {
+ type CRYPTO_EX_new_ret = c_int;
+ type CRYPTO_EX_dup_from = *mut CRYPTO_EX_DATA;
+ }
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ type CRYPTO_EX_dup_from_d = *mut *mut c_void;
+ } else {
+ type CRYPTO_EX_dup_from_d = *mut c_void;
+ }
+}
+
+// FIXME should be options
+pub type CRYPTO_EX_new = unsafe extern "C" fn(
+ parent: *mut c_void,
+ ptr: *mut c_void,
+ ad: *mut CRYPTO_EX_DATA,
+ idx: c_int,
+ argl: c_long,
+ argp: *mut c_void,
+) -> CRYPTO_EX_new_ret;
+pub type CRYPTO_EX_dup = unsafe extern "C" fn(
+ to: *mut CRYPTO_EX_DATA,
+ from: CRYPTO_EX_dup_from,
+ from_d: CRYPTO_EX_dup_from_d,
+ idx: c_int,
+ argl: c_long,
+ argp: *mut c_void,
+) -> c_int;
+pub type CRYPTO_EX_free = unsafe extern "C" fn(
+ parent: *mut c_void,
+ ptr: *mut c_void,
+ ad: *mut CRYPTO_EX_DATA,
+ idx: c_int,
+ argl: c_long,
+ argp: *mut c_void,
+);
+
+#[cfg(ossl110)]
+#[inline]
+#[track_caller]
+pub unsafe fn OPENSSL_malloc(num: usize) -> *mut c_void {
+ CRYPTO_malloc(
+ num,
+ concat!(file!(), "\0").as_ptr() as *const _,
+ line!() as _,
+ )
+}
+
+#[cfg(not(ossl110))]
+#[inline]
+#[track_caller]
+pub unsafe fn OPENSSL_malloc(num: c_int) -> *mut c_void {
+ CRYPTO_malloc(
+ num,
+ concat!(file!(), "\0").as_ptr() as *const _,
+ line!() as _,
+ )
+}
+
+#[cfg(ossl110)]
+#[inline]
+#[track_caller]
+pub unsafe fn OPENSSL_free(addr: *mut c_void) {
+ CRYPTO_free(
+ addr,
+ concat!(file!(), "\0").as_ptr() as *const _,
+ line!() as _,
+ )
+}
+
+#[cfg(not(ossl110))]
+#[inline]
+pub unsafe fn OPENSSL_free(addr: *mut c_void) {
+ CRYPTO_free(addr)
+}
+
+#[cfg(not(ossl110))]
+pub const CRYPTO_LOCK_X509: c_int = 3;
+#[cfg(not(ossl110))]
+pub const CRYPTO_LOCK_EVP_PKEY: c_int = 10;
+#[cfg(not(ossl110))]
+pub const CRYPTO_LOCK_SSL_CTX: c_int = 12;
+#[cfg(not(ossl110))]
+pub const CRYPTO_LOCK_SSL_SESSION: c_int = 14;
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ pub const CRYPTO_EX_INDEX_SSL: c_int = 0;
+ pub const CRYPTO_EX_INDEX_SSL_CTX: c_int = 1;
+ } else if #[cfg(libressl)] {
+ pub const CRYPTO_EX_INDEX_SSL: c_int = 1;
+ pub const CRYPTO_EX_INDEX_SSL_CTX: c_int = 2;
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl271))] {
+ pub const OPENSSL_VERSION: c_int = 0;
+ pub const OPENSSL_CFLAGS: c_int = 1;
+ pub const OPENSSL_BUILT_ON: c_int = 2;
+ pub const OPENSSL_PLATFORM: c_int = 3;
+ pub const OPENSSL_DIR: c_int = 4;
+ } else {
+ pub const SSLEAY_VERSION: c_int = 0;
+ pub const SSLEAY_CFLAGS: c_int = 2;
+ pub const SSLEAY_BUILT_ON: c_int = 3;
+ pub const SSLEAY_PLATFORM: c_int = 4;
+ pub const SSLEAY_DIR: c_int = 5;
+ }
+}
+
+pub const CRYPTO_LOCK: c_int = 1;
diff --git a/openssl-sys/src/dtls1.rs b/openssl-sys/src/dtls1.rs
new file mode 100644
index 0000000..9ef5e77
--- /dev/null
+++ b/openssl-sys/src/dtls1.rs
@@ -0,0 +1,9 @@
+use libc::*;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ pub const DTLS1_COOKIE_LENGTH: c_uint = 255;
+ } else {
+ pub const DTLS1_COOKIE_LENGTH: c_uint = 256;
+ }
+}
diff --git a/openssl-sys/src/ec.rs b/openssl-sys/src/ec.rs
new file mode 100644
index 0000000..995a84f
--- /dev/null
+++ b/openssl-sys/src/ec.rs
@@ -0,0 +1,16 @@
+use libc::*;
+use std::ptr;
+
+use super::*;
+
+pub const OPENSSL_EC_NAMED_CURVE: c_int = 1;
+
+#[cfg(ossl300)]
+pub unsafe fn EVP_EC_gen(curve: *const c_char) -> *mut EVP_PKEY {
+ EVP_PKEY_Q_keygen(
+ ptr::null_mut(),
+ ptr::null_mut(),
+ "EC\0".as_ptr().cast(),
+ curve,
+ )
+}
diff --git a/openssl-sys/src/err.rs b/openssl-sys/src/err.rs
new file mode 100644
index 0000000..5e84e62
--- /dev/null
+++ b/openssl-sys/src/err.rs
@@ -0,0 +1,70 @@
+use libc::*;
+
+pub const ERR_TXT_MALLOCED: c_int = 0x01;
+pub const ERR_TXT_STRING: c_int = 0x02;
+
+pub const ERR_LIB_SYS: c_int = 2;
+pub const ERR_LIB_PEM: c_int = 9;
+pub const ERR_LIB_ASN1: c_int = 13;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ pub const ERR_SYSTEM_FLAG: c_ulong = c_int::max_value() as c_ulong + 1;
+ pub const ERR_SYSTEM_MASK: c_ulong = c_int::max_value() as c_ulong;
+
+ pub const ERR_LIB_OFFSET: c_ulong = 23;
+ pub const ERR_LIB_MASK: c_ulong = 0xff;
+ pub const ERR_RFLAGS_OFFSET: c_ulong = 18;
+ pub const ERR_RFLAGS_MASK: c_ulong = 0x1f;
+ pub const ERR_REASON_MASK: c_ulong = 0x7FFFFF;
+
+ pub const ERR_RFLAG_FATAL: c_ulong = 0x1 << ERR_RFLAGS_OFFSET;
+
+ const_fn! {
+ pub const fn ERR_SYSTEM_ERROR(errcode: c_ulong) -> bool {
+ errcode & ERR_SYSTEM_FLAG != 0
+ }
+
+ pub const fn ERR_GET_LIB(errcode: c_ulong) -> c_int {
+ // hacks since `if` isn't yet stable in const functions :(
+ ((ERR_LIB_SYS as c_ulong * (ERR_SYSTEM_ERROR(errcode) as c_ulong)) |
+ (((errcode >> ERR_LIB_OFFSET) & ERR_LIB_MASK) * (!ERR_SYSTEM_ERROR(errcode) as c_ulong))) as c_int
+ }
+
+ pub const fn ERR_GET_FUNC(_errcode: c_ulong) -> c_int {
+ 0
+ }
+
+ pub const fn ERR_GET_REASON(errcode: c_ulong) -> c_int {
+ // hacks since `if` isn't yet stable in const functions :(
+ ((ERR_LIB_SYS as c_ulong * (ERR_SYSTEM_ERROR(errcode) as c_ulong)) |
+ ((errcode & ERR_REASON_MASK) * (!ERR_SYSTEM_ERROR(errcode) as c_ulong))) as c_int
+ }
+
+ pub const fn ERR_PACK(lib: c_int, _func: c_int, reason: c_int) -> c_ulong {
+ ((lib as c_ulong & ERR_LIB_MASK) << ERR_LIB_OFFSET) |
+ (reason as c_ulong & ERR_REASON_MASK)
+ }
+ }
+ } else {
+ const_fn! {
+ pub const fn ERR_PACK(l: c_int, f: c_int, r: c_int) -> c_ulong {
+ ((l as c_ulong & 0x0FF) << 24) |
+ ((f as c_ulong & 0xFFF) << 12) |
+ (r as c_ulong & 0xFFF)
+ }
+
+ pub const fn ERR_GET_LIB(l: c_ulong) -> c_int {
+ ((l >> 24) & 0x0FF) as c_int
+ }
+
+ pub const fn ERR_GET_FUNC(l: c_ulong) -> c_int {
+ ((l >> 12) & 0xFFF) as c_int
+ }
+
+ pub const fn ERR_GET_REASON(l: c_ulong) -> c_int {
+ (l & 0xFFF) as c_int
+ }
+ }
+ }
+}
diff --git a/openssl-sys/src/evp.rs b/openssl-sys/src/evp.rs
new file mode 100644
index 0000000..69b49fb
--- /dev/null
+++ b/openssl-sys/src/evp.rs
@@ -0,0 +1,285 @@
+use super::*;
+use libc::*;
+
+pub const EVP_MAX_MD_SIZE: c_uint = 64;
+
+pub const PKCS5_SALT_LEN: c_int = 8;
+pub const PKCS12_DEFAULT_ITER: c_int = 2048;
+
+pub const EVP_PKEY_RSA: c_int = NID_rsaEncryption;
+pub const EVP_PKEY_DSA: c_int = NID_dsa;
+pub const EVP_PKEY_DH: c_int = NID_dhKeyAgreement;
+pub const EVP_PKEY_EC: c_int = NID_X9_62_id_ecPublicKey;
+#[cfg(any(ossl111, libressl370))]
+pub const EVP_PKEY_X25519: c_int = NID_X25519;
+#[cfg(any(ossl111, libressl370))]
+pub const EVP_PKEY_ED25519: c_int = NID_ED25519;
+#[cfg(ossl111)]
+pub const EVP_PKEY_X448: c_int = NID_X448;
+#[cfg(ossl111)]
+pub const EVP_PKEY_ED448: c_int = NID_ED448;
+pub const EVP_PKEY_HMAC: c_int = NID_hmac;
+pub const EVP_PKEY_CMAC: c_int = NID_cmac;
+#[cfg(ossl110)]
+pub const EVP_PKEY_HKDF: c_int = NID_hkdf;
+
+pub const EVP_CTRL_GCM_SET_IVLEN: c_int = 0x9;
+pub const EVP_CTRL_GCM_GET_TAG: c_int = 0x10;
+pub const EVP_CTRL_GCM_SET_TAG: c_int = 0x11;
+
+pub unsafe fn EVP_get_digestbynid(type_: c_int) -> *const EVP_MD {
+ EVP_get_digestbyname(OBJ_nid2sn(type_))
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ #[inline]
+ pub unsafe fn EVP_MD_CTX_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD {
+ EVP_MD_CTX_get0_md(ctx)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_MD_CTX_get_size(ctx: *const EVP_MD_CTX) -> c_int {
+ EVP_MD_get_size(EVP_MD_CTX_get0_md(ctx))
+ }
+
+ #[inline]
+ pub unsafe fn EVP_MD_CTX_size(ctx: *const EVP_MD_CTX) -> c_int {
+ EVP_MD_CTX_get_size(ctx)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_MD_block_size(md: *const EVP_MD) -> c_int {
+ EVP_MD_get_block_size(md)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_MD_size(md: *const EVP_MD) -> c_int {
+ EVP_MD_get_size(md)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_MD_type(md: *const EVP_MD) -> c_int {
+ EVP_MD_get_type(md)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_key_length(cipher: *const EVP_CIPHER) -> c_int {
+ EVP_CIPHER_get_key_length(cipher)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_block_size(cipher: *const EVP_CIPHER) -> c_int {
+ EVP_CIPHER_get_block_size(cipher)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_iv_length(cipher: *const EVP_CIPHER) -> c_int {
+ EVP_CIPHER_get_iv_length(cipher)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_nid(cipher: *const EVP_CIPHER) -> c_int {
+ EVP_CIPHER_get_nid(cipher)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_CTX_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int {
+ EVP_CIPHER_CTX_get_block_size(ctx)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_CTX_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int {
+ EVP_CIPHER_CTX_get_key_length(ctx)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_CTX_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int {
+ EVP_CIPHER_CTX_get_iv_length(ctx)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_CIPHER_CTX_num(ctx: *const EVP_CIPHER_CTX) -> c_int {
+ EVP_CIPHER_CTX_get_num(ctx)
+ }
+ } else {
+ pub unsafe fn EVP_MD_CTX_size(ctx: *const EVP_MD_CTX) -> c_int {
+ EVP_MD_size(EVP_MD_CTX_md(ctx))
+ }
+ }
+}
+#[cfg(not(ossl300))]
+#[inline]
+pub unsafe fn EVP_DigestSignUpdate(
+ ctx: *mut EVP_MD_CTX,
+ data: *const c_void,
+ dsize: size_t,
+) -> c_int {
+ EVP_DigestUpdate(ctx, data, dsize)
+}
+#[cfg(not(ossl300))]
+#[inline]
+pub unsafe fn EVP_DigestVerifyUpdate(
+ ctx: *mut EVP_MD_CTX,
+ data: *const c_void,
+ dsize: size_t,
+) -> c_int {
+ EVP_DigestUpdate(ctx, data, dsize)
+}
+#[cfg(ossl300)]
+#[inline]
+pub unsafe fn EVP_PKEY_size(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_size(pkey)
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ #[inline]
+ pub unsafe fn EVP_PKEY_id(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_id(pkey)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_PKEY_bits(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_bits(pkey)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_PKEY_security_bits(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_security_bits(pkey)
+ }
+ }
+}
+
+pub const EVP_PKEY_OP_KEYGEN: c_int = 1 << 2;
+cfg_if! {
+ if #[cfg(ossl300)] {
+ pub const EVP_PKEY_OP_SIGN: c_int = 1 << 4;
+ pub const EVP_PKEY_OP_VERIFY: c_int = 1 << 5;
+ pub const EVP_PKEY_OP_VERIFYRECOVER: c_int = 1 << 6;
+ pub const EVP_PKEY_OP_SIGNCTX: c_int = 1 << 7;
+ pub const EVP_PKEY_OP_VERIFYCTX: c_int = 1 << 8;
+ pub const EVP_PKEY_OP_ENCRYPT: c_int = 1 << 9;
+ pub const EVP_PKEY_OP_DECRYPT: c_int = 1 << 10;
+ pub const EVP_PKEY_OP_DERIVE: c_int = 1 << 11;
+ } else {
+ pub const EVP_PKEY_OP_SIGN: c_int = 1 << 3;
+ pub const EVP_PKEY_OP_VERIFY: c_int = 1 << 4;
+ pub const EVP_PKEY_OP_VERIFYRECOVER: c_int = 1 << 5;
+ pub const EVP_PKEY_OP_SIGNCTX: c_int = 1 << 6;
+ pub const EVP_PKEY_OP_VERIFYCTX: c_int = 1 << 7;
+ pub const EVP_PKEY_OP_ENCRYPT: c_int = 1 << 8;
+ pub const EVP_PKEY_OP_DECRYPT: c_int = 1 << 9;
+ pub const EVP_PKEY_OP_DERIVE: c_int = 1 << 10;
+ }
+}
+
+pub const EVP_PKEY_OP_TYPE_SIG: c_int = EVP_PKEY_OP_SIGN
+ | EVP_PKEY_OP_VERIFY
+ | EVP_PKEY_OP_VERIFYRECOVER
+ | EVP_PKEY_OP_SIGNCTX
+ | EVP_PKEY_OP_VERIFYCTX;
+
+pub const EVP_PKEY_OP_TYPE_CRYPT: c_int = EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT;
+
+pub const EVP_PKEY_CTRL_SET_MAC_KEY: c_int = 6;
+
+pub const EVP_PKEY_CTRL_CIPHER: c_int = 12;
+
+pub const EVP_PKEY_ALG_CTRL: c_int = 0x1000;
+
+#[cfg(ossl111)]
+pub const EVP_PKEY_HKDEF_MODE_EXTRACT_AND_EXPAND: c_int = 0;
+
+#[cfg(ossl111)]
+pub const EVP_PKEY_HKDEF_MODE_EXTRACT_ONLY: c_int = 1;
+
+#[cfg(ossl111)]
+pub const EVP_PKEY_HKDEF_MODE_EXPAND_ONLY: c_int = 2;
+
+#[cfg(ossl110)]
+pub const EVP_PKEY_CTRL_HKDF_MD: c_int = EVP_PKEY_ALG_CTRL + 3;
+
+#[cfg(ossl110)]
+pub const EVP_PKEY_CTRL_HKDF_SALT: c_int = EVP_PKEY_ALG_CTRL + 4;
+
+#[cfg(ossl110)]
+pub const EVP_PKEY_CTRL_HKDF_KEY: c_int = EVP_PKEY_ALG_CTRL + 5;
+
+#[cfg(ossl110)]
+pub const EVP_PKEY_CTRL_HKDF_INFO: c_int = EVP_PKEY_ALG_CTRL + 6;
+
+#[cfg(ossl111)]
+pub const EVP_PKEY_CTRL_HKDF_MODE: c_int = EVP_PKEY_ALG_CTRL + 7;
+
+#[cfg(all(ossl111, not(ossl300)))]
+pub unsafe fn EVP_PKEY_CTX_set_hkdf_mode(ctx: *mut EVP_PKEY_CTX, mode: c_int) -> c_int {
+ EVP_PKEY_CTX_ctrl(
+ ctx,
+ -1,
+ EVP_PKEY_OP_DERIVE,
+ EVP_PKEY_CTRL_HKDF_MODE,
+ mode,
+ std::ptr::null_mut(),
+ )
+}
+
+#[cfg(all(ossl110, not(ossl300)))]
+pub unsafe fn EVP_PKEY_CTX_set_hkdf_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int {
+ EVP_PKEY_CTX_ctrl(
+ ctx,
+ -1,
+ EVP_PKEY_OP_DERIVE,
+ EVP_PKEY_CTRL_HKDF_MD,
+ 0,
+ md as *mut c_void,
+ )
+}
+
+#[cfg(all(ossl110, not(ossl300)))]
+pub unsafe fn EVP_PKEY_CTX_set1_hkdf_salt(
+ ctx: *mut EVP_PKEY_CTX,
+ salt: *const u8,
+ saltlen: c_int,
+) -> c_int {
+ EVP_PKEY_CTX_ctrl(
+ ctx,
+ -1,
+ EVP_PKEY_OP_DERIVE,
+ EVP_PKEY_CTRL_HKDF_SALT,
+ saltlen,
+ salt as *mut c_void,
+ )
+}
+
+#[cfg(all(ossl110, not(ossl300)))]
+pub unsafe fn EVP_PKEY_CTX_set1_hkdf_key(
+ ctx: *mut EVP_PKEY_CTX,
+ key: *const u8,
+ keylen: c_int,
+) -> c_int {
+ EVP_PKEY_CTX_ctrl(
+ ctx,
+ -1,
+ EVP_PKEY_OP_DERIVE,
+ EVP_PKEY_CTRL_HKDF_KEY,
+ keylen,
+ key as *mut c_void,
+ )
+}
+
+#[cfg(all(ossl110, not(ossl300)))]
+pub unsafe fn EVP_PKEY_CTX_add1_hkdf_info(
+ ctx: *mut EVP_PKEY_CTX,
+ info: *const u8,
+ infolen: c_int,
+) -> c_int {
+ EVP_PKEY_CTX_ctrl(
+ ctx,
+ -1,
+ EVP_PKEY_OP_DERIVE,
+ EVP_PKEY_CTRL_HKDF_INFO,
+ infolen,
+ info as *mut c_void,
+ )
+}
diff --git a/openssl-sys/src/handwritten/aes.rs b/openssl-sys/src/handwritten/aes.rs
new file mode 100644
index 0000000..ba24936
--- /dev/null
+++ b/openssl-sys/src/handwritten/aes.rs
@@ -0,0 +1,40 @@
+use super::super::*;
+use libc::*;
+
+#[repr(C)]
+pub struct AES_KEY {
+ // There is some business with AES_LONG which is there to ensure the values here are 32 bits
+ rd_key: [u32; 4 * (AES_MAXNR as usize + 1)],
+ rounds: c_int,
+}
+
+extern "C" {
+ pub fn AES_set_encrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
+ pub fn AES_set_decrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
+
+ #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
+ pub fn AES_ige_encrypt(
+ in_: *const c_uchar,
+ out: *mut c_uchar,
+ length: size_t,
+ key: *const AES_KEY,
+ ivec: *mut c_uchar,
+ enc: c_int,
+ );
+
+ pub fn AES_wrap_key(
+ key: *mut AES_KEY,
+ iv: *const c_uchar,
+ out: *mut c_uchar,
+ in_: *const c_uchar,
+ inlen: c_uint,
+ ) -> c_int;
+
+ pub fn AES_unwrap_key(
+ key: *mut AES_KEY,
+ iv: *const c_uchar,
+ out: *mut c_uchar,
+ in_: *const c_uchar,
+ inlen: c_uint,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/asn1.rs b/openssl-sys/src/handwritten/asn1.rs
new file mode 100644
index 0000000..7163a69
--- /dev/null
+++ b/openssl-sys/src/handwritten/asn1.rs
@@ -0,0 +1,60 @@
+use super::super::*;
+use libc::*;
+
+#[repr(C)]
+pub struct ASN1_ENCODING {
+ pub enc: *mut c_uchar,
+ pub len: c_long,
+ pub modified: c_int,
+}
+
+extern "C" {
+ pub fn ASN1_OBJECT_free(x: *mut ASN1_OBJECT);
+}
+
+stack!(stack_st_ASN1_OBJECT);
+
+extern "C" {
+ pub fn ASN1_STRING_type_new(ty: c_int) -> *mut ASN1_STRING;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn ASN1_STRING_get0_data(x: *const ASN1_STRING) -> *const c_uchar;
+ #[cfg(any(all(ossl101, not(ossl110)), libressl))]
+ pub fn ASN1_STRING_data(x: *mut ASN1_STRING) -> *mut c_uchar;
+
+ pub fn ASN1_BIT_STRING_free(x: *mut ASN1_BIT_STRING);
+
+ pub fn ASN1_STRING_free(x: *mut ASN1_STRING);
+ pub fn ASN1_STRING_length(x: *const ASN1_STRING) -> c_int;
+
+ pub fn ASN1_STRING_set(x: *mut ASN1_STRING, data: *const c_void, len: c_int) -> c_int;
+
+ pub fn ASN1_GENERALIZEDTIME_free(tm: *mut ASN1_GENERALIZEDTIME);
+ pub fn ASN1_GENERALIZEDTIME_print(b: *mut BIO, tm: *const ASN1_GENERALIZEDTIME) -> c_int;
+ pub fn ASN1_TIME_new() -> *mut ASN1_TIME;
+ #[cfg(ossl102)]
+ pub fn ASN1_TIME_diff(
+ pday: *mut c_int,
+ psec: *mut c_int,
+ from: *const ASN1_TIME,
+ to: *const ASN1_TIME,
+ ) -> c_int;
+ pub fn ASN1_TIME_free(tm: *mut ASN1_TIME);
+ pub fn ASN1_TIME_print(b: *mut BIO, tm: *const ASN1_TIME) -> c_int;
+ pub fn ASN1_TIME_set(from: *mut ASN1_TIME, to: time_t) -> *mut ASN1_TIME;
+
+ pub fn ASN1_INTEGER_free(x: *mut ASN1_INTEGER);
+ pub fn ASN1_INTEGER_get(dest: *const ASN1_INTEGER) -> c_long;
+ pub fn ASN1_INTEGER_set(dest: *mut ASN1_INTEGER, value: c_long) -> c_int;
+ pub fn BN_to_ASN1_INTEGER(bn: *const BIGNUM, ai: *mut ASN1_INTEGER) -> *mut ASN1_INTEGER;
+ pub fn ASN1_INTEGER_to_BN(ai: *const ASN1_INTEGER, bn: *mut BIGNUM) -> *mut BIGNUM;
+
+ pub fn ASN1_TIME_set_string(s: *mut ASN1_TIME, str: *const c_char) -> c_int;
+ #[cfg(ossl111)]
+ pub fn ASN1_TIME_set_string_X509(s: *mut ASN1_TIME, str: *const c_char) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn ASN1_STRING_to_UTF8(out: *mut *mut c_uchar, s: #[const_ptr_if(any(ossl110, libressl280))] ASN1_STRING) -> c_int;
+ }
+}
diff --git a/openssl-sys/src/handwritten/bio.rs b/openssl-sys/src/handwritten/bio.rs
new file mode 100644
index 0000000..7d97522
--- /dev/null
+++ b/openssl-sys/src/handwritten/bio.rs
@@ -0,0 +1,107 @@
+use super::super::*;
+use libc::*;
+
+extern "C" {
+ pub fn BIO_set_flags(b: *mut BIO, flags: c_int);
+ pub fn BIO_clear_flags(b: *mut BIO, flags: c_int);
+}
+
+pub type bio_info_cb =
+ Option;
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum BIO_METHOD {}
+ } else {
+ #[repr(C)]
+ pub struct BIO_METHOD {
+ pub type_: c_int,
+ pub name: *const c_char,
+ pub bwrite: Option c_int>,
+ pub bread: Option c_int>,
+ pub bputs: Option c_int>,
+ pub bgets: Option c_int>,
+ pub ctrl: Option c_long>,
+ pub create: Option c_int>,
+ pub destroy: Option c_int>,
+ pub callback_ctrl: Option c_long>,
+ }
+ }
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn BIO_s_file() -> #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD;
+ pub fn BIO_new(type_: #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD) -> *mut BIO;
+ }
+}
+extern "C" {
+ #[cfg(not(osslconf = "OPENSSL_NO_STDIO"))]
+ pub fn BIO_new_fp(stream: *mut FILE, close_flag: c_int) -> *mut BIO;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_set_data(a: *mut BIO, data: *mut c_void);
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_get_data(a: *mut BIO) -> *mut c_void;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_set_init(a: *mut BIO, init: c_int);
+ pub fn BIO_write(b: *mut BIO, buf: *const c_void, len: c_int) -> c_int;
+ pub fn BIO_read(b: *mut BIO, buf: *mut c_void, len: c_int) -> c_int;
+ pub fn BIO_ctrl(b: *mut BIO, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
+ pub fn BIO_free_all(b: *mut BIO);
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn BIO_s_mem() -> #[const_ptr_if(any(ossl110, libressl280))] BIO_METHOD;
+ pub fn BIO_new_mem_buf(buf: #[const_ptr_if(any(ossl102, libressl280))] c_void, len: c_int) -> *mut BIO;
+ }
+}
+
+extern "C" {
+ pub fn BIO_new_socket(sock: c_int, close_flag: c_int) -> *mut BIO;
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_new(type_: c_int, name: *const c_char) -> *mut BIO_METHOD;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn BIO_meth_free(biom: *mut BIO_METHOD);
+}
+
+#[allow(clashing_extern_declarations)]
+extern "C" {
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_write"]
+ pub fn BIO_meth_set_write__fixed_rust(
+ biom: *mut BIO_METHOD,
+ write: Option c_int>,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_read"]
+ pub fn BIO_meth_set_read__fixed_rust(
+ biom: *mut BIO_METHOD,
+ read: Option c_int>,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_puts"]
+ pub fn BIO_meth_set_puts__fixed_rust(
+ biom: *mut BIO_METHOD,
+ read: Option c_int>,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_ctrl"]
+ pub fn BIO_meth_set_ctrl__fixed_rust(
+ biom: *mut BIO_METHOD,
+ read: Option c_long>,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_create"]
+ pub fn BIO_meth_set_create__fixed_rust(
+ biom: *mut BIO_METHOD,
+ create: Option c_int>,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ #[link_name = "BIO_meth_set_destroy"]
+ pub fn BIO_meth_set_destroy__fixed_rust(
+ biom: *mut BIO_METHOD,
+ destroy: Option c_int>,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/bn.rs b/openssl-sys/src/handwritten/bn.rs
new file mode 100644
index 0000000..81348f6
--- /dev/null
+++ b/openssl-sys/src/handwritten/bn.rs
@@ -0,0 +1,168 @@
+use super::super::*;
+use libc::*;
+
+extern "C" {
+ pub fn BN_CTX_new() -> *mut BN_CTX;
+ #[cfg(ossl110)]
+ pub fn BN_CTX_secure_new() -> *mut BN_CTX;
+ pub fn BN_CTX_free(ctx: *mut BN_CTX);
+ pub fn BN_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
+ #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
+ pub fn BN_pseudo_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
+ pub fn BN_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
+ #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
+ pub fn BN_pseudo_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
+ pub fn BN_new() -> *mut BIGNUM;
+ #[cfg(ossl110)]
+ pub fn BN_secure_new() -> *mut BIGNUM;
+ #[cfg(ossl110)]
+ pub fn BN_set_flags(b: *mut BIGNUM, n: c_int);
+ #[cfg(ossl110)]
+ pub fn BN_get_flags(b: *const BIGNUM, n: c_int) -> c_int;
+ pub fn BN_num_bits(bn: *const BIGNUM) -> c_int;
+ pub fn BN_clear_free(bn: *mut BIGNUM);
+ pub fn BN_bin2bn(s: *const u8, size: c_int, ret: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_bn2bin(a: *const BIGNUM, to: *mut u8) -> c_int;
+ #[cfg(ossl110)]
+ pub fn BN_bn2binpad(a: *const BIGNUM, to: *mut u8, tolen: c_int) -> c_int;
+ pub fn BN_sub(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
+ pub fn BN_add(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
+ pub fn BN_mul(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
+ pub fn BN_sqr(r: *mut BIGNUM, a: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
+ pub fn BN_set_negative(bn: *mut BIGNUM, n: c_int);
+ #[cfg(any(ossl110, libressl350))]
+ pub fn BN_is_negative(b: *const BIGNUM) -> c_int;
+
+ pub fn BN_div(
+ dv: *mut BIGNUM,
+ rem: *mut BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+ pub fn BN_nnmod(
+ rem: *mut BIGNUM,
+ a: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+ pub fn BN_mod_add(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+ pub fn BN_mod_sub(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+ pub fn BN_mod_mul(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+ pub fn BN_mod_sqr(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn BN_mod_word(r: *const BIGNUM, w: BN_ULONG) -> BN_ULONG;
+ pub fn BN_div_word(r: *mut BIGNUM, w: BN_ULONG) -> BN_ULONG;
+ pub fn BN_mul_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
+ pub fn BN_add_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
+ pub fn BN_sub_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
+ pub fn BN_set_word(bn: *mut BIGNUM, n: BN_ULONG) -> c_int;
+
+ pub fn BN_cmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
+ pub fn BN_free(bn: *mut BIGNUM);
+ pub fn BN_is_bit_set(a: *const BIGNUM, n: c_int) -> c_int;
+ pub fn BN_lshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
+ pub fn BN_lshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
+ pub fn BN_exp(r: *mut BIGNUM, a: *const BIGNUM, p: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
+
+ pub fn BN_mod_exp(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ p: *const BIGNUM,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn BN_mask_bits(a: *mut BIGNUM, n: c_int) -> c_int;
+ pub fn BN_rshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
+ pub fn BN_rshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
+ pub fn BN_bn2hex(a: *const BIGNUM) -> *mut c_char;
+ pub fn BN_bn2dec(a: *const BIGNUM) -> *mut c_char;
+ pub fn BN_hex2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
+ pub fn BN_dec2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
+ pub fn BN_gcd(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
+ pub fn BN_mod_inverse(
+ r: *mut BIGNUM,
+ a: *const BIGNUM,
+ n: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> *mut BIGNUM;
+ pub fn BN_clear(bn: *mut BIGNUM);
+ pub fn BN_dup(n: *const BIGNUM) -> *mut BIGNUM;
+ pub fn BN_ucmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
+ pub fn BN_set_bit(a: *mut BIGNUM, n: c_int) -> c_int;
+ pub fn BN_clear_bit(a: *mut BIGNUM, n: c_int) -> c_int;
+
+ pub fn BN_generate_prime_ex(
+ r: *mut BIGNUM,
+ bits: c_int,
+ safe: c_int,
+ add: *const BIGNUM,
+ rem: *const BIGNUM,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+ #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
+ pub fn BN_is_prime_ex(
+ p: *const BIGNUM,
+ checks: c_int,
+ ctx: *mut BN_CTX,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+ #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
+ pub fn BN_is_prime_fasttest_ex(
+ p: *const BIGNUM,
+ checks: c_int,
+ ctx: *mut BN_CTX,
+ do_trial_division: c_int,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ extern "C" {
+ pub fn BN_get_rfc2409_prime_768(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc2409_prime_1024(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_1536(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_2048(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_3072(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_4096(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_6144(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn BN_get_rfc3526_prime_8192(bn: *mut BIGNUM) -> *mut BIGNUM;
+ }
+ } else {
+ extern "C" {
+ pub fn get_rfc2409_prime_768(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc2409_prime_1024(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_1536(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_2048(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_3072(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_4096(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_6144(bn: *mut BIGNUM) -> *mut BIGNUM;
+ pub fn get_rfc3526_prime_8192(bn: *mut BIGNUM) -> *mut BIGNUM;
+ }
+ }
+}
diff --git a/openssl-sys/src/handwritten/cms.rs b/openssl-sys/src/handwritten/cms.rs
new file mode 100644
index 0000000..a13ea42
--- /dev/null
+++ b/openssl-sys/src/handwritten/cms.rs
@@ -0,0 +1,65 @@
+use super::super::*;
+use libc::*;
+
+pub enum CMS_ContentInfo {}
+
+extern "C" {
+ #[cfg(ossl101)]
+ pub fn CMS_ContentInfo_free(cms: *mut CMS_ContentInfo);
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(ossl101)]
+ pub fn i2d_CMS_ContentInfo(a: #[const_ptr_if(ossl300)] CMS_ContentInfo, pp: *mut *mut c_uchar) -> c_int;
+ }
+}
+
+extern "C" {
+ #[cfg(ossl101)]
+ pub fn d2i_CMS_ContentInfo(
+ a: *mut *mut CMS_ContentInfo,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut CMS_ContentInfo;
+
+ #[cfg(ossl101)]
+ pub fn SMIME_read_CMS(bio: *mut BIO, bcont: *mut *mut BIO) -> *mut CMS_ContentInfo;
+
+ #[cfg(ossl101)]
+ pub fn CMS_sign(
+ signcert: *mut X509,
+ pkey: *mut EVP_PKEY,
+ certs: *mut stack_st_X509,
+ data: *mut BIO,
+ flags: c_uint,
+ ) -> *mut CMS_ContentInfo;
+
+ #[cfg(ossl101)]
+ pub fn CMS_verify(
+ cms: *mut CMS_ContentInfo,
+ certs: *mut stack_st_X509,
+ store: *mut X509_STORE,
+ detached_data: *mut BIO,
+ out: *mut BIO,
+ flags: c_uint,
+ ) -> c_int;
+
+ #[cfg(ossl101)]
+ pub fn CMS_encrypt(
+ certs: *mut stack_st_X509,
+ data: *mut BIO,
+ cipher: *const EVP_CIPHER,
+ flags: c_uint,
+ ) -> *mut CMS_ContentInfo;
+
+ #[cfg(ossl101)]
+ pub fn CMS_decrypt(
+ cms: *mut CMS_ContentInfo,
+ pkey: *mut EVP_PKEY,
+ cert: *mut X509,
+ dcont: *mut BIO,
+ out: *mut BIO,
+ flags: c_uint,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/conf.rs b/openssl-sys/src/handwritten/conf.rs
new file mode 100644
index 0000000..2348d7d
--- /dev/null
+++ b/openssl-sys/src/handwritten/conf.rs
@@ -0,0 +1,7 @@
+use super::super::*;
+
+extern "C" {
+ pub fn NCONF_new(meth: *mut CONF_METHOD) -> *mut CONF;
+ pub fn NCONF_default() -> *mut CONF_METHOD;
+ pub fn NCONF_free(conf: *mut CONF);
+}
diff --git a/openssl-sys/src/handwritten/crypto.rs b/openssl-sys/src/handwritten/crypto.rs
new file mode 100644
index 0000000..62ccbce
--- /dev/null
+++ b/openssl-sys/src/handwritten/crypto.rs
@@ -0,0 +1,85 @@
+use super::super::*;
+use libc::*;
+
+stack!(stack_st_void);
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl271))] {
+ extern "C" {
+ pub fn OpenSSL_version_num() -> c_ulong;
+ pub fn OpenSSL_version(key: c_int) -> *const c_char;
+ }
+ } else {
+ extern "C" {
+ pub fn SSLeay() -> c_ulong;
+ pub fn SSLeay_version(key: c_int) -> *const c_char;
+ }
+ }
+}
+
+extern "C" {
+ #[cfg(any(ossl110, libressl))]
+ pub fn CRYPTO_get_ex_new_index(
+ class_index: c_int,
+ argl: c_long,
+ argp: *mut c_void,
+ new_func: Option,
+ dup_func: Option,
+ free_func: Option,
+ ) -> c_int;
+
+ #[cfg(not(ossl110))]
+ pub fn CRYPTO_num_locks() -> c_int;
+}
+
+#[allow(clashing_extern_declarations)]
+extern "C" {
+ #[cfg(not(ossl110))]
+ #[link_name = "CRYPTO_set_locking_callback"]
+ pub fn CRYPTO_set_locking_callback__fixed_rust(
+ func: Option,
+ );
+
+ #[cfg(not(ossl110))]
+ #[link_name = "CRYPTO_set_id_callback"]
+ pub fn CRYPTO_set_id_callback__fixed_rust(func: Option c_ulong>);
+}
+
+extern "C" {
+ #[cfg(not(ossl110))]
+ pub fn CRYPTO_add_lock(
+ pointer: *mut c_int,
+ amount: c_int,
+ type_: c_int,
+ file: *const c_char,
+ line: c_int,
+ ) -> c_int;
+}
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ extern "C" {
+ pub fn CRYPTO_malloc(num: size_t, file: *const c_char, line: c_int) -> *mut c_void;
+ pub fn CRYPTO_free(buf: *mut c_void, file: *const c_char, line: c_int);
+ }
+ } else {
+ extern "C" {
+ pub fn CRYPTO_malloc(num: c_int, file: *const c_char, line: c_int) -> *mut c_void;
+ pub fn CRYPTO_free(buf: *mut c_void);
+ }
+ }
+}
+
+extern "C" {
+ #[cfg(all(ossl101, not(ossl300)))]
+ pub fn FIPS_mode() -> c_int;
+ #[cfg(all(ossl101, not(ossl300)))]
+ pub fn FIPS_mode_set(onoff: c_int) -> c_int;
+
+ pub fn CRYPTO_memcmp(a: *const c_void, b: *const c_void, len: size_t) -> c_int;
+
+ #[cfg(ossl300)]
+ pub fn OSSL_LIB_CTX_new() -> *mut OSSL_LIB_CTX;
+ #[cfg(ossl300)]
+ pub fn OSSL_LIB_CTX_free(libcts: *mut OSSL_LIB_CTX);
+}
diff --git a/openssl-sys/src/handwritten/dh.rs b/openssl-sys/src/handwritten/dh.rs
new file mode 100644
index 0000000..a4de122
--- /dev/null
+++ b/openssl-sys/src/handwritten/dh.rs
@@ -0,0 +1,50 @@
+use super::super::*;
+
+extern "C" {
+ pub fn DH_new() -> *mut DH;
+ pub fn DH_free(dh: *mut DH);
+
+ pub fn DH_generate_parameters(
+ prime_len: c_int,
+ generator: c_int,
+ callback: Option,
+ cb_arg: *mut c_void,
+ ) -> *mut DH;
+
+ pub fn DH_generate_parameters_ex(
+ dh: *mut DH,
+ prime_len: c_int,
+ generator: c_int,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+
+ pub fn DH_generate_key(dh: *mut DH) -> c_int;
+ pub fn DH_compute_key(key: *mut c_uchar, pub_key: *const BIGNUM, dh: *mut DH) -> c_int;
+ pub fn DH_size(dh: *const DH) -> c_int;
+
+ pub fn d2i_DHparams(k: *mut *mut DH, pp: *mut *const c_uchar, length: c_long) -> *mut DH;
+ pub fn i2d_DHparams(dh: *const DH, pp: *mut *mut c_uchar) -> c_int;
+
+ #[cfg(ossl102)]
+ pub fn DH_get_1024_160() -> *mut DH;
+ #[cfg(ossl102)]
+ pub fn DH_get_2048_224() -> *mut DH;
+ #[cfg(ossl102)]
+ pub fn DH_get_2048_256() -> *mut DH;
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn DH_set0_pqg(dh: *mut DH, p: *mut BIGNUM, q: *mut BIGNUM, g: *mut BIGNUM) -> c_int;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn DH_get0_pqg(
+ dh: *const DH,
+ p: *mut *const BIGNUM,
+ q: *mut *const BIGNUM,
+ g: *mut *const BIGNUM,
+ );
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn DH_set0_key(dh: *mut DH, pub_key: *mut BIGNUM, priv_key: *mut BIGNUM) -> c_int;
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn DH_get0_key(dh: *const DH, pub_key: *mut *const BIGNUM, priv_key: *mut *const BIGNUM);
+}
diff --git a/openssl-sys/src/handwritten/dsa.rs b/openssl-sys/src/handwritten/dsa.rs
new file mode 100644
index 0000000..be25f23
--- /dev/null
+++ b/openssl-sys/src/handwritten/dsa.rs
@@ -0,0 +1,85 @@
+use libc::*;
+
+use super::super::*;
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum DSA_SIG {}
+ } else {
+ #[repr(C)]
+ pub struct DSA_SIG {
+ pub r: *mut BIGNUM,
+ pub s: *mut BIGNUM,
+ }
+ }
+}
+
+extern "C" {
+ pub fn DSA_new() -> *mut DSA;
+ pub fn DSA_free(dsa: *mut DSA);
+ pub fn DSA_up_ref(dsa: *mut DSA) -> c_int;
+ pub fn DSA_size(dsa: *const DSA) -> c_int;
+ pub fn DSA_sign(
+ dummy: c_int,
+ dgst: *const c_uchar,
+ len: c_int,
+ sigret: *mut c_uchar,
+ siglen: *mut c_uint,
+ dsa: *mut DSA,
+ ) -> c_int;
+ pub fn DSA_verify(
+ dummy: c_int,
+ dgst: *const c_uchar,
+ len: c_int,
+ sigbuf: *const c_uchar,
+ siglen: c_int,
+ dsa: *mut DSA,
+ ) -> c_int;
+
+ pub fn d2i_DSAPublicKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long) -> *mut DSA;
+ pub fn d2i_DSAPrivateKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long)
+ -> *mut DSA;
+
+ pub fn DSA_generate_parameters_ex(
+ dsa: *mut DSA,
+ bits: c_int,
+ seed: *const c_uchar,
+ seed_len: c_int,
+ counter_ref: *mut c_int,
+ h_ret: *mut c_ulong,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+
+ pub fn DSA_generate_key(dsa: *mut DSA) -> c_int;
+ pub fn i2d_DSAPublicKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
+ pub fn i2d_DSAPrivateKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_get0_pqg(
+ d: *const DSA,
+ p: *mut *const BIGNUM,
+ q: *mut *const BIGNUM,
+ q: *mut *const BIGNUM,
+ );
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_set0_pqg(d: *mut DSA, p: *mut BIGNUM, q: *mut BIGNUM, q: *mut BIGNUM) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_get0_key(d: *const DSA, pub_key: *mut *const BIGNUM, priv_key: *mut *const BIGNUM);
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_set0_key(d: *mut DSA, pub_key: *mut BIGNUM, priv_key: *mut BIGNUM) -> c_int;
+ pub fn d2i_DSA_SIG(
+ sig: *mut *mut DSA_SIG,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut DSA_SIG;
+ pub fn i2d_DSA_SIG(a: *const DSA_SIG, pp: *mut *mut c_uchar) -> c_int;
+
+ pub fn DSA_SIG_new() -> *mut DSA_SIG;
+ pub fn DSA_SIG_free(sig: *mut DSA_SIG);
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_SIG_get0(sig: *const DSA_SIG, pr: *mut *const BIGNUM, ps: *mut *const BIGNUM);
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn DSA_SIG_set0(sig: *mut DSA_SIG, pr: *mut BIGNUM, ps: *mut BIGNUM) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/ec.rs b/openssl-sys/src/handwritten/ec.rs
new file mode 100644
index 0000000..6ee475f
--- /dev/null
+++ b/openssl-sys/src/handwritten/ec.rs
@@ -0,0 +1,255 @@
+use super::super::*;
+use libc::*;
+
+#[repr(C)]
+#[derive(Copy, Clone)]
+pub enum point_conversion_form_t {
+ POINT_CONVERSION_COMPRESSED = 2,
+ POINT_CONVERSION_UNCOMPRESSED = 4,
+ POINT_CONVERSION_HYBRID = 6,
+}
+
+pub enum EC_METHOD {}
+pub enum EC_GROUP {}
+pub enum EC_POINT {}
+
+extern "C" {
+ #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
+ pub fn EC_GF2m_simple_method() -> *const EC_METHOD;
+
+ pub fn EC_GROUP_new(meth: *const EC_METHOD) -> *mut EC_GROUP;
+
+ pub fn EC_GROUP_free(group: *mut EC_GROUP);
+
+ pub fn EC_GROUP_get_order(
+ group: *const EC_GROUP,
+ order: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_GROUP_get_cofactor(
+ group: *const EC_GROUP,
+ cofactor: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_GROUP_get0_generator(group: *const EC_GROUP) -> *const EC_POINT;
+
+ pub fn EC_GROUP_set_generator(
+ group: *mut EC_GROUP,
+ generator: *const EC_POINT,
+ order: *const BIGNUM,
+ cofactor: *const BIGNUM,
+ ) -> c_int;
+
+ pub fn EC_GROUP_get_curve_name(group: *const EC_GROUP) -> c_int;
+
+ pub fn EC_GROUP_set_asn1_flag(key: *mut EC_GROUP, flag: c_int);
+
+ pub fn EC_GROUP_get_curve_GFp(
+ group: *const EC_GROUP,
+ p: *mut BIGNUM,
+ a: *mut BIGNUM,
+ b: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
+ pub fn EC_GROUP_get_curve_GF2m(
+ group: *const EC_GROUP,
+ p: *mut BIGNUM,
+ a: *mut BIGNUM,
+ b: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_GROUP_get_degree(group: *const EC_GROUP) -> c_int;
+
+ #[cfg(ossl110)]
+ pub fn EC_GROUP_order_bits(group: *const EC_GROUP) -> c_int;
+
+ pub fn EC_GROUP_new_curve_GFp(
+ p: *const BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> *mut EC_GROUP;
+
+ #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
+ pub fn EC_GROUP_new_curve_GF2m(
+ p: *const BIGNUM,
+ a: *const BIGNUM,
+ b: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> *mut EC_GROUP;
+
+ pub fn EC_GROUP_new_by_curve_name(nid: c_int) -> *mut EC_GROUP;
+
+ pub fn EC_POINT_is_at_infinity(group: *const EC_GROUP, point: *const EC_POINT) -> c_int;
+
+ pub fn EC_POINT_is_on_curve(
+ group: *const EC_GROUP,
+ point: *const EC_POINT,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_new(group: *const EC_GROUP) -> *mut EC_POINT;
+
+ pub fn EC_POINT_free(point: *mut EC_POINT);
+
+ pub fn EC_POINT_dup(p: *const EC_POINT, group: *const EC_GROUP) -> *mut EC_POINT;
+
+ #[cfg(ossl111)]
+ pub fn EC_POINT_get_affine_coordinates(
+ group: *const EC_GROUP,
+ p: *const EC_POINT,
+ x: *mut BIGNUM,
+ y: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_get_affine_coordinates_GFp(
+ group: *const EC_GROUP,
+ p: *const EC_POINT,
+ x: *mut BIGNUM,
+ y: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_set_affine_coordinates_GFp(
+ group: *const EC_GROUP,
+ p: *mut EC_POINT,
+ x: *const BIGNUM,
+ y: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
+ pub fn EC_POINT_get_affine_coordinates_GF2m(
+ group: *const EC_GROUP,
+ p: *const EC_POINT,
+ x: *mut BIGNUM,
+ y: *mut BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_point2oct(
+ group: *const EC_GROUP,
+ p: *const EC_POINT,
+ form: point_conversion_form_t,
+ buf: *mut c_uchar,
+ len: size_t,
+ ctx: *mut BN_CTX,
+ ) -> size_t;
+
+ pub fn EC_POINT_oct2point(
+ group: *const EC_GROUP,
+ p: *mut EC_POINT,
+ buf: *const c_uchar,
+ len: size_t,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_add(
+ group: *const EC_GROUP,
+ r: *mut EC_POINT,
+ a: *const EC_POINT,
+ b: *const EC_POINT,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_invert(group: *const EC_GROUP, r: *mut EC_POINT, ctx: *mut BN_CTX) -> c_int;
+
+ pub fn EC_POINT_cmp(
+ group: *const EC_GROUP,
+ a: *const EC_POINT,
+ b: *const EC_POINT,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_POINT_mul(
+ group: *const EC_GROUP,
+ r: *mut EC_POINT,
+ n: *const BIGNUM,
+ q: *const EC_POINT,
+ m: *const BIGNUM,
+ ctx: *mut BN_CTX,
+ ) -> c_int;
+
+ pub fn EC_KEY_new() -> *mut EC_KEY;
+
+ pub fn EC_KEY_new_by_curve_name(nid: c_int) -> *mut EC_KEY;
+
+ pub fn EC_KEY_free(key: *mut EC_KEY);
+
+ pub fn EC_KEY_dup(key: *const EC_KEY) -> *mut EC_KEY;
+
+ pub fn EC_KEY_up_ref(key: *mut EC_KEY) -> c_int;
+
+ pub fn EC_KEY_get0_group(key: *const EC_KEY) -> *const EC_GROUP;
+
+ pub fn EC_KEY_set_group(key: *mut EC_KEY, group: *const EC_GROUP) -> c_int;
+
+ pub fn EC_KEY_get0_private_key(key: *const EC_KEY) -> *const BIGNUM;
+
+ pub fn EC_KEY_set_private_key(key: *mut EC_KEY, key: *const BIGNUM) -> c_int;
+
+ pub fn EC_KEY_get0_public_key(key: *const EC_KEY) -> *const EC_POINT;
+
+ pub fn EC_KEY_set_public_key(key: *mut EC_KEY, key: *const EC_POINT) -> c_int;
+
+ pub fn EC_KEY_generate_key(key: *mut EC_KEY) -> c_int;
+
+ pub fn EC_KEY_check_key(key: *const EC_KEY) -> c_int;
+
+ pub fn EC_KEY_set_public_key_affine_coordinates(
+ key: *mut EC_KEY,
+ x: *mut BIGNUM,
+ y: *mut BIGNUM,
+ ) -> c_int;
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum ECDSA_SIG {}
+ } else {
+ #[repr(C)]
+ pub struct ECDSA_SIG {
+ pub r: *mut BIGNUM,
+ pub s: *mut BIGNUM,
+ }
+ }
+}
+
+extern "C" {
+ pub fn ECDSA_SIG_new() -> *mut ECDSA_SIG;
+
+ pub fn ECDSA_SIG_free(sig: *mut ECDSA_SIG);
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn ECDSA_SIG_get0(sig: *const ECDSA_SIG, pr: *mut *const BIGNUM, ps: *mut *const BIGNUM);
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn ECDSA_SIG_set0(sig: *mut ECDSA_SIG, pr: *mut BIGNUM, ps: *mut BIGNUM) -> c_int;
+
+ pub fn ECDSA_do_sign(
+ dgst: *const c_uchar,
+ dgst_len: c_int,
+ eckey: *mut EC_KEY,
+ ) -> *mut ECDSA_SIG;
+
+ pub fn ECDSA_do_verify(
+ dgst: *const c_uchar,
+ dgst_len: c_int,
+ sig: *const ECDSA_SIG,
+ eckey: *mut EC_KEY,
+ ) -> c_int;
+
+ pub fn d2i_ECDSA_SIG(
+ sig: *mut *mut ECDSA_SIG,
+ inp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut ECDSA_SIG;
+
+ pub fn i2d_ECDSA_SIG(sig: *const ECDSA_SIG, out: *mut *mut c_uchar) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/err.rs b/openssl-sys/src/handwritten/err.rs
new file mode 100644
index 0000000..5653c1d
--- /dev/null
+++ b/openssl-sys/src/handwritten/err.rs
@@ -0,0 +1,55 @@
+use super::super::*;
+use libc::*;
+
+#[repr(C)]
+pub struct ERR_STRING_DATA {
+ pub error: c_ulong,
+ pub string: *const c_char,
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn ERR_new();
+ pub fn ERR_set_debug(file: *const c_char, line: c_int, func: *const c_char);
+ pub fn ERR_set_error(lib: c_int, reason: c_int, fmt: *const c_char, ...);
+ }
+ } else {
+ extern "C" {
+ pub fn ERR_put_error(lib: c_int, func: c_int, reason: c_int, file: *const c_char, line: c_int);
+ }
+ }
+}
+
+extern "C" {
+ pub fn ERR_set_error_data(data: *mut c_char, flags: c_int);
+
+ pub fn ERR_get_error() -> c_ulong;
+ #[cfg(ossl300)]
+ pub fn ERR_get_error_all(
+ file: *mut *const c_char,
+ line: *mut c_int,
+ func: *mut *const c_char,
+ data: *mut *const c_char,
+ flags: *mut c_int,
+ ) -> c_ulong;
+ pub fn ERR_get_error_line_data(
+ file: *mut *const c_char,
+ line: *mut c_int,
+ data: *mut *const c_char,
+ flags: *mut c_int,
+ ) -> c_ulong;
+ pub fn ERR_peek_last_error() -> c_ulong;
+ pub fn ERR_clear_error();
+ pub fn ERR_lib_error_string(err: c_ulong) -> *const c_char;
+ pub fn ERR_func_error_string(err: c_ulong) -> *const c_char;
+ pub fn ERR_reason_error_string(err: c_ulong) -> *const c_char;
+ #[cfg(ossl110)]
+ pub fn ERR_load_strings(lib: c_int, str: *mut ERR_STRING_DATA) -> c_int;
+ #[cfg(not(ossl110))]
+ pub fn ERR_load_strings(lib: c_int, str: *mut ERR_STRING_DATA);
+ #[cfg(not(ossl110))]
+ pub fn ERR_load_crypto_strings();
+
+ pub fn ERR_get_next_error_library() -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/evp.rs b/openssl-sys/src/handwritten/evp.rs
new file mode 100644
index 0000000..1a05b7e
--- /dev/null
+++ b/openssl-sys/src/handwritten/evp.rs
@@ -0,0 +1,600 @@
+use super::super::*;
+use libc::*;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn EVP_MD_get_block_size(md: *const EVP_MD) -> c_int;
+ pub fn EVP_MD_get_size(md: *const EVP_MD) -> c_int;
+ pub fn EVP_MD_get_type(md: *const EVP_MD) -> c_int;
+
+ pub fn EVP_MD_CTX_get0_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD;
+
+ pub fn EVP_CIPHER_get_key_length(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_get_block_size(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_get_iv_length(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_get_nid(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_fetch(
+ ctx: *mut OSSL_LIB_CTX,
+ algorithm: *const c_char,
+ properties: *const c_char,
+ ) -> *mut EVP_CIPHER;
+ pub fn EVP_CIPHER_free(cipher: *mut EVP_CIPHER);
+
+ pub fn EVP_CIPHER_CTX_get0_cipher(ctx: *const EVP_CIPHER_CTX) -> *const EVP_CIPHER;
+ pub fn EVP_CIPHER_CTX_get_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_get_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_get_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_get_tag_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_get_num(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ }
+ } else {
+ extern "C" {
+ pub fn EVP_MD_block_size(md: *const EVP_MD) -> c_int;
+ pub fn EVP_MD_size(md: *const EVP_MD) -> c_int;
+ pub fn EVP_MD_type(md: *const EVP_MD) -> c_int;
+
+ pub fn EVP_MD_CTX_md(ctx: *const EVP_MD_CTX) -> *const EVP_MD;
+
+ pub fn EVP_CIPHER_key_length(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_block_size(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_iv_length(cipher: *const EVP_CIPHER) -> c_int;
+ pub fn EVP_CIPHER_nid(cipher: *const EVP_CIPHER) -> c_int;
+
+ pub fn EVP_CIPHER_CTX_cipher(ctx: *const EVP_CIPHER_CTX) -> *const EVP_CIPHER;
+ pub fn EVP_CIPHER_CTX_block_size(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_key_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_iv_length(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ #[cfg(ossl110)]
+ pub fn EVP_CIPHER_CTX_num(ctx: *const EVP_CIPHER_CTX) -> c_int;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ extern "C" {
+ pub fn EVP_MD_CTX_new() -> *mut EVP_MD_CTX;
+ pub fn EVP_MD_CTX_free(ctx: *mut EVP_MD_CTX);
+ }
+ } else {
+ extern "C" {
+ pub fn EVP_MD_CTX_create() -> *mut EVP_MD_CTX;
+ pub fn EVP_MD_CTX_destroy(ctx: *mut EVP_MD_CTX);
+ }
+ }
+}
+
+extern "C" {
+ pub fn EVP_DigestInit_ex(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD, imple: *mut ENGINE)
+ -> c_int;
+ pub fn EVP_DigestUpdate(ctx: *mut EVP_MD_CTX, data: *const c_void, n: size_t) -> c_int;
+ pub fn EVP_DigestFinal_ex(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
+ #[cfg(ossl300)]
+ pub fn EVP_Q_digest(
+ libctx: *mut OSSL_LIB_CTX,
+ name: *const c_char,
+ propq: *const c_char,
+ data: *const c_void,
+ count: size_t,
+ md: *mut c_uchar,
+ size: *mut size_t,
+ ) -> c_int;
+ pub fn EVP_DigestInit(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD) -> c_int;
+ pub fn EVP_DigestFinal(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
+ #[cfg(ossl111)]
+ pub fn EVP_DigestFinalXOF(ctx: *mut EVP_MD_CTX, res: *mut u8, len: usize) -> c_int;
+
+ #[cfg(ossl300)]
+ pub fn EVP_MD_fetch(
+ ctx: *mut OSSL_LIB_CTX,
+ algorithm: *const c_char,
+ properties: *const c_char,
+ ) -> *mut EVP_MD;
+
+ #[cfg(ossl300)]
+ pub fn EVP_MD_free(md: *mut EVP_MD);
+
+ pub fn EVP_BytesToKey(
+ typ: *const EVP_CIPHER,
+ md: *const EVP_MD,
+ salt: *const u8,
+ data: *const u8,
+ datalen: c_int,
+ count: c_int,
+ key: *mut u8,
+ iv: *mut u8,
+ ) -> c_int;
+
+ pub fn EVP_CipherInit(
+ ctx: *mut EVP_CIPHER_CTX,
+ evp: *const EVP_CIPHER,
+ key: *const u8,
+ iv: *const u8,
+ mode: c_int,
+ ) -> c_int;
+ pub fn EVP_CipherInit_ex(
+ ctx: *mut EVP_CIPHER_CTX,
+ type_: *const EVP_CIPHER,
+ impl_: *mut ENGINE,
+ key: *const c_uchar,
+ iv: *const c_uchar,
+ enc: c_int,
+ ) -> c_int;
+ pub fn EVP_CipherUpdate(
+ ctx: *mut EVP_CIPHER_CTX,
+ outbuf: *mut u8,
+ outlen: *mut c_int,
+ inbuf: *const u8,
+ inlen: c_int,
+ ) -> c_int;
+ pub fn EVP_CipherFinal(ctx: *mut EVP_CIPHER_CTX, res: *mut u8, len: *mut c_int) -> c_int;
+
+ pub fn EVP_DigestSignInit(
+ ctx: *mut EVP_MD_CTX,
+ pctx: *mut *mut EVP_PKEY_CTX,
+ type_: *const EVP_MD,
+ e: *mut ENGINE,
+ pkey: *mut EVP_PKEY,
+ ) -> c_int;
+
+ #[cfg(ossl300)]
+ pub fn EVP_DigestSignUpdate(ctx: *mut EVP_MD_CTX, data: *const c_void, dsize: size_t) -> c_int;
+ pub fn EVP_DigestSignFinal(
+ ctx: *mut EVP_MD_CTX,
+ sig: *mut c_uchar,
+ siglen: *mut size_t,
+ ) -> c_int;
+ pub fn EVP_DigestVerifyInit(
+ ctx: *mut EVP_MD_CTX,
+ pctx: *mut *mut EVP_PKEY_CTX,
+ type_: *const EVP_MD,
+ e: *mut ENGINE,
+ pkey: *mut EVP_PKEY,
+ ) -> c_int;
+ #[cfg(ossl300)]
+ pub fn EVP_DigestVerifyUpdate(
+ ctx: *mut EVP_MD_CTX,
+ data: *const c_void,
+ dsize: size_t,
+ ) -> c_int;
+ pub fn EVP_SealInit(
+ ctx: *mut EVP_CIPHER_CTX,
+ type_: *const EVP_CIPHER,
+ ek: *mut *mut c_uchar,
+ ekl: *mut c_int,
+ iv: *mut c_uchar,
+ pubk: *mut *mut EVP_PKEY,
+ npubk: c_int,
+ ) -> c_int;
+ pub fn EVP_SealFinal(ctx: *mut EVP_CIPHER_CTX, out: *mut c_uchar, outl: *mut c_int) -> c_int;
+ pub fn EVP_EncryptInit_ex(
+ ctx: *mut EVP_CIPHER_CTX,
+ cipher: *const EVP_CIPHER,
+ impl_: *mut ENGINE,
+ key: *const c_uchar,
+ iv: *const c_uchar,
+ ) -> c_int;
+ pub fn EVP_EncryptUpdate(
+ ctx: *mut EVP_CIPHER_CTX,
+ out: *mut c_uchar,
+ outl: *mut c_int,
+ in_: *const u8,
+ inl: c_int,
+ ) -> c_int;
+ pub fn EVP_EncryptFinal_ex(
+ ctx: *mut EVP_CIPHER_CTX,
+ out: *mut c_uchar,
+ outl: *mut c_int,
+ ) -> c_int;
+ pub fn EVP_OpenInit(
+ ctx: *mut EVP_CIPHER_CTX,
+ type_: *const EVP_CIPHER,
+ ek: *const c_uchar,
+ ekl: c_int,
+ iv: *const c_uchar,
+ priv_: *mut EVP_PKEY,
+ ) -> c_int;
+ pub fn EVP_OpenFinal(ctx: *mut EVP_CIPHER_CTX, out: *mut c_uchar, outl: *mut c_int) -> c_int;
+ pub fn EVP_DecryptInit_ex(
+ ctx: *mut EVP_CIPHER_CTX,
+ cipher: *const EVP_CIPHER,
+ impl_: *mut ENGINE,
+ key: *const c_uchar,
+ iv: *const c_uchar,
+ ) -> c_int;
+ pub fn EVP_DecryptUpdate(
+ ctx: *mut EVP_CIPHER_CTX,
+ out: *mut c_uchar,
+ outl: *mut c_int,
+ in_: *const u8,
+ inl: c_int,
+ ) -> c_int;
+ pub fn EVP_DecryptFinal_ex(
+ ctx: *mut EVP_CIPHER_CTX,
+ outm: *mut c_uchar,
+ outl: *mut c_int,
+ ) -> c_int;
+}
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn EVP_PKEY_get_size(pkey: *const EVP_PKEY) -> c_int;
+ }
+ } else {
+ const_ptr_api! {
+ extern "C" {
+ pub fn EVP_PKEY_size(pkey: #[const_ptr_if(any(ossl111b, libressl280))] EVP_PKEY) -> c_int;
+ }
+ }
+ }
+}
+cfg_if! {
+ if #[cfg(any(ossl111, libressl370))] {
+ extern "C" {
+ pub fn EVP_DigestSign(
+ ctx: *mut EVP_MD_CTX,
+ sigret: *mut c_uchar,
+ siglen: *mut size_t,
+ tbs: *const c_uchar,
+ tbslen: size_t
+ ) -> c_int;
+
+ pub fn EVP_DigestVerify(
+ ctx: *mut EVP_MD_CTX,
+ sigret: *const c_uchar,
+ siglen: size_t,
+ tbs: *const c_uchar,
+ tbslen: size_t
+ ) -> c_int;
+ }
+ }
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn EVP_DigestVerifyFinal(
+ ctx: *mut EVP_MD_CTX,
+ sigret: #[const_ptr_if(any(ossl102, libressl280))] c_uchar,
+ siglen: size_t,
+ ) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn EVP_CIPHER_CTX_new() -> *mut EVP_CIPHER_CTX;
+ pub fn EVP_CIPHER_CTX_free(ctx: *mut EVP_CIPHER_CTX);
+ pub fn EVP_MD_CTX_copy_ex(dst: *mut EVP_MD_CTX, src: *const EVP_MD_CTX) -> c_int;
+ #[cfg(ossl111)]
+ pub fn EVP_MD_CTX_reset(ctx: *mut EVP_MD_CTX) -> c_int;
+ pub fn EVP_CIPHER_CTX_set_key_length(ctx: *mut EVP_CIPHER_CTX, keylen: c_int) -> c_int;
+ pub fn EVP_CIPHER_CTX_set_padding(ctx: *mut EVP_CIPHER_CTX, padding: c_int) -> c_int;
+ pub fn EVP_CIPHER_CTX_ctrl(
+ ctx: *mut EVP_CIPHER_CTX,
+ type_: c_int,
+ arg: c_int,
+ ptr: *mut c_void,
+ ) -> c_int;
+ pub fn EVP_CIPHER_CTX_rand_key(ctx: *mut EVP_CIPHER_CTX, key: *mut c_uchar) -> c_int;
+
+ pub fn EVP_md_null() -> *const EVP_MD;
+ pub fn EVP_md5() -> *const EVP_MD;
+ pub fn EVP_sha1() -> *const EVP_MD;
+ pub fn EVP_sha224() -> *const EVP_MD;
+ pub fn EVP_sha256() -> *const EVP_MD;
+ pub fn EVP_sha384() -> *const EVP_MD;
+ pub fn EVP_sha512() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_sha3_224() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_sha3_256() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_sha3_384() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_sha3_512() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_shake128() -> *const EVP_MD;
+ #[cfg(ossl111)]
+ pub fn EVP_shake256() -> *const EVP_MD;
+ pub fn EVP_ripemd160() -> *const EVP_MD;
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM3")))]
+ pub fn EVP_sm3() -> *const EVP_MD;
+ pub fn EVP_des_ecb() -> *const EVP_CIPHER;
+ pub fn EVP_des_ede3() -> *const EVP_CIPHER;
+ pub fn EVP_des_ede3_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_des_ede3_cfb64() -> *const EVP_CIPHER;
+ pub fn EVP_des_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_rc4() -> *const EVP_CIPHER;
+ pub fn EVP_bf_ecb() -> *const EVP_CIPHER;
+ pub fn EVP_bf_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_bf_cfb64() -> *const EVP_CIPHER;
+ pub fn EVP_bf_ofb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_ecb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_cfb1() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_cfb8() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_cfb128() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_ctr() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_ccm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_gcm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_xts() -> *const EVP_CIPHER;
+ pub fn EVP_aes_128_ofb() -> *const EVP_CIPHER;
+ #[cfg(ossl110)]
+ pub fn EVP_aes_128_ocb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_ecb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_cfb1() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_cfb8() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_cfb128() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_ctr() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_ccm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_gcm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_192_ofb() -> *const EVP_CIPHER;
+ #[cfg(ossl110)]
+ pub fn EVP_aes_192_ocb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_ecb() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_cbc() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_cfb1() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_cfb8() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_cfb128() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_ctr() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_ccm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_gcm() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_xts() -> *const EVP_CIPHER;
+ pub fn EVP_aes_256_ofb() -> *const EVP_CIPHER;
+ #[cfg(ossl110)]
+ pub fn EVP_aes_256_ocb() -> *const EVP_CIPHER;
+ #[cfg(all(ossl110, not(osslconf = "OPENSSL_NO_CHACHA")))]
+ pub fn EVP_chacha20() -> *const EVP_CIPHER;
+ #[cfg(all(ossl110, not(osslconf = "OPENSSL_NO_CHACHA")))]
+ pub fn EVP_chacha20_poly1305() -> *const EVP_CIPHER;
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ pub fn EVP_seed_cbc() -> *const EVP_CIPHER;
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ pub fn EVP_seed_cfb128() -> *const EVP_CIPHER;
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ pub fn EVP_seed_ecb() -> *const EVP_CIPHER;
+ #[cfg(not(osslconf = "OPENSSL_NO_SEED"))]
+ pub fn EVP_seed_ofb() -> *const EVP_CIPHER;
+
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn EVP_sm4_ecb() -> *const EVP_CIPHER;
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn EVP_sm4_cbc() -> *const EVP_CIPHER;
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn EVP_sm4_cfb128() -> *const EVP_CIPHER;
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn EVP_sm4_ofb() -> *const EVP_CIPHER;
+ #[cfg(all(any(ossl111, libressl291), not(osslconf = "OPENSSL_NO_SM4")))]
+ pub fn EVP_sm4_ctr() -> *const EVP_CIPHER;
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_128_cfb128() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_128_ecb() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_192_cfb128() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_192_ecb() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_256_cfb128() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAMELLIA")))]
+ pub fn EVP_camellia_256_ecb() -> *const EVP_CIPHER;
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAST")))]
+ pub fn EVP_cast5_cfb64() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_CAST")))]
+ pub fn EVP_cast5_ecb() -> *const EVP_CIPHER;
+
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_IDEA")))]
+ pub fn EVP_idea_cfb64() -> *const EVP_CIPHER;
+ #[cfg(not(any(boringssl, osslconf = "OPENSSL_NO_IDEA")))]
+ pub fn EVP_idea_ecb() -> *const EVP_CIPHER;
+
+ #[cfg(not(ossl110))]
+ pub fn OPENSSL_add_all_algorithms_noconf();
+
+ pub fn EVP_get_digestbyname(name: *const c_char) -> *const EVP_MD;
+ pub fn EVP_get_cipherbyname(name: *const c_char) -> *const EVP_CIPHER;
+}
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn EVP_PKEY_get_id(pkey: *const EVP_PKEY) -> c_int;
+ pub fn EVP_PKEY_get_bits(key: *const EVP_PKEY) -> c_int;
+ pub fn EVP_PKEY_get_security_bits(key: *const EVP_PKEY) -> c_int;
+ }
+
+ #[inline]
+ pub unsafe fn EVP_PKEY_id(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_id(pkey)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_PKEY_bits(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_bits(pkey)
+ }
+
+ #[inline]
+ pub unsafe fn EVP_PKEY_security_bits(pkey: *const EVP_PKEY) -> c_int {
+ EVP_PKEY_get_security_bits(pkey)
+ }
+
+ } else {
+ extern "C" {
+ pub fn EVP_PKEY_id(pkey: *const EVP_PKEY) -> c_int;
+ }
+ const_ptr_api! {
+ extern "C" {
+ pub fn EVP_PKEY_bits(key: #[const_ptr_if(any(ossl110, libressl280))] EVP_PKEY) -> c_int;
+ #[cfg(any(ossl110, libressl360))]
+ pub fn EVP_PKEY_security_bits(pkey: #[const_ptr_if(any(ossl110, libressl280))] EVP_PKEY) -> c_int;
+ }
+ }
+ }
+}
+extern "C" {
+ pub fn EVP_PKEY_assign(pkey: *mut EVP_PKEY, typ: c_int, key: *mut c_void) -> c_int;
+
+ pub fn EVP_PKEY_set1_RSA(k: *mut EVP_PKEY, r: *mut RSA) -> c_int;
+ pub fn EVP_PKEY_get1_RSA(k: *mut EVP_PKEY) -> *mut RSA;
+ pub fn EVP_PKEY_get1_DSA(k: *mut EVP_PKEY) -> *mut DSA;
+ pub fn EVP_PKEY_get1_DH(k: *mut EVP_PKEY) -> *mut DH;
+ pub fn EVP_PKEY_get1_EC_KEY(k: *mut EVP_PKEY) -> *mut EC_KEY;
+
+ pub fn EVP_PKEY_new() -> *mut EVP_PKEY;
+ pub fn EVP_PKEY_free(k: *mut EVP_PKEY);
+ #[cfg(any(ossl110, libressl270))]
+ pub fn EVP_PKEY_up_ref(pkey: *mut EVP_PKEY) -> c_int;
+
+ pub fn d2i_AutoPrivateKey(
+ a: *mut *mut EVP_PKEY,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut EVP_PKEY;
+
+ pub fn EVP_PKEY_cmp(a: *const EVP_PKEY, b: *const EVP_PKEY) -> c_int;
+
+ pub fn EVP_PKEY_copy_parameters(to: *mut EVP_PKEY, from: *const EVP_PKEY) -> c_int;
+
+ pub fn PKCS5_PBKDF2_HMAC_SHA1(
+ pass: *const c_char,
+ passlen: c_int,
+ salt: *const u8,
+ saltlen: c_int,
+ iter: c_int,
+ keylen: c_int,
+ out: *mut u8,
+ ) -> c_int;
+ pub fn PKCS5_PBKDF2_HMAC(
+ pass: *const c_char,
+ passlen: c_int,
+ salt: *const c_uchar,
+ saltlen: c_int,
+ iter: c_int,
+ digest: *const EVP_MD,
+ keylen: c_int,
+ out: *mut u8,
+ ) -> c_int;
+
+ #[cfg(ossl110)]
+ pub fn EVP_PBE_scrypt(
+ pass: *const c_char,
+ passlen: size_t,
+ salt: *const c_uchar,
+ saltlen: size_t,
+ N: u64,
+ r: u64,
+ p: u64,
+ maxmem: u64,
+ key: *mut c_uchar,
+ keylen: size_t,
+ ) -> c_int;
+
+ pub fn EVP_PKEY_CTX_new(k: *mut EVP_PKEY, e: *mut ENGINE) -> *mut EVP_PKEY_CTX;
+ pub fn EVP_PKEY_CTX_new_id(id: c_int, e: *mut ENGINE) -> *mut EVP_PKEY_CTX;
+ pub fn EVP_PKEY_CTX_free(ctx: *mut EVP_PKEY_CTX);
+
+ pub fn EVP_PKEY_CTX_ctrl(
+ ctx: *mut EVP_PKEY_CTX,
+ keytype: c_int,
+ optype: c_int,
+ cmd: c_int,
+ p1: c_int,
+ p2: *mut c_void,
+ ) -> c_int;
+
+ pub fn EVP_PKEY_new_mac_key(
+ type_: c_int,
+ e: *mut ENGINE,
+ key: *const c_uchar,
+ keylen: c_int,
+ ) -> *mut EVP_PKEY;
+
+ pub fn EVP_PKEY_derive_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_derive_set_peer(ctx: *mut EVP_PKEY_CTX, peer: *mut EVP_PKEY) -> c_int;
+ pub fn EVP_PKEY_derive(ctx: *mut EVP_PKEY_CTX, key: *mut c_uchar, size: *mut size_t) -> c_int;
+
+ #[cfg(ossl300)]
+ pub fn EVP_PKEY_Q_keygen(
+ libctx: *mut OSSL_LIB_CTX,
+ propq: *const c_char,
+ type_: *const c_char,
+ ...
+ ) -> *mut EVP_PKEY;
+ pub fn EVP_PKEY_keygen_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_keygen(ctx: *mut EVP_PKEY_CTX, key: *mut *mut EVP_PKEY) -> c_int;
+
+ pub fn EVP_PKEY_sign_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_sign(
+ ctx: *mut EVP_PKEY_CTX,
+ sig: *mut c_uchar,
+ siglen: *mut size_t,
+ tbs: *const c_uchar,
+ tbslen: size_t,
+ ) -> c_int;
+ pub fn EVP_PKEY_verify_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_verify(
+ ctx: *mut EVP_PKEY_CTX,
+ sig: *const c_uchar,
+ siglen: size_t,
+ tbs: *const c_uchar,
+ tbslen: size_t,
+ ) -> c_int;
+ pub fn EVP_PKEY_encrypt_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_encrypt(
+ ctx: *mut EVP_PKEY_CTX,
+ pout: *mut c_uchar,
+ poutlen: *mut size_t,
+ pin: *const c_uchar,
+ pinlen: size_t,
+ ) -> c_int;
+ pub fn EVP_PKEY_decrypt_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
+ pub fn EVP_PKEY_decrypt(
+ ctx: *mut EVP_PKEY_CTX,
+ pout: *mut c_uchar,
+ poutlen: *mut size_t,
+ pin: *const c_uchar,
+ pinlen: size_t,
+ ) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn EVP_PKCS82PKEY(p8: #[const_ptr_if(any(ossl110, libressl280))] PKCS8_PRIV_KEY_INFO) -> *mut EVP_PKEY;
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl111, libressl370))] {
+ extern "C" {
+ pub fn EVP_PKEY_get_raw_public_key(
+ pkey: *const EVP_PKEY,
+ ppub: *mut c_uchar,
+ len: *mut size_t,
+ ) -> c_int;
+ pub fn EVP_PKEY_new_raw_public_key(
+ ttype: c_int,
+ e: *mut ENGINE,
+ key: *const c_uchar,
+ keylen: size_t,
+ ) -> *mut EVP_PKEY;
+ pub fn EVP_PKEY_get_raw_private_key(
+ pkey: *const EVP_PKEY,
+ ppriv: *mut c_uchar,
+ len: *mut size_t,
+ ) -> c_int;
+ pub fn EVP_PKEY_new_raw_private_key(
+ ttype: c_int,
+ e: *mut ENGINE,
+ key: *const c_uchar,
+ keylen: size_t,
+ ) -> *mut EVP_PKEY;
+ }
+ }
+}
+
+extern "C" {
+ pub fn EVP_EncodeBlock(dst: *mut c_uchar, src: *const c_uchar, src_len: c_int) -> c_int;
+ pub fn EVP_DecodeBlock(dst: *mut c_uchar, src: *const c_uchar, src_len: c_int) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/hmac.rs b/openssl-sys/src/handwritten/hmac.rs
new file mode 100644
index 0000000..b52d63f
--- /dev/null
+++ b/openssl-sys/src/handwritten/hmac.rs
@@ -0,0 +1,30 @@
+use libc::*;
+
+use super::super::*;
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ extern "C" {
+ pub fn HMAC_CTX_new() -> *mut HMAC_CTX;
+ pub fn HMAC_CTX_free(ctx: *mut HMAC_CTX);
+ }
+ } else {
+ extern "C" {
+ pub fn HMAC_CTX_init(ctx: *mut HMAC_CTX);
+ pub fn HMAC_CTX_cleanup(ctx: *mut HMAC_CTX);
+ }
+ }
+}
+
+extern "C" {
+ pub fn HMAC_Init_ex(
+ ctx: *mut HMAC_CTX,
+ key: *const c_void,
+ len: c_int,
+ md: *const EVP_MD,
+ impl_: *mut ENGINE,
+ ) -> c_int;
+ pub fn HMAC_Update(ctx: *mut HMAC_CTX, data: *const c_uchar, len: size_t) -> c_int;
+ pub fn HMAC_Final(ctx: *mut HMAC_CTX, md: *mut c_uchar, len: *mut c_uint) -> c_int;
+ pub fn HMAC_CTX_copy(dst: *mut HMAC_CTX, src: *mut HMAC_CTX) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/kdf.rs b/openssl-sys/src/handwritten/kdf.rs
new file mode 100644
index 0000000..0f14b63
--- /dev/null
+++ b/openssl-sys/src/handwritten/kdf.rs
@@ -0,0 +1,26 @@
+use super::super::*;
+use libc::*;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn EVP_PKEY_CTX_set_hkdf_mode(ctx: *mut EVP_PKEY_CTX, mode: c_int) -> c_int;
+ pub fn EVP_PKEY_CTX_set_hkdf_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int;
+ pub fn EVP_PKEY_CTX_set1_hkdf_salt(
+ ctx: *mut EVP_PKEY_CTX,
+ salt: *const u8,
+ saltlen: c_int,
+ ) -> c_int;
+ pub fn EVP_PKEY_CTX_set1_hkdf_key(
+ ctx: *mut EVP_PKEY_CTX,
+ key: *const u8,
+ keylen: c_int,
+ ) -> c_int;
+ pub fn EVP_PKEY_CTX_add1_hkdf_info(
+ ctx: *mut EVP_PKEY_CTX,
+ info: *const u8,
+ infolen: c_int,
+ ) -> c_int;
+ }
+ }
+}
diff --git a/openssl-sys/src/handwritten/mod.rs b/openssl-sys/src/handwritten/mod.rs
new file mode 100644
index 0000000..28aa4ae
--- /dev/null
+++ b/openssl-sys/src/handwritten/mod.rs
@@ -0,0 +1,65 @@
+pub use self::aes::*;
+pub use self::asn1::*;
+pub use self::bio::*;
+pub use self::bn::*;
+pub use self::cms::*;
+pub use self::conf::*;
+pub use self::crypto::*;
+pub use self::dh::*;
+pub use self::dsa::*;
+pub use self::ec::*;
+pub use self::err::*;
+pub use self::evp::*;
+pub use self::hmac::*;
+pub use self::kdf::*;
+pub use self::object::*;
+pub use self::ocsp::*;
+pub use self::pem::*;
+pub use self::pkcs12::*;
+pub use self::pkcs7::*;
+pub use self::provider::*;
+pub use self::rand::*;
+pub use self::rsa::*;
+pub use self::safestack::*;
+pub use self::sha::*;
+pub use self::srtp::*;
+pub use self::ssl::*;
+pub use self::stack::*;
+pub use self::tls1::*;
+pub use self::types::*;
+pub use self::x509::*;
+pub use self::x509_vfy::*;
+pub use self::x509v3::*;
+
+mod aes;
+mod asn1;
+mod bio;
+mod bn;
+mod cms;
+mod conf;
+mod crypto;
+mod dh;
+mod dsa;
+mod ec;
+mod err;
+mod evp;
+mod hmac;
+mod kdf;
+mod object;
+mod ocsp;
+mod pem;
+mod pkcs12;
+mod pkcs7;
+mod provider;
+mod rand;
+mod rsa;
+mod safestack;
+mod sha;
+mod srtp;
+mod ssl;
+mod stack;
+mod tls1;
+mod types;
+mod x509;
+mod x509_vfy;
+mod x509v3;
diff --git a/openssl-sys/src/handwritten/object.rs b/openssl-sys/src/handwritten/object.rs
new file mode 100644
index 0000000..06e6553
--- /dev/null
+++ b/openssl-sys/src/handwritten/object.rs
@@ -0,0 +1,30 @@
+use libc::*;
+
+use super::super::*;
+
+extern "C" {
+ pub fn OBJ_nid2ln(nid: c_int) -> *const c_char;
+ pub fn OBJ_nid2sn(nid: c_int) -> *const c_char;
+ pub fn OBJ_nid2obj(n: c_int) -> *mut ASN1_OBJECT;
+ pub fn OBJ_obj2nid(o: *const ASN1_OBJECT) -> c_int;
+ pub fn OBJ_obj2txt(
+ buf: *mut c_char,
+ buf_len: c_int,
+ a: *const ASN1_OBJECT,
+ no_name: c_int,
+ ) -> c_int;
+
+ pub fn OBJ_find_sigid_algs(signid: c_int, pdig_nid: *mut c_int, ppkey_nid: *mut c_int)
+ -> c_int;
+ pub fn OBJ_sn2nid(sn: *const libc::c_char) -> libc::c_int;
+ pub fn OBJ_txt2obj(s: *const libc::c_char, no_name: libc::c_int) -> *mut ASN1_OBJECT;
+ pub fn OBJ_create(
+ oid: *const libc::c_char,
+ sn: *const libc::c_char,
+ ln: *const libc::c_char,
+ ) -> c_int;
+ #[cfg(ossl111)]
+ pub fn OBJ_length(obj: *const ASN1_OBJECT) -> libc::size_t;
+ #[cfg(ossl111)]
+ pub fn OBJ_get0_data(obj: *const ASN1_OBJECT) -> *const c_uchar;
+}
diff --git a/openssl-sys/src/handwritten/ocsp.rs b/openssl-sys/src/handwritten/ocsp.rs
new file mode 100644
index 0000000..c194a83
--- /dev/null
+++ b/openssl-sys/src/handwritten/ocsp.rs
@@ -0,0 +1,89 @@
+use super::super::*;
+use libc::*;
+
+pub enum OCSP_CERTID {}
+
+pub enum OCSP_ONEREQ {}
+
+pub enum OCSP_REQUEST {}
+
+pub enum OCSP_BASICRESP {}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn OCSP_cert_to_id(
+ dgst: *const EVP_MD,
+ subject: #[const_ptr_if(any(ossl110, libressl281))] X509,
+ issuer: #[const_ptr_if(any(ossl110, libressl281))] X509,
+ ) -> *mut OCSP_CERTID;
+ }
+}
+
+extern "C" {
+ pub fn OCSP_request_add0_id(r: *mut OCSP_REQUEST, id: *mut OCSP_CERTID) -> *mut OCSP_ONEREQ;
+
+ pub fn OCSP_resp_find_status(
+ bs: *mut OCSP_BASICRESP,
+ id: *mut OCSP_CERTID,
+ status: *mut c_int,
+ reason: *mut c_int,
+ revtime: *mut *mut ASN1_GENERALIZEDTIME,
+ thisupd: *mut *mut ASN1_GENERALIZEDTIME,
+ nextupd: *mut *mut ASN1_GENERALIZEDTIME,
+ ) -> c_int;
+ pub fn OCSP_check_validity(
+ thisupd: *mut ASN1_GENERALIZEDTIME,
+ nextupd: *mut ASN1_GENERALIZEDTIME,
+ sec: c_long,
+ maxsec: c_long,
+ ) -> c_int;
+
+ pub fn OCSP_response_status(resp: *mut OCSP_RESPONSE) -> c_int;
+ pub fn OCSP_response_get1_basic(resp: *mut OCSP_RESPONSE) -> *mut OCSP_BASICRESP;
+
+ pub fn OCSP_response_create(status: c_int, bs: *mut OCSP_BASICRESP) -> *mut OCSP_RESPONSE;
+
+ pub fn OCSP_BASICRESP_new() -> *mut OCSP_BASICRESP;
+ pub fn OCSP_BASICRESP_free(r: *mut OCSP_BASICRESP);
+ pub fn OCSP_RESPONSE_new() -> *mut OCSP_RESPONSE;
+ pub fn OCSP_RESPONSE_free(r: *mut OCSP_RESPONSE);
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_OCSP_RESPONSE(a: #[const_ptr_if(ossl300)] OCSP_RESPONSE, pp: *mut *mut c_uchar) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn d2i_OCSP_RESPONSE(
+ a: *mut *mut OCSP_RESPONSE,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut OCSP_RESPONSE;
+ pub fn OCSP_ONEREQ_free(r: *mut OCSP_ONEREQ);
+ pub fn OCSP_CERTID_free(id: *mut OCSP_CERTID);
+ pub fn OCSP_REQUEST_new() -> *mut OCSP_REQUEST;
+ pub fn OCSP_REQUEST_free(r: *mut OCSP_REQUEST);
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_OCSP_REQUEST(a: #[const_ptr_if(ossl300)] OCSP_REQUEST, pp: *mut *mut c_uchar) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn d2i_OCSP_REQUEST(
+ a: *mut *mut OCSP_REQUEST,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut OCSP_REQUEST;
+
+ pub fn OCSP_basic_verify(
+ bs: *mut OCSP_BASICRESP,
+ certs: *mut stack_st_X509,
+ st: *mut X509_STORE,
+ flags: c_ulong,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/pem.rs b/openssl-sys/src/handwritten/pem.rs
new file mode 100644
index 0000000..4299717
--- /dev/null
+++ b/openssl-sys/src/handwritten/pem.rs
@@ -0,0 +1,191 @@
+use super::super::*;
+use libc::*;
+
+pub type pem_password_cb = Option<
+ unsafe extern "C" fn(
+ buf: *mut c_char,
+ size: c_int,
+ rwflag: c_int,
+ user_data: *mut c_void,
+ ) -> c_int,
+>;
+
+const_ptr_api! {
+ extern "C" {
+ pub fn PEM_write_bio_X509(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509) -> c_int;
+ pub fn PEM_write_bio_X509_REQ(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509_REQ) -> c_int;
+ pub fn PEM_write_bio_X509_CRL(bio: *mut BIO, x509: #[const_ptr_if(ossl300)] X509_CRL) -> c_int;
+ pub fn PEM_write_bio_RSAPrivateKey(
+ bp: *mut BIO,
+ rsa: #[const_ptr_if(ossl300)] RSA,
+ cipher: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_uchar,
+ klen: c_int,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> c_int;
+ pub fn PEM_write_bio_RSA_PUBKEY(bp: *mut BIO, rsa: #[const_ptr_if(ossl300)] RSA) -> c_int;
+ pub fn PEM_write_bio_DSAPrivateKey(
+ bp: *mut BIO,
+ dsa: #[const_ptr_if(ossl300)] DSA,
+ cipher: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_uchar,
+ klen: c_int,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> c_int;
+ pub fn PEM_write_bio_ECPrivateKey(
+ bio: *mut BIO,
+ key: #[const_ptr_if(ossl300)] EC_KEY,
+ cipher: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_uchar,
+ klen: c_int,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> c_int;
+ pub fn PEM_write_bio_DSA_PUBKEY(bp: *mut BIO, dsa: #[const_ptr_if(ossl300)] DSA) -> c_int;
+ pub fn PEM_write_bio_PrivateKey(
+ bio: *mut BIO,
+ pkey: #[const_ptr_if(ossl300)] EVP_PKEY,
+ cipher: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_uchar,
+ klen: c_int,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> c_int;
+ pub fn PEM_write_bio_PUBKEY(bp: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
+ pub fn PEM_write_bio_PKCS8PrivateKey(
+ bio: *mut BIO,
+ pkey: #[const_ptr_if(ossl300)] EVP_PKEY,
+ cipher: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_char,
+ klen: c_int,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> c_int;
+ pub fn PEM_write_bio_PKCS7(bp: *mut BIO, x: #[const_ptr_if(ossl300)] PKCS7) -> c_int;
+ pub fn PEM_write_bio_EC_PUBKEY(bp: *mut BIO, ec: #[const_ptr_if(ossl300)] EC_KEY) -> c_int;
+ pub fn i2d_PKCS8PrivateKey_bio(
+ bp: *mut BIO,
+ x: #[const_ptr_if(ossl300)] EVP_PKEY,
+ enc: *const EVP_CIPHER,
+ kstr: #[const_ptr_if(ossl300)] c_char,
+ klen: c_int,
+ cb: pem_password_cb,
+ u: *mut c_void,
+ ) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn PEM_read_bio_X509(
+ bio: *mut BIO,
+ out: *mut *mut X509,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut X509;
+ pub fn PEM_read_bio_X509_REQ(
+ bio: *mut BIO,
+ out: *mut *mut X509_REQ,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut X509_REQ;
+ pub fn PEM_read_bio_X509_CRL(
+ bio: *mut BIO,
+ out: *mut *mut X509_CRL,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut X509_CRL;
+ pub fn PEM_read_bio_RSAPrivateKey(
+ bio: *mut BIO,
+ rsa: *mut *mut RSA,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut RSA;
+ pub fn PEM_read_bio_RSAPublicKey(
+ bio: *mut BIO,
+ rsa: *mut *mut RSA,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut RSA;
+ pub fn PEM_write_bio_RSAPublicKey(bp: *mut BIO, rsa: *const RSA) -> c_int;
+ pub fn PEM_read_bio_RSA_PUBKEY(
+ bio: *mut BIO,
+ rsa: *mut *mut RSA,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut RSA;
+ pub fn PEM_read_bio_DSAPrivateKey(
+ bp: *mut BIO,
+ dsa: *mut *mut DSA,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut DSA;
+ pub fn PEM_read_bio_DSA_PUBKEY(
+ bp: *mut BIO,
+ dsa: *mut *mut DSA,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut DSA;
+ pub fn PEM_read_bio_ECPrivateKey(
+ bio: *mut BIO,
+ key: *mut *mut EC_KEY,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut EC_KEY;
+ pub fn PEM_read_bio_EC_PUBKEY(
+ bp: *mut BIO,
+ ec: *mut *mut EC_KEY,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut EC_KEY;
+ pub fn PEM_read_bio_DHparams(
+ bio: *mut BIO,
+ out: *mut *mut DH,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut DH;
+ pub fn PEM_write_bio_DHparams(bio: *mut BIO, x: *const DH) -> c_int;
+ pub fn PEM_read_bio_PrivateKey(
+ bio: *mut BIO,
+ out: *mut *mut EVP_PKEY,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut EVP_PKEY;
+ pub fn PEM_read_bio_PUBKEY(
+ bio: *mut BIO,
+ out: *mut *mut EVP_PKEY,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut EVP_PKEY;
+
+ pub fn d2i_PKCS8PrivateKey_bio(
+ bp: *mut BIO,
+ x: *mut *mut EVP_PKEY,
+ cb: pem_password_cb,
+ u: *mut c_void,
+ ) -> *mut EVP_PKEY;
+ pub fn d2i_PKCS8_PRIV_KEY_INFO(
+ k: *mut *mut PKCS8_PRIV_KEY_INFO,
+ buf: *mut *const u8,
+ length: c_long,
+ ) -> *mut PKCS8_PRIV_KEY_INFO;
+ pub fn PKCS8_PRIV_KEY_INFO_free(p8inf: *mut PKCS8_PRIV_KEY_INFO);
+
+ pub fn PEM_read_bio_PKCS7(
+ bio: *mut BIO,
+ out: *mut *mut PKCS7,
+ cb: pem_password_cb,
+ u: *mut c_void,
+ ) -> *mut PKCS7;
+
+ #[cfg(ossl101)]
+ pub fn PEM_read_bio_CMS(
+ bio: *mut BIO,
+ out: *mut *mut CMS_ContentInfo,
+ callback: pem_password_cb,
+ user_data: *mut c_void,
+ ) -> *mut CMS_ContentInfo;
+ #[cfg(ossl101)]
+ pub fn PEM_write_bio_CMS(bio: *mut BIO, cms: *const CMS_ContentInfo) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/pkcs12.rs b/openssl-sys/src/handwritten/pkcs12.rs
new file mode 100644
index 0000000..728c333
--- /dev/null
+++ b/openssl-sys/src/handwritten/pkcs12.rs
@@ -0,0 +1,53 @@
+use libc::*;
+
+use super::super::*;
+
+pub enum PKCS12 {}
+
+extern "C" {
+ pub fn PKCS12_free(p12: *mut PKCS12);
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_PKCS12(a: #[const_ptr_if(ossl300)] PKCS12, buf: *mut *mut u8) -> c_int;
+ }
+}
+extern "C" {
+ pub fn d2i_PKCS12(a: *mut *mut PKCS12, pp: *mut *const u8, length: c_long) -> *mut PKCS12;
+
+ pub fn PKCS12_parse(
+ p12: *mut PKCS12,
+ pass: *const c_char,
+ pkey: *mut *mut EVP_PKEY,
+ cert: *mut *mut X509,
+ ca: *mut *mut stack_st_X509,
+ ) -> c_int;
+
+ pub fn PKCS12_set_mac(
+ p12: *mut PKCS12,
+ pass: *const c_char,
+ passlen: c_int,
+ salt: *mut c_uchar,
+ saltlen: c_int,
+ iter: c_int,
+ md_type: *const EVP_MD,
+ ) -> c_int;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn PKCS12_create(
+ pass: #[const_ptr_if(any(ossl110, libressl280))] c_char,
+ friendly_name: #[const_ptr_if(any(ossl110, libressl280))] c_char,
+ pkey: *mut EVP_PKEY,
+ cert: *mut X509,
+ ca: *mut stack_st_X509,
+ nid_key: c_int,
+ nid_cert: c_int,
+ iter: c_int,
+ mac_iter: c_int,
+ keytype: c_int,
+ ) -> *mut PKCS12;
+
+ pub fn i2d_PKCS12_bio(b: *mut BIO, a: #[const_ptr_if(ossl300)] PKCS12) -> c_int;
+ }
+}
diff --git a/openssl-sys/src/handwritten/pkcs7.rs b/openssl-sys/src/handwritten/pkcs7.rs
new file mode 100644
index 0000000..78f96ec
--- /dev/null
+++ b/openssl-sys/src/handwritten/pkcs7.rs
@@ -0,0 +1,70 @@
+use super::super::*;
+use libc::*;
+
+pub enum PKCS7_SIGNED {}
+pub enum PKCS7_ENVELOPE {}
+pub enum PKCS7_SIGN_ENVELOPE {}
+pub enum PKCS7_DIGEST {}
+pub enum PKCS7_ENCRYPT {}
+pub enum PKCS7 {}
+
+extern "C" {
+ pub fn d2i_PKCS7(a: *mut *mut PKCS7, pp: *mut *const c_uchar, length: c_long) -> *mut PKCS7;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_PKCS7(a: #[const_ptr_if(ossl300)] PKCS7, buf: *mut *mut u8) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn PKCS7_encrypt(
+ certs: *mut stack_st_X509,
+ b: *mut BIO,
+ cipher: *const EVP_CIPHER,
+ flags: c_int,
+ ) -> *mut PKCS7;
+
+ pub fn PKCS7_verify(
+ pkcs7: *mut PKCS7,
+ certs: *mut stack_st_X509,
+ store: *mut X509_STORE,
+ indata: *mut BIO,
+ out: *mut BIO,
+ flags: c_int,
+ ) -> c_int;
+
+ pub fn PKCS7_get0_signers(
+ pkcs7: *mut PKCS7,
+ certs: *mut stack_st_X509,
+ flags: c_int,
+ ) -> *mut stack_st_X509;
+
+ pub fn PKCS7_sign(
+ signcert: *mut X509,
+ pkey: *mut EVP_PKEY,
+ certs: *mut stack_st_X509,
+ data: *mut BIO,
+ flags: c_int,
+ ) -> *mut PKCS7;
+
+ pub fn PKCS7_decrypt(
+ pkcs7: *mut PKCS7,
+ pkey: *mut EVP_PKEY,
+ cert: *mut X509,
+ data: *mut BIO,
+ flags: c_int,
+ ) -> c_int;
+
+ pub fn PKCS7_free(pkcs7: *mut PKCS7);
+
+ pub fn SMIME_write_PKCS7(
+ out: *mut BIO,
+ pkcs7: *mut PKCS7,
+ data: *mut BIO,
+ flags: c_int,
+ ) -> c_int;
+
+ pub fn SMIME_read_PKCS7(bio: *mut BIO, bcont: *mut *mut BIO) -> *mut PKCS7;
+}
diff --git a/openssl-sys/src/handwritten/provider.rs b/openssl-sys/src/handwritten/provider.rs
new file mode 100644
index 0000000..3e18a02
--- /dev/null
+++ b/openssl-sys/src/handwritten/provider.rs
@@ -0,0 +1,20 @@
+use super::super::*;
+use libc::*;
+
+extern "C" {
+ #[cfg(ossl300)]
+ pub fn OSSL_PROVIDER_load(ctx: *mut OSSL_LIB_CTX, name: *const c_char) -> *mut OSSL_PROVIDER;
+ #[cfg(ossl300)]
+ pub fn OSSL_PROVIDER_try_load(
+ ctx: *mut OSSL_LIB_CTX,
+ name: *const c_char,
+ retain_fallbacks: c_int,
+ ) -> *mut OSSL_PROVIDER;
+ #[cfg(ossl300)]
+ pub fn OSSL_PROVIDER_unload(prov: *mut OSSL_PROVIDER) -> c_int;
+ #[cfg(ossl300)]
+ pub fn OSSL_PROVIDER_set_default_search_path(
+ ctx: *mut OSSL_LIB_CTX,
+ path: *const c_char,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/rand.rs b/openssl-sys/src/handwritten/rand.rs
new file mode 100644
index 0000000..3bf9da5
--- /dev/null
+++ b/openssl-sys/src/handwritten/rand.rs
@@ -0,0 +1,12 @@
+use libc::*;
+
+extern "C" {
+ pub fn RAND_bytes(buf: *mut u8, num: c_int) -> c_int;
+
+ #[cfg(ossl111)]
+ pub fn RAND_keep_random_devices_open(keep: c_int);
+
+ pub fn RAND_status() -> c_int;
+
+ pub fn RAND_add(buf: *const c_void, num: c_int, randomness: c_double);
+}
diff --git a/openssl-sys/src/handwritten/rsa.rs b/openssl-sys/src/handwritten/rsa.rs
new file mode 100644
index 0000000..d05edfc
--- /dev/null
+++ b/openssl-sys/src/handwritten/rsa.rs
@@ -0,0 +1,124 @@
+use super::super::*;
+use libc::*;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn EVP_PKEY_CTX_set_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad_mode: c_int) -> c_int;
+ pub fn EVP_PKEY_CTX_get_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad_mode: *mut c_int) -> c_int;
+
+ pub fn EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx: *mut EVP_PKEY_CTX, len: c_int) -> c_int;
+ pub fn EVP_PKEY_CTX_set_rsa_mgf1_md(ctx: *mut EVP_PKEY_CTX, md: *const EVP_MD) -> c_int;
+ }
+ }
+}
+
+extern "C" {
+ pub fn RSA_new() -> *mut RSA;
+ pub fn RSA_size(k: *const RSA) -> c_int;
+
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_set0_key(r: *mut RSA, n: *mut BIGNUM, e: *mut BIGNUM, d: *mut BIGNUM) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_set0_factors(r: *mut RSA, p: *mut BIGNUM, q: *mut BIGNUM) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_set0_crt_params(
+ r: *mut RSA,
+ dmp1: *mut BIGNUM,
+ dmq1: *mut BIGNUM,
+ iqmp: *mut BIGNUM,
+ ) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_get0_key(
+ r: *const RSA,
+ n: *mut *const BIGNUM,
+ e: *mut *const BIGNUM,
+ d: *mut *const BIGNUM,
+ );
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_get0_factors(r: *const RSA, p: *mut *const BIGNUM, q: *mut *const BIGNUM);
+ #[cfg(any(ossl110, libressl273))]
+ pub fn RSA_get0_crt_params(
+ r: *const RSA,
+ dmp1: *mut *const BIGNUM,
+ dmq1: *mut *const BIGNUM,
+ iqmp: *mut *const BIGNUM,
+ );
+
+ #[cfg(not(ossl110))]
+ pub fn RSA_generate_key(
+ modsz: c_int,
+ e: c_ulong,
+ cb: Option,
+ cbarg: *mut c_void,
+ ) -> *mut RSA;
+
+ pub fn RSA_generate_key_ex(
+ rsa: *mut RSA,
+ bits: c_int,
+ e: *mut BIGNUM,
+ cb: *mut BN_GENCB,
+ ) -> c_int;
+
+ pub fn RSA_public_encrypt(
+ flen: c_int,
+ from: *const u8,
+ to: *mut u8,
+ k: *mut RSA,
+ pad: c_int,
+ ) -> c_int;
+ pub fn RSA_private_encrypt(
+ flen: c_int,
+ from: *const u8,
+ to: *mut u8,
+ k: *mut RSA,
+ pad: c_int,
+ ) -> c_int;
+ pub fn RSA_public_decrypt(
+ flen: c_int,
+ from: *const u8,
+ to: *mut u8,
+ k: *mut RSA,
+ pad: c_int,
+ ) -> c_int;
+ pub fn RSA_private_decrypt(
+ flen: c_int,
+ from: *const u8,
+ to: *mut u8,
+ k: *mut RSA,
+ pad: c_int,
+ ) -> c_int;
+ pub fn RSA_check_key(r: *const RSA) -> c_int;
+ pub fn RSA_free(rsa: *mut RSA);
+ pub fn RSA_up_ref(rsa: *mut RSA) -> c_int;
+
+ pub fn i2d_RSAPublicKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
+ pub fn d2i_RSAPublicKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
+ pub fn i2d_RSAPrivateKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
+ pub fn d2i_RSAPrivateKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
+
+ pub fn RSA_sign(
+ t: c_int,
+ m: *const u8,
+ mlen: c_uint,
+ sig: *mut u8,
+ siglen: *mut c_uint,
+ k: *mut RSA,
+ ) -> c_int;
+ pub fn RSA_verify(
+ t: c_int,
+ m: *const u8,
+ mlen: c_uint,
+ sig: *const u8,
+ siglen: c_uint,
+ k: *mut RSA,
+ ) -> c_int;
+
+ pub fn RSA_padding_check_PKCS1_type_2(
+ to: *mut c_uchar,
+ tlen: c_int,
+ f: *const c_uchar,
+ fl: c_int,
+ rsa_len: c_int,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/safestack.rs b/openssl-sys/src/handwritten/safestack.rs
new file mode 100644
index 0000000..0bee90d
--- /dev/null
+++ b/openssl-sys/src/handwritten/safestack.rs
@@ -0,0 +1 @@
+stack!(stack_st_OPENSSL_STRING);
diff --git a/openssl-sys/src/handwritten/sha.rs b/openssl-sys/src/handwritten/sha.rs
new file mode 100644
index 0000000..7d00b59
--- /dev/null
+++ b/openssl-sys/src/handwritten/sha.rs
@@ -0,0 +1,101 @@
+use super::super::*;
+use libc::*;
+
+cfg_if! {
+ if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
+ #[repr(C)]
+ #[derive(Clone)]
+ pub struct SHA_CTX {
+ pub h0: SHA_LONG,
+ pub h1: SHA_LONG,
+ pub h2: SHA_LONG,
+ pub h3: SHA_LONG,
+ pub h4: SHA_LONG,
+ pub Nl: SHA_LONG,
+ pub Nh: SHA_LONG,
+ pub data: [SHA_LONG; SHA_LBLOCK as usize],
+ pub num: c_uint,
+ }
+
+ extern "C" {
+ pub fn SHA1_Init(c: *mut SHA_CTX) -> c_int;
+ pub fn SHA1_Update(c: *mut SHA_CTX, data: *const c_void, len: size_t) -> c_int;
+ pub fn SHA1_Final(md: *mut c_uchar, c: *mut SHA_CTX) -> c_int;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(not(ossl300))] {
+ extern "C" {
+ pub fn SHA1(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
+ #[repr(C)]
+ #[derive(Clone)]
+ pub struct SHA256_CTX {
+ pub h: [SHA_LONG; 8],
+ pub Nl: SHA_LONG,
+ pub Nh: SHA_LONG,
+ pub data: [SHA_LONG; SHA_LBLOCK as usize],
+ pub num: c_uint,
+ pub md_len: c_uint,
+ }
+
+ extern "C" {
+ pub fn SHA224_Init(c: *mut SHA256_CTX) -> c_int;
+ pub fn SHA224_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
+ pub fn SHA224_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
+ pub fn SHA256_Init(c: *mut SHA256_CTX) -> c_int;
+ pub fn SHA256_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
+ pub fn SHA256_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(not(ossl300))] {
+ extern "C" {
+ pub fn SHA224(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
+ pub fn SHA256(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))] {
+ #[repr(C)]
+ #[derive(Clone)]
+ pub struct SHA512_CTX {
+ pub h: [SHA_LONG64; 8],
+ pub Nl: SHA_LONG64,
+ pub Nh: SHA_LONG64,
+ // this is a union but we don't want to require 1.19
+ u: [SHA_LONG64; SHA_LBLOCK as usize],
+ pub num: c_uint,
+ pub md_len: c_uint,
+ }
+
+ extern "C" {
+ pub fn SHA384_Init(c: *mut SHA512_CTX) -> c_int;
+ pub fn SHA384_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
+ pub fn SHA384_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
+ pub fn SHA512_Init(c: *mut SHA512_CTX) -> c_int;
+ pub fn SHA512_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
+ pub fn SHA512_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(not(ossl300))] {
+ extern "C" {
+ pub fn SHA384(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
+ pub fn SHA512(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
+ }
+ }
+}
diff --git a/openssl-sys/src/handwritten/srtp.rs b/openssl-sys/src/handwritten/srtp.rs
new file mode 100644
index 0000000..d4c7af8
--- /dev/null
+++ b/openssl-sys/src/handwritten/srtp.rs
@@ -0,0 +1,10 @@
+use super::super::*;
+use libc::*;
+
+extern "C" {
+ pub fn SSL_CTX_set_tlsext_use_srtp(ctx: *mut SSL_CTX, profiles: *const c_char) -> c_int;
+ pub fn SSL_set_tlsext_use_srtp(ssl: *mut SSL, profiles: *const c_char) -> c_int;
+
+ pub fn SSL_get_srtp_profiles(ssl: *mut SSL) -> *mut stack_st_SRTP_PROTECTION_PROFILE;
+ pub fn SSL_get_selected_srtp_profile(ssl: *mut SSL) -> *mut SRTP_PROTECTION_PROFILE;
+}
diff --git a/openssl-sys/src/handwritten/ssl.rs b/openssl-sys/src/handwritten/ssl.rs
new file mode 100644
index 0000000..f179a04
--- /dev/null
+++ b/openssl-sys/src/handwritten/ssl.rs
@@ -0,0 +1,913 @@
+use super::super::*;
+use libc::*;
+
+pub enum SSL_METHOD {}
+pub enum SSL_CIPHER {}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum SSL_SESSION {}
+ } else if #[cfg(libressl251)] {
+ #[repr(C)]
+ pub struct SSL_SESSION {
+ ssl_version: c_int,
+ pub master_key_length: c_int,
+ pub master_key: [c_uchar; 48],
+ session_id_length: c_uint,
+ session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize],
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ peer: *mut X509,
+ verify_result: c_long,
+ timeout: c_long,
+ time: time_t,
+ pub references: c_int,
+ cipher: *const SSL_CIPHER,
+ cipher_id: c_long,
+ ciphers: *mut stack_st_SSL_CIPHER,
+ tlsext_hostname: *mut c_char,
+ tlsext_tick: *mut c_uchar,
+ tlsext_ticklen: size_t,
+ tlsext_tick_lifetime_int: c_long,
+ internal: *mut c_void,
+ }
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct SSL_SESSION {
+ ssl_version: c_int,
+ pub master_key_length: c_int,
+ pub master_key: [c_uchar; 48],
+ session_id_length: c_uint,
+ session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize],
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ not_resumable: c_int,
+ sess_cert: *mut c_void,
+ peer: *mut X509,
+ verify_result: c_long,
+ timeout: c_long,
+ time: time_t,
+ pub references: c_int,
+ cipher: *const c_void,
+ cipher_id: c_ulong,
+ ciphers: *mut c_void,
+ ex_data: CRYPTO_EX_DATA,
+ prev: *mut c_void,
+ next: *mut c_void,
+ tlsext_hostname: *mut c_char,
+ tlsext_ecpointformatlist_length: size_t,
+ tlsext_ecpointformatlist: *mut u8,
+ tlsext_ellipticcurvelist_length: size_t,
+ tlsext_ellipticcurvelist: *mut u16,
+ tlsext_tick: *mut c_uchar,
+ tlsext_ticklen: size_t,
+ tlsext_tick_lifetime_hint: c_long,
+ }
+ } else {
+ #[repr(C)]
+ pub struct SSL_SESSION {
+ ssl_version: c_int,
+ key_arg_length: c_uint,
+ key_arg: [c_uchar; SSL_MAX_KEY_ARG_LENGTH as usize],
+ pub master_key_length: c_int,
+ pub master_key: [c_uchar; 48],
+ session_id_length: c_uint,
+ session_id: [c_uchar; SSL_MAX_SSL_SESSION_ID_LENGTH as usize],
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ #[cfg(not(osslconf = "OPENSSL_NO_KRB5"))]
+ krb5_client_princ_len: c_uint,
+ #[cfg(not(osslconf = "OPENSSL_NO_KRB5"))]
+ krb5_client_princ: [c_uchar; SSL_MAX_KRB5_PRINCIPAL_LENGTH as usize],
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_identity_hint: *mut c_char,
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_identity: *mut c_char,
+ not_resumable: c_int,
+ sess_cert: *mut c_void,
+ peer: *mut X509,
+ verify_result: c_long,
+ pub references: c_int,
+ timeout: c_long,
+ time: c_long,
+ compress_meth: c_uint,
+ cipher: *const c_void,
+ cipher_id: c_ulong,
+ ciphers: *mut c_void,
+ ex_data: CRYPTO_EX_DATA,
+ prev: *mut c_void,
+ next: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_hostname: *mut c_char,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ecpointformatlist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ecpointformatlist: *mut c_uchar,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ellipticcurvelist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ellipticcurvelist: *mut c_uchar,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_tick: *mut c_uchar,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ticklen: size_t,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_tick_lifetime_hint: c_long,
+ #[cfg(not(osslconf = "OPENSSL_NO_SRP"))]
+ srp_username: *mut c_char,
+ }
+ }
+}
+
+stack!(stack_st_SSL_CIPHER);
+
+#[repr(C)]
+pub struct SRTP_PROTECTION_PROFILE {
+ pub name: *const c_char,
+ pub id: c_ulong,
+}
+
+stack!(stack_st_SRTP_PROTECTION_PROFILE);
+
+pub type tls_session_ticket_ext_cb_fn =
+ Option c_int>;
+pub type tls_session_secret_cb_fn = Option<
+ unsafe extern "C" fn(
+ *mut SSL,
+ *mut c_void,
+ *mut c_int,
+ *mut stack_st_SSL_CIPHER,
+ *mut *mut SSL_CIPHER,
+ *mut c_void,
+ ) -> c_int,
+>;
+
+#[cfg(ossl111)]
+pub type SSL_custom_ext_add_cb_ex = Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ ext_type: c_uint,
+ context: c_uint,
+ out: *mut *const c_uchar,
+ outlen: *mut size_t,
+ x: *mut X509,
+ chainidx: size_t,
+ al: *mut c_int,
+ add_arg: *mut c_void,
+ ) -> c_int,
+>;
+
+#[cfg(ossl111)]
+pub type SSL_custom_ext_free_cb_ex = Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ ext_type: c_uint,
+ context: c_uint,
+ out: *const c_uchar,
+ add_arg: *mut c_void,
+ ),
+>;
+
+#[cfg(ossl111)]
+pub type SSL_custom_ext_parse_cb_ex = Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ ext_type: c_uint,
+ context: c_uint,
+ input: *const c_uchar,
+ inlen: size_t,
+ x: *mut X509,
+ chainidx: size_t,
+ al: *mut c_int,
+ parse_arg: *mut c_void,
+ ) -> c_int,
+>;
+
+cfg_if! {
+ if #[cfg(ossl300)] {
+ extern "C" {
+ pub fn SSL_CTX_get_options(ctx: *const SSL_CTX) -> u64;
+ pub fn SSL_CTX_set_options(ctx: *mut SSL_CTX, op: u64) -> u64;
+ pub fn SSL_CTX_clear_options(ctx: *mut SSL_CTX, op: u64) -> u64;
+ }
+ } else if #[cfg(ossl110)] {
+ extern "C" {
+ pub fn SSL_CTX_get_options(ctx: *const SSL_CTX) -> c_ulong;
+ pub fn SSL_CTX_set_options(ctx: *mut SSL_CTX, op: c_ulong) -> c_ulong;
+ pub fn SSL_CTX_clear_options(ctx: *mut SSL_CTX, op: c_ulong) -> c_ulong;
+ }
+ }
+}
+
+pub type GEN_SESSION_CB =
+ Option c_int>;
+
+extern "C" {
+ pub fn SSL_CTX_sess_set_new_cb(
+ ctx: *mut SSL_CTX,
+ new_session_cb: Option c_int>,
+ );
+ pub fn SSL_CTX_sess_set_remove_cb(
+ ctx: *mut SSL_CTX,
+ remove_session_cb: Option,
+ );
+}
+cfg_if! {
+ // const change in passed function pointer signature
+ if #[cfg(any(ossl110, libressl280))] {
+ extern "C" {
+ pub fn SSL_CTX_sess_set_get_cb(
+ ctx: *mut SSL_CTX,
+ get_session_cb: Option<
+ unsafe extern "C" fn(*mut SSL, *const c_uchar, c_int, *mut c_int) -> *mut SSL_SESSION,
+ >,
+ );
+ }
+ } else {
+ extern "C" {
+ pub fn SSL_CTX_sess_set_get_cb(
+ ctx: *mut SSL_CTX,
+ get_session_cb: Option<
+ unsafe extern "C" fn(*mut SSL, *mut c_uchar, c_int, *mut c_int) -> *mut SSL_SESSION,
+ >,
+ );
+ }
+ }
+}
+extern "C" {
+ // FIXME change to unsafe extern "C" fn
+ pub fn SSL_CTX_set_cookie_generate_cb(
+ s: *mut SSL_CTX,
+ cb: Option<
+ extern "C" fn(ssl: *mut SSL, cookie: *mut c_uchar, cookie_len: *mut c_uint) -> c_int,
+ >,
+ );
+}
+
+cfg_if! {
+ // const change in passed function pointer signature
+ if #[cfg(any(ossl110, libressl280))] {
+ extern "C" {
+ pub fn SSL_CTX_set_cookie_verify_cb(
+ s: *mut SSL_CTX,
+ cb: Option<
+ extern "C" fn(ssl: *mut SSL, cookie: *const c_uchar, cookie_len: c_uint) -> c_int,
+ >,
+ );
+ }
+ } else {
+ extern "C" {
+ pub fn SSL_CTX_set_cookie_verify_cb(
+ s: *mut SSL_CTX,
+ cb: Option c_int>,
+ );
+ }
+ }
+}
+
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_set_stateless_cookie_generate_cb(
+ s: *mut SSL_CTX,
+ cb: Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ cookie: *mut c_uchar,
+ cookie_len: *mut size_t,
+ ) -> c_int,
+ >,
+ );
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_set_stateless_cookie_verify_cb(
+ s: *mut SSL_CTX,
+ cb: Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ cookie: *const c_uchar,
+ cookie_len: size_t,
+ ) -> c_int,
+ >,
+ );
+
+ pub fn SSL_CTX_set_next_protos_advertised_cb(
+ ssl: *mut SSL_CTX,
+ cb: extern "C" fn(
+ ssl: *mut SSL,
+ out: *mut *const c_uchar,
+ outlen: *mut c_uint,
+ arg: *mut c_void,
+ ) -> c_int,
+ arg: *mut c_void,
+ );
+ pub fn SSL_CTX_set_next_proto_select_cb(
+ ssl: *mut SSL_CTX,
+ cb: extern "C" fn(
+ ssl: *mut SSL,
+ out: *mut *mut c_uchar,
+ outlen: *mut c_uchar,
+ inbuf: *const c_uchar,
+ inlen: c_uint,
+ arg: *mut c_void,
+ ) -> c_int,
+ arg: *mut c_void,
+ );
+ pub fn SSL_get0_next_proto_negotiated(
+ s: *const SSL,
+ data: *mut *const c_uchar,
+ len: *mut c_uint,
+ );
+
+ pub fn SSL_select_next_proto(
+ out: *mut *mut c_uchar,
+ outlen: *mut c_uchar,
+ inbuf: *const c_uchar,
+ inlen: c_uint,
+ client: *const c_uchar,
+ client_len: c_uint,
+ ) -> c_int;
+}
+
+extern "C" {
+ #[cfg(any(ossl102, libressl261))]
+ pub fn SSL_CTX_set_alpn_protos(s: *mut SSL_CTX, data: *const c_uchar, len: c_uint) -> c_int;
+ #[cfg(any(ossl102, libressl261))]
+ pub fn SSL_set_alpn_protos(s: *mut SSL, data: *const c_uchar, len: c_uint) -> c_int;
+ #[cfg(any(ossl102, libressl261))]
+ #[link_name = "SSL_CTX_set_alpn_select_cb"]
+ pub fn SSL_CTX_set_alpn_select_cb__fixed_rust(
+ ssl: *mut SSL_CTX,
+ cb: Option<
+ unsafe extern "C" fn(
+ ssl: *mut SSL,
+ out: *mut *const c_uchar,
+ outlen: *mut c_uchar,
+ inbuf: *const c_uchar,
+ inlen: c_uint,
+ arg: *mut c_void,
+ ) -> c_int,
+ >,
+ arg: *mut c_void,
+ );
+ #[cfg(any(ossl102, libressl261))]
+ pub fn SSL_get0_alpn_selected(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint);
+}
+
+#[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+extern "C" {
+ pub fn SSL_CTX_set_psk_client_callback(
+ ssl: *mut SSL_CTX,
+ psk_client_cb: Option<
+ extern "C" fn(
+ *mut SSL,
+ *const c_char,
+ *mut c_char,
+ c_uint,
+ *mut c_uchar,
+ c_uint,
+ ) -> c_uint,
+ >,
+ );
+ pub fn SSL_CTX_set_psk_server_callback(
+ ssl: *mut SSL_CTX,
+ psk_server_cb: Option<
+ extern "C" fn(*mut SSL, *const c_char, *mut c_uchar, c_uint) -> c_uint,
+ >,
+ );
+ pub fn SSL_get_psk_identity_hint(ssl: *const SSL) -> *const c_char;
+ pub fn SSL_get_psk_identity(ssl: *const SSL) -> *const c_char;
+}
+
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_add_custom_ext(
+ ctx: *mut SSL_CTX,
+ ext_type: c_uint,
+ context: c_uint,
+ add_cb: SSL_custom_ext_add_cb_ex,
+ free_cb: SSL_custom_ext_free_cb_ex,
+ add_arg: *mut c_void,
+ parse_cb: SSL_custom_ext_parse_cb_ex,
+ parse_arg: *mut c_void,
+ ) -> c_int;
+
+ #[cfg(ossl102)]
+ pub fn SSL_extension_supported(ext_type: c_uint) -> c_int;
+}
+
+#[cfg(ossl111)]
+pub type SSL_CTX_keylog_cb_func =
+ Option;
+
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_set_keylog_callback(ctx: *mut SSL_CTX, cb: SSL_CTX_keylog_cb_func);
+
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_CTX_set_max_early_data(ctx: *mut SSL_CTX, max_early_data: u32) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_CTX_get_max_early_data(ctx: *const SSL_CTX) -> u32;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_set_max_early_data(ctx: *mut SSL, max_early_data: u32) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_get_max_early_data(ctx: *const SSL) -> u32;
+
+ pub fn SSL_get_finished(s: *const SSL, buf: *mut c_void, count: size_t) -> size_t;
+ pub fn SSL_get_peer_finished(s: *const SSL, buf: *mut c_void, count: size_t) -> size_t;
+
+ pub fn SSL_CTX_get_verify_mode(ctx: *const SSL_CTX) -> c_int;
+ pub fn SSL_get_verify_mode(s: *const SSL) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(ossl110)]
+ pub fn SSL_is_init_finished(s: #[const_ptr_if(ossl111)] SSL) -> c_int;
+ }
+}
+
+cfg_if! {
+ if #[cfg(libressl261)] {
+ extern "C" {
+ pub fn SSL_CTX_set_min_proto_version(ctx: *mut SSL_CTX, version: u16) -> c_int;
+ pub fn SSL_CTX_set_max_proto_version(ctx: *mut SSL_CTX, version: u16) -> c_int;
+ pub fn SSL_set_min_proto_version(s: *mut SSL, version: u16) -> c_int;
+ pub fn SSL_set_max_proto_version(s: *mut SSL, version: u16) -> c_int;
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(libressl270)] {
+ extern "C" {
+ pub fn SSL_CTX_get_min_proto_version(ctx: *mut SSL_CTX) -> c_int;
+ pub fn SSL_CTX_get_max_proto_version(ctx: *mut SSL_CTX) -> c_int;
+ pub fn SSL_get_min_proto_version(s: *mut SSL) -> c_int;
+ pub fn SSL_get_max_proto_version(s: *mut SSL) -> c_int;
+ }
+ }
+}
+
+extern "C" {
+ pub fn SSL_CTX_set_cipher_list(ssl: *mut SSL_CTX, s: *const c_char) -> c_int;
+ pub fn SSL_CTX_new(method: *const SSL_METHOD) -> *mut SSL_CTX;
+ pub fn SSL_CTX_free(ctx: *mut SSL_CTX);
+ #[cfg(any(ossl110, libressl273))]
+ pub fn SSL_CTX_up_ref(x: *mut SSL_CTX) -> c_int;
+ pub fn SSL_CTX_get_cert_store(ctx: *const SSL_CTX) -> *mut X509_STORE;
+ pub fn SSL_CTX_set_cert_store(ctx: *mut SSL_CTX, store: *mut X509_STORE);
+
+ pub fn SSL_get_current_cipher(ssl: *const SSL) -> *const SSL_CIPHER;
+ pub fn SSL_CIPHER_get_bits(cipher: *const SSL_CIPHER, alg_bits: *mut c_int) -> c_int;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn SSL_CIPHER_get_version(cipher: *const SSL_CIPHER) -> #[const_ptr_if(any(ossl110, libressl280))] c_char;
+ }
+}
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CIPHER_get_handshake_digest(cipher: *const SSL_CIPHER) -> *const EVP_MD;
+ pub fn SSL_CIPHER_get_name(cipher: *const SSL_CIPHER) -> *const c_char;
+ #[cfg(ossl111)]
+ pub fn SSL_CIPHER_standard_name(cipher: *const SSL_CIPHER) -> *const c_char;
+ #[cfg(ossl111)]
+ pub fn OPENSSL_cipher_name(rfc_name: *const c_char) -> *const c_char;
+
+ pub fn SSL_pending(ssl: *const SSL) -> c_int;
+ pub fn SSL_set_bio(ssl: *mut SSL, rbio: *mut BIO, wbio: *mut BIO);
+ pub fn SSL_get_rbio(ssl: *const SSL) -> *mut BIO;
+ pub fn SSL_get_wbio(ssl: *const SSL) -> *mut BIO;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_CTX_set_ciphersuites(ctx: *mut SSL_CTX, str: *const c_char) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_set_ciphersuites(ssl: *mut SSL, str: *const c_char) -> c_int;
+ pub fn SSL_set_cipher_list(ssl: *mut SSL, s: *const c_char) -> c_int;
+ pub fn SSL_set_ssl_method(s: *mut SSL, method: *const SSL_METHOD) -> c_int;
+ pub fn SSL_set_verify(
+ ssl: *mut SSL,
+ mode: c_int,
+ // FIXME should be unsafe
+ verify_callback: Option c_int>,
+ );
+ pub fn SSL_CTX_use_PrivateKey(ctx: *mut SSL_CTX, key: *mut EVP_PKEY) -> c_int;
+ pub fn SSL_CTX_use_certificate(ctx: *mut SSL_CTX, cert: *mut X509) -> c_int;
+
+ pub fn SSL_CTX_use_PrivateKey_file(
+ ctx: *mut SSL_CTX,
+ key_file: *const c_char,
+ file_type: c_int,
+ ) -> c_int;
+ pub fn SSL_CTX_use_certificate_file(
+ ctx: *mut SSL_CTX,
+ cert_file: *const c_char,
+ file_type: c_int,
+ ) -> c_int;
+ pub fn SSL_CTX_use_certificate_chain_file(
+ ctx: *mut SSL_CTX,
+ cert_chain_file: *const c_char,
+ ) -> c_int;
+ pub fn SSL_use_PrivateKey_file(ssl: *mut SSL, file: *const c_char, type_: c_int) -> c_int;
+ pub fn SSL_use_PrivateKey(ssl: *mut SSL, pkey: *mut EVP_PKEY) -> c_int;
+ pub fn SSL_use_certificate(ssl: *mut SSL, x: *mut X509) -> c_int;
+ #[cfg(any(ossl110, libressl332))]
+ pub fn SSL_use_certificate_chain_file(ssl: *mut SSL, file: *const c_char) -> c_int;
+ pub fn SSL_set_client_CA_list(s: *mut SSL, name_list: *mut stack_st_X509_NAME);
+ pub fn SSL_add_client_CA(ssl: *mut SSL, x: *mut X509) -> c_int;
+ pub fn SSL_load_client_CA_file(file: *const c_char) -> *mut stack_st_X509_NAME;
+
+ #[cfg(not(ossl110))]
+ pub fn SSL_load_error_strings();
+ pub fn SSL_state_string(ssl: *const SSL) -> *const c_char;
+ pub fn SSL_state_string_long(ssl: *const SSL) -> *const c_char;
+
+ pub fn SSL_SESSION_get_time(s: *const SSL_SESSION) -> c_long;
+ pub fn SSL_SESSION_get_timeout(s: *const SSL_SESSION) -> c_long;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn SSL_SESSION_get_protocol_version(s: *const SSL_SESSION) -> c_int;
+
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_SESSION_set_max_early_data(ctx: *mut SSL_SESSION, max_early_data: u32) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_SESSION_get_max_early_data(ctx: *const SSL_SESSION) -> u32;
+
+ pub fn SSL_SESSION_get_id(s: *const SSL_SESSION, len: *mut c_uint) -> *const c_uchar;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn SSL_SESSION_up_ref(ses: *mut SSL_SESSION) -> c_int;
+ pub fn SSL_SESSION_free(s: *mut SSL_SESSION);
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_SSL_SESSION(s: #[const_ptr_if(ossl300)] SSL_SESSION, pp: *mut *mut c_uchar) -> c_int;
+ }
+}
+extern "C" {
+ pub fn SSL_set_session(ssl: *mut SSL, session: *mut SSL_SESSION) -> c_int;
+ pub fn SSL_CTX_add_session(ctx: *mut SSL_CTX, session: *mut SSL_SESSION) -> c_int;
+ pub fn SSL_CTX_remove_session(ctx: *mut SSL_CTX, session: *mut SSL_SESSION) -> c_int;
+ pub fn d2i_SSL_SESSION(
+ a: *mut *mut SSL_SESSION,
+ pp: *mut *const c_uchar,
+ len: c_long,
+ ) -> *mut SSL_SESSION;
+
+ #[cfg(not(ossl300))]
+ pub fn SSL_get_peer_certificate(ssl: *const SSL) -> *mut X509;
+ #[cfg(ossl300)]
+ pub fn SSL_get1_peer_certificate(ssl: *const SSL) -> *mut X509;
+
+ pub fn SSL_get_peer_cert_chain(ssl: *const SSL) -> *mut stack_st_X509;
+
+ pub fn SSL_CTX_set_verify(
+ ctx: *mut SSL_CTX,
+ mode: c_int,
+ verify_callback: Option c_int>,
+ );
+ pub fn SSL_CTX_set_verify_depth(ctx: *mut SSL_CTX, depth: c_int);
+
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_CTX_set_post_handshake_auth(ctx: *mut SSL_CTX, val: c_int);
+
+ pub fn SSL_CTX_check_private_key(ctx: *const SSL_CTX) -> c_int;
+
+ pub fn SSL_CTX_set_session_id_context(
+ ssl: *mut SSL_CTX,
+ sid_ctx: *const c_uchar,
+ sid_ctx_len: c_uint,
+ ) -> c_int;
+
+ pub fn SSL_new(ctx: *mut SSL_CTX) -> *mut SSL;
+
+ #[cfg(any(ossl102, libressl261))]
+ pub fn SSL_CTX_get0_param(ctx: *mut SSL_CTX) -> *mut X509_VERIFY_PARAM;
+
+ #[cfg(any(ossl102, libressl261))]
+ pub fn SSL_get0_param(ssl: *mut SSL) -> *mut X509_VERIFY_PARAM;
+}
+
+#[cfg(ossl111)]
+pub type SSL_client_hello_cb_fn =
+ Option c_int>;
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_set_client_hello_cb(
+ c: *mut SSL_CTX,
+ cb: SSL_client_hello_cb_fn,
+ arg: *mut c_void,
+ );
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_isv2(s: *mut SSL) -> c_int;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_legacy_version(s: *mut SSL) -> c_uint;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_random(s: *mut SSL, out: *mut *const c_uchar) -> size_t;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_session_id(s: *mut SSL, out: *mut *const c_uchar) -> size_t;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_ciphers(s: *mut SSL, out: *mut *const c_uchar) -> size_t;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_compression_methods(
+ s: *mut SSL,
+ out: *mut *const c_uchar,
+ ) -> size_t;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get1_extensions_present(
+ s: *mut SSL,
+ out: *mut *mut c_int,
+ outlen: *mut size_t,
+ ) -> c_int;
+ #[cfg(ossl111)]
+ pub fn SSL_client_hello_get0_ext(
+ s: *mut SSL,
+ type_: c_uint,
+ out: *mut *const c_uchar,
+ outlen: *mut size_t,
+ ) -> c_int;
+
+ pub fn SSL_free(ssl: *mut SSL);
+ pub fn SSL_accept(ssl: *mut SSL) -> c_int;
+ #[cfg(ossl111)]
+ pub fn SSL_stateless(s: *mut SSL) -> c_int;
+ pub fn SSL_connect(ssl: *mut SSL) -> c_int;
+ pub fn SSL_read(ssl: *mut SSL, buf: *mut c_void, num: c_int) -> c_int;
+ pub fn SSL_peek(ssl: *mut SSL, buf: *mut c_void, num: c_int) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_read_early_data(
+ s: *mut SSL,
+ buf: *mut c_void,
+ num: size_t,
+ readbytes: *mut size_t,
+ ) -> c_int;
+}
+
+extern "C" {
+ pub fn SSL_write(ssl: *mut SSL, buf: *const c_void, num: c_int) -> c_int;
+ #[cfg(any(ossl111, libressl340))]
+ pub fn SSL_write_early_data(
+ s: *mut SSL,
+ buf: *const c_void,
+ num: size_t,
+ written: *mut size_t,
+ ) -> c_int;
+ pub fn SSL_ctrl(ssl: *mut SSL, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
+ pub fn SSL_CTX_ctrl(ctx: *mut SSL_CTX, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
+ #[link_name = "SSL_CTX_callback_ctrl"]
+ pub fn SSL_CTX_callback_ctrl__fixed_rust(
+ ctx: *mut SSL_CTX,
+ cmd: c_int,
+ fp: Option,
+ ) -> c_long;
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl291))] {
+ extern "C" {
+ pub fn TLS_method() -> *const SSL_METHOD;
+
+ pub fn DTLS_method() -> *const SSL_METHOD;
+
+ pub fn TLS_server_method() -> *const SSL_METHOD;
+
+ pub fn TLS_client_method() -> *const SSL_METHOD;
+ }
+ } else {
+ extern "C" {
+ #[cfg(not(osslconf = "OPENSSL_NO_SSL3_METHOD"))]
+ pub fn SSLv3_method() -> *const SSL_METHOD;
+
+ pub fn SSLv23_method() -> *const SSL_METHOD;
+
+ pub fn SSLv23_client_method() -> *const SSL_METHOD;
+
+ pub fn SSLv23_server_method() -> *const SSL_METHOD;
+
+ pub fn TLSv1_method() -> *const SSL_METHOD;
+
+ pub fn TLSv1_1_method() -> *const SSL_METHOD;
+
+ pub fn TLSv1_2_method() -> *const SSL_METHOD;
+
+ pub fn DTLSv1_method() -> *const SSL_METHOD;
+
+ #[cfg(ossl102)]
+ pub fn DTLSv1_2_method() -> *const SSL_METHOD;
+ }
+ }
+}
+
+extern "C" {
+ pub fn SSL_get_error(ssl: *const SSL, ret: c_int) -> c_int;
+ pub fn SSL_get_version(ssl: *const SSL) -> *const c_char;
+
+ pub fn SSL_do_handshake(ssl: *mut SSL) -> c_int;
+ pub fn SSL_shutdown(ssl: *mut SSL) -> c_int;
+
+ pub fn SSL_CTX_set_client_CA_list(ctx: *mut SSL_CTX, list: *mut stack_st_X509_NAME);
+
+ pub fn SSL_CTX_add_client_CA(ctx: *mut SSL_CTX, cacert: *mut X509) -> c_int;
+
+ pub fn SSL_CTX_set_default_verify_paths(ctx: *mut SSL_CTX) -> c_int;
+ pub fn SSL_CTX_load_verify_locations(
+ ctx: *mut SSL_CTX,
+ CAfile: *const c_char,
+ CApath: *const c_char,
+ ) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn SSL_get_ssl_method(ssl: #[const_ptr_if(ossl111b)] SSL) -> *const SSL_METHOD;
+ }
+}
+
+extern "C" {
+ pub fn SSL_set_connect_state(s: *mut SSL);
+ pub fn SSL_set_accept_state(s: *mut SSL);
+
+ #[cfg(not(ossl110))]
+ pub fn SSL_library_init() -> c_int;
+
+ pub fn SSL_CIPHER_description(
+ cipher: *const SSL_CIPHER,
+ buf: *mut c_char,
+ size: c_int,
+ ) -> *mut c_char;
+
+ pub fn SSL_get_certificate(ssl: *const SSL) -> *mut X509;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn SSL_get_privatekey(ssl: #[const_ptr_if(any(ossl102, libressl280))] SSL) -> *mut EVP_PKEY;
+ }
+}
+
+extern "C" {
+ #[cfg(any(ossl102, libressl270))]
+ pub fn SSL_CTX_get0_certificate(ctx: *const SSL_CTX) -> *mut X509;
+ #[cfg(any(ossl102, libressl340))]
+ pub fn SSL_CTX_get0_privatekey(ctx: *const SSL_CTX) -> *mut EVP_PKEY;
+
+ pub fn SSL_set_shutdown(ss: *mut SSL, mode: c_int);
+ pub fn SSL_get_shutdown(ssl: *const SSL) -> c_int;
+ pub fn SSL_version(ssl: *const SSL) -> c_int;
+ pub fn SSL_get_session(s: *const SSL) -> *mut SSL_SESSION;
+ pub fn SSL_get_SSL_CTX(ssl: *const SSL) -> *mut SSL_CTX;
+ pub fn SSL_set_SSL_CTX(ssl: *mut SSL, ctx: *mut SSL_CTX) -> *mut SSL_CTX;
+
+ pub fn SSL_get_verify_result(ssl: *const SSL) -> c_long;
+ #[cfg(ossl110)]
+ pub fn SSL_get0_verified_chain(ssl: *const SSL) -> *mut stack_st_X509;
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn SSL_get_client_random(ssl: *const SSL, out: *mut c_uchar, len: size_t) -> size_t;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn SSL_get_server_random(ssl: *const SSL, out: *mut c_uchar, len: size_t) -> size_t;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn SSL_SESSION_get_master_key(
+ session: *const SSL_SESSION,
+ out: *mut c_uchar,
+ outlen: size_t,
+ ) -> size_t;
+}
+
+extern "C" {
+ #[cfg(not(ossl110))]
+ pub fn SSL_get_ex_new_index(
+ argl: c_long,
+ argp: *mut c_void,
+ new_func: Option,
+ dup_func: Option,
+ free_func: Option,
+ ) -> c_int;
+
+ pub fn SSL_set_ex_data(ssl: *mut SSL, idx: c_int, data: *mut c_void) -> c_int;
+ pub fn SSL_get_ex_data(ssl: *const SSL, idx: c_int) -> *mut c_void;
+
+ #[cfg(not(ossl110))]
+ pub fn SSL_CTX_get_ex_new_index(
+ argl: c_long,
+ argp: *mut c_void,
+ new_func: Option,
+ dup_func: Option,
+ free_func: Option,
+ ) -> c_int;
+
+ pub fn SSL_CTX_set_ex_data(ctx: *mut SSL_CTX, idx: c_int, data: *mut c_void) -> c_int;
+ pub fn SSL_CTX_get_ex_data(ctx: *const SSL_CTX, idx: c_int) -> *mut c_void;
+
+ pub fn SSL_get_ex_data_X509_STORE_CTX_idx() -> c_int;
+}
+
+extern "C" {
+ #[link_name = "SSL_CTX_set_tmp_dh_callback"]
+ pub fn SSL_CTX_set_tmp_dh_callback__fixed_rust(
+ ctx: *mut SSL_CTX,
+ dh: Option<
+ unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
+ >,
+ );
+ #[link_name = "SSL_set_tmp_dh_callback"]
+ pub fn SSL_set_tmp_dh_callback__fixed_rust(
+ ctx: *mut SSL,
+ dh: Option<
+ unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
+ >,
+ );
+ #[cfg(not(ossl110))]
+ #[link_name = "SSL_CTX_set_tmp_ecdh_callback"]
+ pub fn SSL_CTX_set_tmp_ecdh_callback__fixed_rust(
+ ctx: *mut SSL_CTX,
+ ecdh: Option<
+ unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut EC_KEY,
+ >,
+ );
+ #[cfg(not(ossl110))]
+ #[link_name = "SSL_set_tmp_ecdh_callback"]
+ pub fn SSL_set_tmp_ecdh_callback__fixed_rust(
+ ssl: *mut SSL,
+ ecdh: Option<
+ unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut EC_KEY,
+ >,
+ );
+}
+
+cfg_if! {
+ if #[cfg(libressl)] {
+ extern "C" {
+ pub fn SSL_get_current_compression(ssl: *mut SSL) -> *const libc::c_void;
+ }
+ } else if #[cfg(not(osslconf = "OPENSSL_NO_COMP"))] {
+ const_ptr_api! {
+ extern "C" {
+ pub fn SSL_get_current_compression(ssl: #[const_ptr_if(ossl111b)] SSL) -> *const COMP_METHOD;
+ }
+ }
+ }
+}
+cfg_if! {
+ if #[cfg(libressl)] {
+ extern "C" {
+ pub fn SSL_COMP_get_name(comp: *const libc::c_void) -> *const c_char;
+ }
+ } else if #[cfg(not(osslconf = "OPENSSL_NO_COMP"))] {
+ extern "C" {
+ pub fn SSL_COMP_get_name(comp: *const COMP_METHOD) -> *const c_char;
+ }
+ }
+}
+
+#[cfg(not(osslconf = "OPENSSL_NO_COMP"))]
+extern "C" {
+ #[cfg(ossl110)]
+ pub fn COMP_get_type(meth: *const COMP_METHOD) -> i32;
+}
+
+extern "C" {
+ #[cfg(any(ossl110, libressl270))]
+ pub fn SSL_CIPHER_get_cipher_nid(c: *const SSL_CIPHER) -> c_int;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn SSL_CIPHER_get_digest_nid(c: *const SSL_CIPHER) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(ossl110)]
+ pub fn SSL_session_reused(ssl: #[const_ptr_if(ossl111c)] SSL) -> c_int;
+ }
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(any(ossl102, libressl273))]
+ pub fn SSL_is_server(s: #[const_ptr_if(any(ossl110f, libressl273))] SSL) -> c_int;
+ }
+}
+
+extern "C" {
+ #[cfg(ossl110)]
+ pub fn OPENSSL_init_ssl(opts: u64, settings: *const OPENSSL_INIT_SETTINGS) -> c_int;
+}
+
+extern "C" {
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_set_num_tickets(ctx: *mut SSL_CTX, num_tickets: size_t) -> c_int;
+
+ #[cfg(ossl111)]
+ pub fn SSL_set_num_tickets(s: *mut SSL, num_tickets: size_t) -> c_int;
+
+ #[cfg(ossl111)]
+ pub fn SSL_CTX_get_num_tickets(ctx: *const SSL_CTX) -> size_t;
+
+ #[cfg(ossl111)]
+ pub fn SSL_get_num_tickets(s: *const SSL) -> size_t;
+}
diff --git a/openssl-sys/src/handwritten/stack.rs b/openssl-sys/src/handwritten/stack.rs
new file mode 100644
index 0000000..7f2feef
--- /dev/null
+++ b/openssl-sys/src/handwritten/stack.rs
@@ -0,0 +1,45 @@
+use libc::*;
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ pub enum OPENSSL_STACK {}
+ } else {
+ #[repr(C)]
+ pub struct _STACK {
+ pub num: c_int,
+ pub data: *mut *mut c_char,
+ pub sorted: c_int,
+ pub num_alloc: c_int,
+ pub comp: Option c_int>,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(ossl110)] {
+ extern "C" {
+ pub fn OPENSSL_sk_num(stack: *const OPENSSL_STACK) -> c_int;
+ pub fn OPENSSL_sk_value(stack: *const OPENSSL_STACK, idx: c_int) -> *mut c_void;
+
+ pub fn OPENSSL_sk_new_null() -> *mut OPENSSL_STACK;
+ pub fn OPENSSL_sk_free(st: *mut OPENSSL_STACK);
+ pub fn OPENSSL_sk_pop_free(
+ st: *mut OPENSSL_STACK,
+ free: Option,
+ );
+ pub fn OPENSSL_sk_push(st: *mut OPENSSL_STACK, data: *const c_void) -> c_int;
+ pub fn OPENSSL_sk_pop(st: *mut OPENSSL_STACK) -> *mut c_void;
+ }
+ } else {
+ extern "C" {
+ pub fn sk_num(st: *const _STACK) -> c_int;
+ pub fn sk_value(st: *const _STACK, n: c_int) -> *mut c_void;
+
+ pub fn sk_new_null() -> *mut _STACK;
+ pub fn sk_free(st: *mut _STACK);
+ pub fn sk_pop_free(st: *mut _STACK, free: Option);
+ pub fn sk_push(st: *mut _STACK, data: *mut c_void) -> c_int;
+ pub fn sk_pop(st: *mut _STACK) -> *mut c_void;
+ }
+ }
+}
diff --git a/openssl-sys/src/handwritten/tls1.rs b/openssl-sys/src/handwritten/tls1.rs
new file mode 100644
index 0000000..8cf992f
--- /dev/null
+++ b/openssl-sys/src/handwritten/tls1.rs
@@ -0,0 +1,28 @@
+use super::super::*;
+use libc::*;
+
+extern "C" {
+ pub fn SSL_get_servername(ssl: *const SSL, name_type: c_int) -> *const c_char;
+
+ pub fn SSL_export_keying_material(
+ s: *mut SSL,
+ out: *mut c_uchar,
+ olen: size_t,
+ label: *const c_char,
+ llen: size_t,
+ context: *const c_uchar,
+ contextlen: size_t,
+ use_context: c_int,
+ ) -> c_int;
+
+ #[cfg(ossl111)]
+ pub fn SSL_export_keying_material_early(
+ s: *mut SSL,
+ out: *mut c_uchar,
+ olen: size_t,
+ label: *const c_char,
+ llen: size_t,
+ context: *const c_uchar,
+ contextlen: size_t,
+ ) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/types.rs b/openssl-sys/src/handwritten/types.rs
new file mode 100644
index 0000000..b229a37
--- /dev/null
+++ b/openssl-sys/src/handwritten/types.rs
@@ -0,0 +1,1078 @@
+use libc::*;
+
+#[allow(unused_imports)]
+use super::super::*;
+
+pub enum ASN1_INTEGER {}
+pub enum ASN1_GENERALIZEDTIME {}
+pub enum ASN1_STRING {}
+pub enum ASN1_BIT_STRING {}
+pub enum ASN1_TIME {}
+pub enum ASN1_TYPE {}
+pub enum ASN1_OBJECT {}
+pub enum ASN1_OCTET_STRING {}
+
+pub enum bio_st {} // FIXME remove
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum BIO {}
+ } else {
+ #[repr(C)]
+ pub struct BIO {
+ pub method: *mut BIO_METHOD,
+ pub callback: Option<
+ unsafe extern "C" fn(*mut BIO, c_int, *const c_char, c_int, c_long, c_long) -> c_long,
+ >,
+ pub cb_arg: *mut c_char,
+ pub init: c_int,
+ pub shutdown: c_int,
+ pub flags: c_int,
+ pub retry_reason: c_int,
+ pub num: c_int,
+ pub ptr: *mut c_void,
+ pub next_bio: *mut BIO,
+ pub prev_bio: *mut BIO,
+ pub references: c_int,
+ pub num_read: c_ulong,
+ pub num_write: c_ulong,
+ pub ex_data: CRYPTO_EX_DATA,
+ }
+ }
+}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum BIGNUM {}
+ } else {
+ #[repr(C)]
+ pub struct BIGNUM {
+ pub d: *mut BN_ULONG,
+ pub top: c_int,
+ pub dmax: c_int,
+ pub neg: c_int,
+ pub flags: c_int,
+ }
+ }
+}
+pub enum BN_BLINDING {}
+pub enum BN_MONT_CTX {}
+
+pub enum BN_CTX {}
+pub enum BN_GENCB {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum EVP_CIPHER {}
+ } else {
+ #[repr(C)]
+ pub struct EVP_CIPHER {
+ pub nid: c_int,
+ pub block_size: c_int,
+ pub key_len: c_int,
+ pub iv_len: c_int,
+ pub flags: c_ulong,
+ pub init: Option<
+ unsafe extern "C" fn(*mut EVP_CIPHER_CTX, *const c_uchar, *const c_uchar, c_int) -> c_int,
+ >,
+ pub do_cipher: Option<
+ unsafe extern "C" fn(*mut EVP_CIPHER_CTX, *mut c_uchar, *const c_uchar, size_t) -> c_int,
+ >,
+ pub cleanup: Option c_int>,
+ pub ctx_size: c_int,
+ pub set_asn1_parameters:
+ Option c_int>,
+ pub get_asn1_parameters:
+ Option c_int>,
+ pub ctrl:
+ Option c_int>,
+ pub app_data: *mut c_void,
+ }
+ }
+}
+pub enum EVP_CIPHER_CTX {}
+pub enum EVP_MD {}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum EVP_MD_CTX {}
+ } else {
+ #[repr(C)]
+ pub struct EVP_MD_CTX {
+ digest: *mut EVP_MD,
+ engine: *mut ENGINE,
+ flags: c_ulong,
+ md_data: *mut c_void,
+ pctx: *mut EVP_PKEY_CTX,
+ update: *mut c_void,
+ }
+ }
+}
+
+pub enum PKCS8_PRIV_KEY_INFO {}
+
+pub enum EVP_PKEY_ASN1_METHOD {}
+
+pub enum EVP_PKEY_CTX {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum HMAC_CTX {}
+ } else {
+ #[repr(C)]
+ pub struct HMAC_CTX {
+ md: *mut EVP_MD,
+ md_ctx: EVP_MD_CTX,
+ i_ctx: EVP_MD_CTX,
+ o_ctx: EVP_MD_CTX,
+ key_length: c_uint,
+ key: [c_uchar; 128],
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum DH {}
+ } else {
+ #[repr(C)]
+ pub struct DH {
+ pub pad: c_int,
+ pub version: c_int,
+ pub p: *mut BIGNUM,
+ pub g: *mut BIGNUM,
+ pub length: c_long,
+ pub pub_key: *mut BIGNUM,
+ pub priv_key: *mut BIGNUM,
+ pub flags: c_int,
+ pub method_mont_p: *mut BN_MONT_CTX,
+ pub q: *mut BIGNUM,
+ pub j: *mut BIGNUM,
+ pub seed: *mut c_uchar,
+ pub seedlen: c_int,
+ pub counter: *mut BIGNUM,
+ pub references: c_int,
+ pub ex_data: CRYPTO_EX_DATA,
+ pub meth: *const DH_METHOD,
+ pub engine: *mut ENGINE,
+ }
+ }
+}
+pub enum DH_METHOD {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum DSA {}
+ } else {
+ #[repr(C)]
+ pub struct DSA {
+ pub pad: c_int,
+ pub version: c_long,
+ pub write_params: c_int,
+
+ pub p: *mut BIGNUM,
+ pub q: *mut BIGNUM,
+ pub g: *mut BIGNUM,
+ pub pub_key: *mut BIGNUM,
+ pub priv_key: *mut BIGNUM,
+ pub kinv: *mut BIGNUM,
+ pub r: *mut BIGNUM,
+
+ pub flags: c_int,
+ pub method_mont_p: *mut BN_MONT_CTX,
+ pub references: c_int,
+ pub ex_data: CRYPTO_EX_DATA,
+ pub meth: *const DSA_METHOD,
+ pub engine: *mut ENGINE,
+ }
+ }
+}
+pub enum DSA_METHOD {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum RSA {}
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct RSA {
+ pub pad: c_int,
+ pub version: c_long,
+ pub meth: *const RSA_METHOD,
+
+ pub engine: *mut ENGINE,
+ pub n: *mut BIGNUM,
+ pub e: *mut BIGNUM,
+ pub d: *mut BIGNUM,
+ pub p: *mut BIGNUM,
+ pub q: *mut BIGNUM,
+ pub dmp1: *mut BIGNUM,
+ pub dmq1: *mut BIGNUM,
+ pub iqmp: *mut BIGNUM,
+
+ pub ex_data: CRYPTO_EX_DATA,
+ pub references: c_int,
+ pub flags: c_int,
+
+ pub _method_mod_n: *mut BN_MONT_CTX,
+ pub _method_mod_p: *mut BN_MONT_CTX,
+ pub _method_mod_q: *mut BN_MONT_CTX,
+
+ pub blinding: *mut BN_BLINDING,
+ pub mt_blinding: *mut BN_BLINDING,
+ }
+ } else {
+ #[repr(C)]
+ pub struct RSA {
+ pub pad: c_int,
+ pub version: c_long,
+ pub meth: *const RSA_METHOD,
+
+ pub engine: *mut ENGINE,
+ pub n: *mut BIGNUM,
+ pub e: *mut BIGNUM,
+ pub d: *mut BIGNUM,
+ pub p: *mut BIGNUM,
+ pub q: *mut BIGNUM,
+ pub dmp1: *mut BIGNUM,
+ pub dmq1: *mut BIGNUM,
+ pub iqmp: *mut BIGNUM,
+
+ pub ex_data: CRYPTO_EX_DATA,
+ pub references: c_int,
+ pub flags: c_int,
+
+ pub _method_mod_n: *mut BN_MONT_CTX,
+ pub _method_mod_p: *mut BN_MONT_CTX,
+ pub _method_mod_q: *mut BN_MONT_CTX,
+
+ pub bignum_data: *mut c_char,
+ pub blinding: *mut BN_BLINDING,
+ pub mt_blinding: *mut BN_BLINDING,
+ }
+ }
+}
+pub enum RSA_METHOD {}
+
+pub enum EC_KEY {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum X509 {}
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct X509 {
+ pub cert_info: *mut X509_CINF,
+ pub sig_alg: *mut X509_ALGOR,
+ pub signature: *mut ASN1_BIT_STRING,
+ pub valid: c_int,
+ pub references: c_int,
+ pub name: *mut c_char,
+ pub ex_data: CRYPTO_EX_DATA,
+ pub ex_pathlen: c_long,
+ pub ex_pcpathlen: c_long,
+ pub ex_flags: c_ulong,
+ pub ex_kusage: c_ulong,
+ pub ex_xkusage: c_ulong,
+ pub ex_nscert: c_ulong,
+ skid: *mut c_void,
+ akid: *mut c_void,
+ policy_cache: *mut c_void,
+ crldp: *mut c_void,
+ altname: *mut c_void,
+ nc: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_SHA"))]
+ sha1_hash: [c_uchar; 20],
+ aux: *mut c_void,
+ }
+ } else {
+ #[repr(C)]
+ pub struct X509 {
+ pub cert_info: *mut X509_CINF,
+ pub sig_alg: *mut X509_ALGOR,
+ pub signature: *mut ASN1_BIT_STRING,
+ pub valid: c_int,
+ pub references: c_int,
+ pub name: *mut c_char,
+ pub ex_data: CRYPTO_EX_DATA,
+ pub ex_pathlen: c_long,
+ pub ex_pcpathlen: c_long,
+ pub ex_flags: c_ulong,
+ pub ex_kusage: c_ulong,
+ pub ex_xkusage: c_ulong,
+ pub ex_nscert: c_ulong,
+ skid: *mut c_void,
+ akid: *mut c_void,
+ policy_cache: *mut c_void,
+ crldp: *mut c_void,
+ altname: *mut c_void,
+ nc: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_RFC3779"))]
+ rfc3779_addr: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_RFC3779"))]
+ rfc3779_asid: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_SHA"))]
+ sha1_hash: [c_uchar; 20],
+ aux: *mut c_void,
+ }
+ }
+}
+cfg_if! {
+ if #[cfg(ossl110)] {
+ pub enum X509_ALGOR {}
+ } else {
+ #[repr(C)]
+ pub struct X509_ALGOR {
+ pub algorithm: *mut ASN1_OBJECT,
+ parameter: *mut c_void,
+ }
+ }
+}
+
+pub enum X509_LOOKUP_METHOD {}
+
+pub enum X509_NAME {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl270))] {
+ pub enum X509_STORE {}
+ } else {
+ #[repr(C)]
+ pub struct X509_STORE {
+ cache: c_int,
+ pub objs: *mut stack_st_X509_OBJECT,
+ get_cert_methods: *mut stack_st_X509_LOOKUP,
+ param: *mut X509_VERIFY_PARAM,
+ verify: Option c_int>,
+ verify_cb: Option c_int>,
+ get_issuer: Option<
+ extern "C" fn(issuer: *mut *mut X509, ctx: *mut X509_STORE_CTX, x: *mut X509) -> c_int,
+ >,
+ check_issued:
+ Option c_int>,
+ check_revocation: Option c_int>,
+ get_crl: Option<
+ extern "C" fn(ctx: *mut X509_STORE_CTX, crl: *mut *mut X509_CRL, x: *mut X509) -> c_int,
+ >,
+ check_crl: Option c_int>,
+ cert_crl:
+ Option c_int>,
+ lookup_certs:
+ Option *mut stack_st_X509>,
+ lookup_crls: Option<
+ extern "C" fn(ctx: *const X509_STORE_CTX, nm: *const X509_NAME) -> *mut stack_st_X509_CRL,
+ >,
+ cleanup: Option c_int>,
+ ex_data: CRYPTO_EX_DATA,
+ references: c_int,
+ }
+ }
+}
+
+pub enum X509_STORE_CTX {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum X509_VERIFY_PARAM {}
+ } else if #[cfg(libressl251)] {
+ #[repr(C)]
+ pub struct X509_VERIFY_PARAM {
+ pub name: *mut c_char,
+ pub check_time: time_t,
+ pub inh_flags: c_ulong,
+ pub flags: c_ulong,
+ pub purpose: c_int,
+ pub trust: c_int,
+ pub depth: c_int,
+ pub policies: *mut stack_st_ASN1_OBJECT,
+ id: *mut c_void,
+ }
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct X509_VERIFY_PARAM {
+ pub name: *mut c_char,
+ pub check_time: time_t,
+ pub inh_flags: c_ulong,
+ pub flags: c_ulong,
+ pub purpose: c_int,
+ pub trust: c_int,
+ pub depth: c_int,
+ pub policies: *mut stack_st_ASN1_OBJECT,
+ //pub id: *mut X509_VERIFY_PARAM_ID,
+ }
+ } else {
+ #[repr(C)]
+ pub struct X509_VERIFY_PARAM {
+ pub name: *mut c_char,
+ pub check_time: time_t,
+ pub inh_flags: c_ulong,
+ pub flags: c_ulong,
+ pub purpose: c_int,
+ pub trust: c_int,
+ pub depth: c_int,
+ pub policies: *mut stack_st_ASN1_OBJECT,
+ #[cfg(ossl102)]
+ pub id: *mut X509_VERIFY_PARAM_ID,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl270))] {
+ pub enum X509_OBJECT {}
+ } else {
+ #[repr(C)]
+ pub struct X509_OBJECT {
+ pub type_: c_int,
+ pub data: X509_OBJECT_data,
+ }
+ #[repr(C)]
+ pub union X509_OBJECT_data {
+ pub ptr: *mut c_char,
+ pub x509: *mut X509,
+ pub crl: *mut X509_CRL,
+ pub pkey: *mut EVP_PKEY,
+ }
+ }
+}
+
+pub enum X509_LOOKUP {}
+
+#[repr(C)]
+pub struct X509V3_CTX {
+ flags: c_int,
+ issuer_cert: *mut c_void,
+ subject_cert: *mut c_void,
+ subject_req: *mut c_void,
+ crl: *mut c_void,
+ db_meth: *mut c_void,
+ db: *mut c_void,
+ #[cfg(ossl300)]
+ issuer_pkey: *mut c_void,
+ // I like the last comment line, it is copied from OpenSSL sources:
+ // Maybe more here
+}
+pub enum CONF {}
+#[cfg(ossl110)]
+pub enum OPENSSL_INIT_SETTINGS {}
+
+pub enum ENGINE {}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum SSL {}
+ } else if #[cfg(libressl251)] {
+ #[repr(C)]
+ pub struct SSL {
+ version: c_int,
+ method: *const SSL_METHOD,
+ rbio: *mut BIO,
+ wbio: *mut BIO,
+ bbio: *mut BIO,
+ pub server: c_int,
+ s3: *mut c_void,
+ d1: *mut c_void,
+ param: *mut c_void,
+ cipher_list: *mut stack_st_SSL_CIPHER,
+ cert: *mut c_void,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ session: *mut SSL_SESSION,
+ verify_mode: c_int,
+ error: c_int,
+ error_code: c_int,
+ ctx: *mut SSL_CTX,
+ verify_result: c_long,
+ references: c_int,
+ client_version: c_int,
+ max_send_fragment: c_uint,
+ tlsext_hostname: *mut c_char,
+ tlsext_status_type: c_int,
+ initial_ctx: *mut SSL_CTX,
+ enc_read_ctx: *mut EVP_CIPHER_CTX,
+ read_hash: *mut EVP_MD_CTX,
+ internal: *mut c_void,
+ }
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct SSL {
+ version: c_int,
+ type_: c_int,
+ method: *const SSL_METHOD,
+ rbio: *mut c_void,
+ wbio: *mut c_void,
+ bbio: *mut c_void,
+ rwstate: c_int,
+ in_handshake: c_int,
+ handshake_func: Option c_int>,
+ pub server: c_int,
+ new_session: c_int,
+ quiet_shutdown: c_int,
+ shutdown: c_int,
+ state: c_int,
+ rstate: c_int,
+ init_buf: *mut c_void,
+ init_msg: *mut c_void,
+ init_num: c_int,
+ init_off: c_int,
+ packet: *mut c_uchar,
+ packet_length: c_uint,
+ s3: *mut c_void,
+ d1: *mut c_void,
+ read_ahead: c_int,
+ msg_callback: Option<
+ unsafe extern "C" fn(c_int,
+ c_int,
+ c_int,
+ *const c_void,
+ size_t,
+ *mut SSL,
+ *mut c_void),
+ >,
+ msg_callback_arg: *mut c_void,
+ hit: c_int,
+ param: *mut c_void,
+ cipher_list: *mut stack_st_SSL_CIPHER,
+ cipher_list_by_id: *mut stack_st_SSL_CIPHER,
+ mac_flags: c_int,
+ aead_read_ctx: *mut c_void,
+ enc_read_ctx: *mut EVP_CIPHER_CTX,
+ read_hash: *mut EVP_MD_CTX,
+ aead_write_ctx: *mut c_void,
+ enc_write_ctx: *mut EVP_CIPHER_CTX,
+ write_hash: *mut EVP_MD_CTX,
+ cert: *mut c_void,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ session: *mut SSL_SESSION,
+ generate_session_id: GEN_SESSION_CB,
+ verify_mode: c_int,
+ verify_callback: Option c_int>,
+ info_callback: Option,
+ error: c_int,
+ error_code: c_int,
+ ctx: *mut SSL_CTX,
+ debug: c_int,
+ verify_result: c_long,
+ ex_data: CRYPTO_EX_DATA,
+ client_CA: *mut stack_st_X509_NAME,
+ references: c_int,
+ options: c_ulong,
+ mode: c_ulong,
+ max_cert_list: c_long,
+ first_packet: c_int,
+ client_version: c_int,
+ max_send_fragment: c_uint,
+ tlsext_debug_cb:
+ Option,
+ tlsext_debug_arg: *mut c_void,
+ tlsext_hostname: *mut c_char,
+ servername_done: c_int,
+ tlsext_status_type: c_int,
+ tlsext_status_expected: c_int,
+ tlsext_ocsp_ids: *mut c_void,
+ tlsext_ocsp_exts: *mut c_void,
+ tlsext_ocsp_resp: *mut c_uchar,
+ tlsext_ocsp_resplen: c_int,
+ tlsext_ticket_expected: c_int,
+ tlsext_ecpointformatlist_length: size_t,
+ tlsext_ecpointformatlist: *mut c_uchar,
+ tlsext_ellipticcurvelist_length: size_t,
+ tlsext_ellipticcurvelist: *mut c_uchar,
+ tlsext_session_ticket: *mut c_void,
+ tlsext_session_ticket_ext_cb: tls_session_ticket_ext_cb_fn,
+ tls_session_ticket_ext_cb_arg: *mut c_void,
+ tls_session_secret_cb: tls_session_secret_cb_fn,
+ tls_session_secret_cb_arg: *mut c_void,
+ initial_ctx: *mut SSL_CTX,
+ next_proto_negotiated: *mut c_uchar,
+ next_proto_negotiated_len: c_uchar,
+ srtp_profiles: *mut c_void,
+ srtp_profile: *mut c_void,
+ tlsext_heartbeat: c_uint,
+ tlsext_hb_pending: c_uint,
+ tlsext_hb_seq: c_uint,
+ alpn_client_proto_list: *mut c_uchar,
+ alpn_client_proto_list_len: c_uint,
+ renegotiate: c_int,
+ }
+ } else {
+ #[repr(C)]
+ pub struct SSL {
+ version: c_int,
+ type_: c_int,
+ method: *const SSL_METHOD,
+ rbio: *mut c_void,
+ wbio: *mut c_void,
+ bbio: *mut c_void,
+ rwstate: c_int,
+ in_handshake: c_int,
+ handshake_func: Option c_int>,
+ pub server: c_int,
+ new_session: c_int,
+ quiet_session: c_int,
+ shutdown: c_int,
+ state: c_int,
+ rstate: c_int,
+ init_buf: *mut c_void,
+ init_msg: *mut c_void,
+ init_num: c_int,
+ init_off: c_int,
+ packet: *mut c_uchar,
+ packet_length: c_uint,
+ s2: *mut c_void,
+ s3: *mut c_void,
+ d1: *mut c_void,
+ read_ahead: c_int,
+ msg_callback: Option<
+ unsafe extern "C" fn(c_int, c_int, c_int, *const c_void, size_t, *mut SSL, *mut c_void),
+ >,
+ msg_callback_arg: *mut c_void,
+ hit: c_int,
+ param: *mut c_void,
+ cipher_list: *mut stack_st_SSL_CIPHER,
+ cipher_list_by_id: *mut stack_st_SSL_CIPHER,
+ mac_flags: c_int,
+ enc_read_ctx: *mut EVP_CIPHER_CTX,
+ read_hash: *mut EVP_MD_CTX,
+ expand: *mut c_void,
+ enc_write_ctx: *mut EVP_CIPHER_CTX,
+ write_hash: *mut EVP_MD_CTX,
+ compress: *mut c_void,
+ cert: *mut c_void,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ session: *mut SSL_SESSION,
+ generate_session_id: GEN_SESSION_CB,
+ verify_mode: c_int,
+ verify_callback: Option c_int>,
+ info_callback: Option,
+ error: c_int,
+ error_code: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_KRB5"))]
+ kssl_ctx: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_client_callback: Option<
+ unsafe extern "C" fn(*mut SSL, *const c_char, *mut c_char, c_uint, *mut c_uchar, c_uint)
+ -> c_uint,
+ >,
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_server_callback:
+ Option c_uint>,
+ ctx: *mut SSL_CTX,
+ debug: c_int,
+ verify_result: c_long,
+ ex_data: CRYPTO_EX_DATA,
+ client_CA: *mut stack_st_X509_NAME,
+ references: c_int,
+ options: c_ulong,
+ mode: c_ulong,
+ max_cert_list: c_long,
+ first_packet: c_int,
+ client_version: c_int,
+ max_send_fragment: c_uint,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_debug_cb:
+ Option,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_debug_arg: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_hostname: *mut c_char,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ servername_done: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_status_type: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_status_expected: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ocsp_ids: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ocsp_exts: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ocsp_resp: *mut c_uchar,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ocsp_resplen: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ticket_expected: c_int,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ecpointformatlist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ecpointformatlist: *mut c_uchar,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ellipticcurvelist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC")
+ ))]
+ tlsext_ellipticcurvelist: *mut c_uchar,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_opaque_prf_input: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_opaque_prf_input_len: size_t,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_session_ticket: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_session_ticket_ext_cb: tls_session_ticket_ext_cb_fn,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tls_session_ticket_ext_cb_arg: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tls_session_secret_cb: tls_session_secret_cb_fn,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tls_session_secret_cb_arg: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ initial_ctx: *mut SSL_CTX,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_proto_negotiated: *mut c_uchar,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_proto_negotiated_len: c_uchar,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ srtp_profiles: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ srtp_profile: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_heartbeat: c_uint,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_hb_pending: c_uint,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_hb_seq: c_uint,
+ renegotiate: c_int,
+ #[cfg(not(osslconf = "OPENSSL_NO_SRP"))]
+ srp_ctx: SRP_CTX,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_client_proto_list: *mut c_uchar,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_client_proto_list_len: c_uint,
+ }
+ }
+}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum SSL_CTX {}
+ } else if #[cfg(libressl251)] {
+ #[repr(C)]
+ pub struct SSL_CTX {
+ method: *const SSL_METHOD,
+ cipher_list: *mut stack_st_SSL_CIPHER,
+ cert_store: *mut c_void,
+ session_timeout: c_long,
+ pub references: c_int,
+ extra_certs: *mut stack_st_X509,
+ verify_mode: c_int,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; SSL_MAX_SID_CTX_LENGTH as usize],
+ param: *mut X509_VERIFY_PARAM,
+ default_passwd_callback: *mut c_void,
+ default_passwd_callback_userdata: *mut c_void,
+ internal: *mut c_void,
+ }
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct SSL_CTX {
+ method: *mut c_void,
+ cipher_list: *mut c_void,
+ cipher_list_by_id: *mut c_void,
+ cert_store: *mut c_void,
+ sessions: *mut c_void,
+ session_cache_size: c_ulong,
+ session_cache_head: *mut c_void,
+ session_cache_tail: *mut c_void,
+ session_cache_mode: c_int,
+ session_timeout: c_long,
+ new_session_cb: *mut c_void,
+ remove_session_cb: *mut c_void,
+ get_session_cb: *mut c_void,
+ stats: [c_int; 11],
+ pub references: c_int,
+ app_verify_callback: *mut c_void,
+ app_verify_arg: *mut c_void,
+ default_passwd_callback: *mut c_void,
+ default_passwd_callback_userdata: *mut c_void,
+ client_cert_cb: *mut c_void,
+ app_gen_cookie_cb: *mut c_void,
+ app_verify_cookie_cb: *mut c_void,
+ ex_dat: CRYPTO_EX_DATA,
+ rsa_md5: *mut c_void,
+ md5: *mut c_void,
+ sha1: *mut c_void,
+ extra_certs: *mut c_void,
+ comp_methods: *mut c_void,
+ info_callback: *mut c_void,
+ client_CA: *mut c_void,
+ options: c_ulong,
+ mode: c_ulong,
+ max_cert_list: c_long,
+ cert: *mut c_void,
+ read_ahead: c_int,
+ msg_callback: *mut c_void,
+ msg_callback_arg: *mut c_void,
+ verify_mode: c_int,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; 32],
+ default_verify_callback: *mut c_void,
+ generate_session_id: *mut c_void,
+ param: *mut c_void,
+ quiet_shutdown: c_int,
+ max_send_fragment: c_uint,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_ENGINE"))]
+ client_cert_engine: *mut c_void,
+
+ tlsext_servername_callback: *mut c_void,
+ tlsect_servername_arg: *mut c_void,
+ tlsext_tick_key_name: [c_uchar; 16],
+ tlsext_tick_hmac_key: [c_uchar; 16],
+ tlsext_tick_aes_key: [c_uchar; 16],
+ tlsext_ticket_key_cb: *mut c_void,
+ tlsext_status_cb: *mut c_void,
+ tlsext_status_arg: *mut c_void,
+ tlsext_opaque_prf_input_callback: *mut c_void,
+ tlsext_opaque_prf_input_callback_arg: *mut c_void,
+
+ next_protos_advertised_cb: *mut c_void,
+ next_protos_advertised_cb_arg: *mut c_void,
+ next_proto_select_cb: *mut c_void,
+ next_proto_select_cb_arg: *mut c_void,
+
+ srtp_profiles: *mut c_void,
+ }
+ } else {
+ #[repr(C)]
+ pub struct SSL_CTX {
+ method: *mut c_void,
+ cipher_list: *mut c_void,
+ cipher_list_by_id: *mut c_void,
+ cert_store: *mut c_void,
+ sessions: *mut c_void,
+ session_cache_size: c_ulong,
+ session_cache_head: *mut c_void,
+ session_cache_tail: *mut c_void,
+ session_cache_mode: c_int,
+ session_timeout: c_long,
+ new_session_cb: *mut c_void,
+ remove_session_cb: *mut c_void,
+ get_session_cb: *mut c_void,
+ stats: [c_int; 11],
+ pub references: c_int,
+ app_verify_callback: *mut c_void,
+ app_verify_arg: *mut c_void,
+ default_passwd_callback: *mut c_void,
+ default_passwd_callback_userdata: *mut c_void,
+ client_cert_cb: *mut c_void,
+ app_gen_cookie_cb: *mut c_void,
+ app_verify_cookie_cb: *mut c_void,
+ ex_dat: CRYPTO_EX_DATA,
+ rsa_md5: *mut c_void,
+ md5: *mut c_void,
+ sha1: *mut c_void,
+ extra_certs: *mut c_void,
+ comp_methods: *mut c_void,
+ info_callback: *mut c_void,
+ client_CA: *mut c_void,
+ options: c_ulong,
+ mode: c_ulong,
+ max_cert_list: c_long,
+ cert: *mut c_void,
+ read_ahead: c_int,
+ msg_callback: *mut c_void,
+ msg_callback_arg: *mut c_void,
+ verify_mode: c_int,
+ sid_ctx_length: c_uint,
+ sid_ctx: [c_uchar; 32],
+ default_verify_callback: *mut c_void,
+ generate_session_id: *mut c_void,
+ param: *mut c_void,
+ quiet_shutdown: c_int,
+ max_send_fragment: c_uint,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_ENGINE"))]
+ client_cert_engine: *mut c_void,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_servername_callback: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsect_servername_arg: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_tick_key_name: [c_uchar; 16],
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_tick_hmac_key: [c_uchar; 16],
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_tick_aes_key: [c_uchar; 16],
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_ticket_key_cb: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_status_cb: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_status_arg: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_opaque_prf_input_callback: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_TLSEXT"))]
+ tlsext_opaque_prf_input_callback_arg: *mut c_void,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_identity_hint: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_client_callback: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
+ psk_server_callback: *mut c_void,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_BUF_FREELISTS"))]
+ freelist_max_len: c_uint,
+ #[cfg(not(osslconf = "OPENSSL_NO_BUF_FREELISTS"))]
+ wbuf_freelist: *mut c_void,
+ #[cfg(not(osslconf = "OPENSSL_NO_BUF_FREELISTS"))]
+ rbuf_freelist: *mut c_void,
+
+ #[cfg(not(osslconf = "OPENSSL_NO_SRP"))]
+ srp_ctx: SRP_CTX,
+
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_protos_advertised_cb: *mut c_void,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_protos_advertised_cb_arg: *mut c_void,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_proto_select_cb: *mut c_void,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_NEXTPROTONEG")
+ ))]
+ next_proto_select_cb_arg: *mut c_void,
+
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl101))]
+ srtp_profiles: *mut c_void,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_select_cb: *mut c_void,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_select_cb_arg: *mut c_void,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_client_proto_list: *mut c_void,
+ #[cfg(all(not(osslconf = "OPENSSL_NO_TLSEXT"), ossl102))]
+ alpn_client_proto_list_len: c_uint,
+
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC"),
+ ossl102
+ ))]
+ tlsext_ecpointformatlist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC"),
+ ossl102
+ ))]
+ tlsext_ecpointformatlist: *mut c_uchar,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC"),
+ ossl102
+ ))]
+ tlsext_ellipticcurvelist_length: size_t,
+ #[cfg(all(
+ not(osslconf = "OPENSSL_NO_TLSEXT"),
+ not(osslconf = "OPENSSL_NO_EC"),
+ ossl102
+ ))]
+ tlsext_ellipticcurvelist: *mut c_uchar,
+ }
+
+ #[repr(C)]
+ #[cfg(not(osslconf = "OPENSSL_NO_SRP"))]
+ pub struct SRP_CTX {
+ SRP_cb_arg: *mut c_void,
+ TLS_ext_srp_username_callback: *mut c_void,
+ SRP_verify_param_callback: *mut c_void,
+ SRP_give_srp_client_pwd_callback: *mut c_void,
+ login: *mut c_void,
+ N: *mut c_void,
+ g: *mut c_void,
+ s: *mut c_void,
+ B: *mut c_void,
+ A: *mut c_void,
+ a: *mut c_void,
+ b: *mut c_void,
+ v: *mut c_void,
+ info: *mut c_void,
+ stringth: c_int,
+ srp_Mask: c_ulong,
+ }
+ }
+}
+
+pub enum COMP_CTX {}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum COMP_METHOD {}
+ } else {
+ #[repr(C)]
+ pub struct COMP_METHOD {
+ pub type_: c_int,
+ pub name: *const c_char,
+ init: Option c_int>,
+ finish: Option,
+ compress: Option<
+ unsafe extern "C" fn(
+ *mut COMP_CTX,
+ *mut c_uchar,
+ c_uint,
+ *mut c_uchar,
+ c_uint,
+ ) -> c_int,
+ >,
+ expand: Option<
+ unsafe extern "C" fn(
+ *mut COMP_CTX,
+ *mut c_uchar,
+ c_uint,
+ *mut c_uchar,
+ c_uint,
+ ) -> c_int,
+ >,
+ ctrl: Option c_long>,
+ callback_ctrl: Option c_long>,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl280))] {
+ pub enum CRYPTO_EX_DATA {}
+ } else if #[cfg(libressl)] {
+ #[repr(C)]
+ pub struct CRYPTO_EX_DATA {
+ pub sk: *mut stack_st_void,
+ }
+ } else {
+ #[repr(C)]
+ pub struct CRYPTO_EX_DATA {
+ pub sk: *mut stack_st_void,
+ pub dummy: c_int,
+ }
+ }
+}
+
+pub enum OCSP_RESPONSE {}
+
+#[cfg(ossl300)]
+pub enum OSSL_PROVIDER {}
+
+#[cfg(ossl300)]
+pub enum OSSL_LIB_CTX {}
diff --git a/openssl-sys/src/handwritten/x509.rs b/openssl-sys/src/handwritten/x509.rs
new file mode 100644
index 0000000..8762e5f
--- /dev/null
+++ b/openssl-sys/src/handwritten/x509.rs
@@ -0,0 +1,666 @@
+use super::super::*;
+use libc::*;
+
+#[repr(C)]
+pub struct X509_VAL {
+ pub notBefore: *mut ASN1_TIME,
+ pub notAfter: *mut ASN1_TIME,
+}
+
+pub enum X509_NAME_ENTRY {}
+
+stack!(stack_st_X509_NAME);
+
+pub enum X509_EXTENSION {}
+
+stack!(stack_st_X509_EXTENSION);
+
+stack!(stack_st_X509_ATTRIBUTE);
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_REQ_INFO {}
+ } else {
+ #[repr(C)]
+ pub struct X509_REQ_INFO {
+ pub enc: ASN1_ENCODING,
+ pub version: *mut ASN1_INTEGER,
+ pub subject: *mut X509_NAME,
+ pubkey: *mut c_void,
+ pub attributes: *mut stack_st_X509_ATTRIBUTE,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_CRL {}
+ } else {
+ #[repr(C)]
+ pub struct X509_CRL {
+ pub crl: *mut X509_CRL_INFO,
+ sig_alg: *mut X509_ALGOR,
+ signature: *mut c_void,
+ references: c_int,
+ flags: c_int,
+ akid: *mut c_void,
+ idp: *mut c_void,
+ idp_flags: c_int,
+ idp_reasons: c_int,
+ crl_number: *mut ASN1_INTEGER,
+ base_crl_number: *mut ASN1_INTEGER,
+ sha1_hash: [c_uchar; 20],
+ issuers: *mut c_void,
+ meth: *const c_void,
+ meth_data: *mut c_void,
+ }
+ }
+}
+
+stack!(stack_st_X509_CRL);
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_CRL_INFO {}
+ } else {
+ #[repr(C)]
+ pub struct X509_CRL_INFO {
+ version: *mut ASN1_INTEGER,
+ sig_alg: *mut X509_ALGOR,
+ pub issuer: *mut X509_NAME,
+ pub lastUpdate: *mut ASN1_TIME,
+ pub nextUpdate: *mut ASN1_TIME,
+ pub revoked: *mut stack_st_X509_REVOKED,
+ extensions: *mut stack_st_X509_EXTENSION,
+ enc: ASN1_ENCODING,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_REVOKED {}
+ } else {
+ #[repr(C)]
+ pub struct X509_REVOKED {
+ pub serialNumber: *mut ASN1_INTEGER,
+ pub revocationDate: *mut ASN1_TIME,
+ pub extensions: *mut stack_st_X509_EXTENSION,
+ issuer: *mut stack_st_GENERAL_NAME,
+ reason: c_int,
+ sequence: c_int,
+ }
+ }
+}
+
+stack!(stack_st_X509_REVOKED);
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_REQ {}
+ } else {
+ #[repr(C)]
+ pub struct X509_REQ {
+ pub req_info: *mut X509_REQ_INFO,
+ sig_alg: *mut c_void,
+ signature: *mut c_void,
+ references: c_int,
+ }
+ }
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ pub enum X509_CINF {}
+ } else {
+ #[repr(C)]
+ pub struct X509_CINF {
+ version: *mut c_void,
+ serialNumber: *mut c_void,
+ signature: *mut c_void,
+ issuer: *mut c_void,
+ pub validity: *mut X509_VAL,
+ subject: *mut c_void,
+ key: *mut c_void,
+ issuerUID: *mut c_void,
+ subjectUID: *mut c_void,
+ pub extensions: *mut stack_st_X509_EXTENSION,
+ enc: ASN1_ENCODING,
+ }
+ }
+}
+
+stack!(stack_st_X509);
+
+stack!(stack_st_X509_OBJECT);
+
+stack!(stack_st_X509_LOOKUP);
+
+extern "C" {
+ pub fn X509_verify_cert_error_string(n: c_long) -> *const c_char;
+
+ pub fn X509_sign(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
+
+ pub fn X509_digest(
+ x: *const X509,
+ digest: *const EVP_MD,
+ buf: *mut c_uchar,
+ len: *mut c_uint,
+ ) -> c_int;
+
+ pub fn X509_REQ_sign(x: *mut X509_REQ, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_X509_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] X509) -> c_int;
+ pub fn i2d_X509_REQ_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] X509_REQ) -> c_int;
+ pub fn i2d_PrivateKey_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
+ pub fn i2d_PUBKEY_bio(b: *mut BIO, x: #[const_ptr_if(ossl300)] EVP_PKEY) -> c_int;
+
+ pub fn i2d_PUBKEY(k: #[const_ptr_if(ossl300)] EVP_PKEY, buf: *mut *mut u8) -> c_int;
+ pub fn i2d_RSA_PUBKEY(k: #[const_ptr_if(ossl300)] RSA, buf: *mut *mut u8) -> c_int;
+ pub fn i2d_DSA_PUBKEY(a: #[const_ptr_if(ossl300)] DSA, pp: *mut *mut c_uchar) -> c_int;
+ pub fn i2d_PrivateKey(k: #[const_ptr_if(ossl300)] EVP_PKEY, buf: *mut *mut u8) -> c_int;
+ pub fn i2d_ECPrivateKey(ec_key: #[const_ptr_if(ossl300)] EC_KEY, pp: *mut *mut c_uchar) -> c_int;
+ pub fn i2d_EC_PUBKEY(a: #[const_ptr_if(ossl300)] EC_KEY, pp: *mut *mut c_uchar) -> c_int;
+ }
+}
+extern "C" {
+ pub fn d2i_PUBKEY(k: *mut *mut EVP_PKEY, buf: *mut *const u8, len: c_long) -> *mut EVP_PKEY;
+ pub fn d2i_RSA_PUBKEY(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
+ pub fn d2i_DSA_PUBKEY(k: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long) -> *mut DSA;
+ pub fn d2i_EC_PUBKEY(
+ a: *mut *mut EC_KEY,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut EC_KEY;
+
+ pub fn d2i_ECPrivateKey(
+ k: *mut *mut EC_KEY,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut EC_KEY;
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(any(ossl102, libressl350))]
+ pub fn X509_ALGOR_get0(
+ paobj: *mut #[const_ptr_if(any(ossl110, libressl350))] ASN1_OBJECT,
+ pptype: *mut c_int,
+ ppval: *mut #[const_ptr_if(any(ossl110, libressl350))] c_void,
+ alg: #[const_ptr_if(any(ossl110, libressl350))] X509_ALGOR,
+ );
+ }
+}
+
+extern "C" {
+ pub fn X509_gmtime_adj(time: *mut ASN1_TIME, adj: c_long) -> *mut ASN1_TIME;
+
+ pub fn X509_to_X509_REQ(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> *mut X509_REQ;
+
+ pub fn X509_ALGOR_free(x: *mut X509_ALGOR);
+
+ pub fn X509_REVOKED_new() -> *mut X509_REVOKED;
+ pub fn X509_REVOKED_free(x: *mut X509_REVOKED);
+}
+const_ptr_api! {
+ extern "C" {
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_REVOKED_dup(rev: #[const_ptr_if(ossl300)] X509_REVOKED) -> *mut X509_REVOKED;
+ }
+}
+
+extern "C" {
+ pub fn d2i_X509_REVOKED(
+ a: *mut *mut X509_REVOKED,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut X509_REVOKED;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_X509_REVOKED(x: #[const_ptr_if(ossl300)] X509_REVOKED, buf: *mut *mut u8) -> c_int;
+ }
+}
+extern "C" {
+ pub fn X509_CRL_new() -> *mut X509_CRL;
+ pub fn X509_CRL_free(x: *mut X509_CRL);
+ pub fn d2i_X509_CRL(
+ a: *mut *mut X509_CRL,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut X509_CRL;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_X509_CRL(x: #[const_ptr_if(ossl300)] X509_CRL, buf: *mut *mut u8) -> c_int;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_CRL_dup(x: #[const_ptr_if(ossl300)] X509_CRL) -> *mut X509_CRL;
+ }
+}
+
+extern "C" {
+ pub fn X509_REQ_new() -> *mut X509_REQ;
+ pub fn X509_REQ_free(x: *mut X509_REQ);
+ pub fn d2i_X509_REQ(
+ a: *mut *mut X509_REQ,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut X509_REQ;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_X509_REQ(x: #[const_ptr_if(ossl300)] X509_REQ, buf: *mut *mut u8) -> c_int;
+
+ #[cfg(any(ossl102, libressl273))]
+ pub fn X509_get0_signature(
+ psig: *mut #[const_ptr_if(any(ossl110, libressl273))] ASN1_BIT_STRING,
+ palg: *mut #[const_ptr_if(any(ossl110, libressl273))] X509_ALGOR,
+ x: *const X509,
+ );
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_REQ_dup(x: #[const_ptr_if(ossl300)] X509_REQ) -> *mut X509_REQ;
+ }
+}
+extern "C" {
+ #[cfg(ossl102)]
+ pub fn X509_get_signature_nid(x: *const X509) -> c_int;
+
+ pub fn X509_EXTENSION_free(ext: *mut X509_EXTENSION);
+
+ pub fn X509_NAME_ENTRY_free(x: *mut X509_NAME_ENTRY);
+
+ pub fn X509_NAME_new() -> *mut X509_NAME;
+ pub fn X509_NAME_free(x: *mut X509_NAME);
+
+ pub fn X509_new() -> *mut X509;
+ pub fn X509_free(x: *mut X509);
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn i2d_X509(x: #[const_ptr_if(ossl300)] X509, buf: *mut *mut u8) -> c_int;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_NAME_dup(x: #[const_ptr_if(ossl300)] X509_NAME) -> *mut X509_NAME;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_dup(x: #[const_ptr_if(ossl300)] X509) -> *mut X509;
+ #[cfg(any(ossl101, libressl350))]
+ pub fn X509_NAME_add_entry(
+ name: *mut X509_NAME,
+ ne: #[const_ptr_if(any(ossl110, libressl))] X509_NAME_ENTRY,
+ loc: c_int,
+ set: c_int,
+ ) -> c_int;
+ }
+}
+extern "C" {
+ pub fn d2i_X509(a: *mut *mut X509, pp: *mut *const c_uchar, length: c_long) -> *mut X509;
+ pub fn d2i_X509_bio(b: *mut BIO, a: *mut *mut X509) -> *mut X509;
+
+ pub fn X509_get_pubkey(x: *mut X509) -> *mut EVP_PKEY;
+
+ pub fn X509_set_version(x: *mut X509, version: c_long) -> c_int;
+ #[cfg(ossl110)]
+ pub fn X509_get_version(x: *const X509) -> c_long;
+ pub fn X509_set_serialNumber(x: *mut X509, sn: *mut ASN1_INTEGER) -> c_int;
+ pub fn X509_get_serialNumber(x: *mut X509) -> *mut ASN1_INTEGER;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_set_issuer_name(x: *mut X509, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
+ }
+}
+extern "C" {
+ pub fn X509_issuer_name_hash(x: *mut X509) -> c_ulong;
+ pub fn X509_subject_name_hash(x: *mut X509) -> c_ulong;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_get_issuer_name(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> *mut X509_NAME;
+ pub fn X509_set_subject_name(x: *mut X509, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
+ pub fn X509_get_subject_name(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> *mut X509_NAME;
+ }
+}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ extern "C" {
+ pub fn X509_set1_notBefore(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
+ pub fn X509_set1_notAfter(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
+ }
+ } else {
+ extern "C" {
+ pub fn X509_set_notBefore(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
+ pub fn X509_set_notAfter(x: *mut X509, tm: *const ASN1_TIME) -> c_int;
+ }
+ }
+}
+extern "C" {
+ #[cfg(any(ossl110, libressl350))]
+ pub fn X509_REQ_get_version(req: *const X509_REQ) -> c_long;
+ pub fn X509_REQ_set_version(req: *mut X509_REQ, version: c_long) -> c_int;
+ #[cfg(any(ossl110, libressl350))]
+ pub fn X509_REQ_get_subject_name(req: *const X509_REQ) -> *mut X509_NAME;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_REQ_set_subject_name(req: *mut X509_REQ, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
+ }
+}
+extern "C" {
+ pub fn X509_REQ_set_pubkey(req: *mut X509_REQ, pkey: *mut EVP_PKEY) -> c_int;
+ pub fn X509_REQ_get_pubkey(req: *mut X509_REQ) -> *mut EVP_PKEY;
+ pub fn X509_REQ_get_extensions(req: *mut X509_REQ) -> *mut stack_st_X509_EXTENSION;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_REQ_add_extensions(req: *mut X509_REQ, exts: #[const_ptr_if(ossl300)] stack_st_X509_EXTENSION)
+ -> c_int;
+ }
+}
+extern "C" {
+ pub fn X509_set_pubkey(x: *mut X509, pkey: *mut EVP_PKEY) -> c_int;
+ pub fn X509_REQ_verify(req: *mut X509_REQ, pkey: *mut EVP_PKEY) -> c_int;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn X509_getm_notBefore(x: *const X509) -> *mut ASN1_TIME;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn X509_getm_notAfter(x: *const X509) -> *mut ASN1_TIME;
+ #[cfg(any(ossl110, libressl273))]
+ pub fn X509_up_ref(x: *mut X509) -> c_int;
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_REVOKED_get0_serialNumber(req: *const X509_REVOKED) -> *const ASN1_INTEGER;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_REVOKED_get0_revocationDate(req: *const X509_REVOKED) -> *const ASN1_TIME;
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_REVOKED_get0_extensions(r: *const X509_REVOKED) -> *const stack_st_X509_EXTENSION;
+
+ pub fn X509_REVOKED_set_serialNumber(r: *mut X509_REVOKED, serial: *mut ASN1_INTEGER) -> c_int;
+ pub fn X509_REVOKED_set_revocationDate(r: *mut X509_REVOKED, tm: *mut ASN1_TIME) -> c_int;
+
+ pub fn X509_CRL_sign(x: *mut X509_CRL, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
+ pub fn X509_CRL_digest(
+ x: *const X509_CRL,
+ digest: *const EVP_MD,
+ md: *mut c_uchar,
+ len: *mut c_uint,
+ ) -> c_int;
+ pub fn X509_CRL_verify(crl: *mut X509_CRL, pkey: *mut EVP_PKEY) -> c_int;
+ pub fn X509_CRL_get0_by_cert(
+ x: *mut X509_CRL,
+ ret: *mut *mut X509_REVOKED,
+ cert: *mut X509,
+ ) -> c_int;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_CRL_get0_by_serial(
+ x: *mut X509_CRL,
+ ret: *mut *mut X509_REVOKED,
+ serial: #[const_ptr_if(ossl300)] ASN1_INTEGER,
+ ) -> c_int;
+ }
+}
+
+extern "C" {
+ #[cfg(any(ossl110, libressl281))]
+ pub fn X509_CRL_get_REVOKED(crl: *mut X509_CRL) -> *mut stack_st_X509_REVOKED;
+ #[cfg(any(ossl110, libressl281))]
+ pub fn X509_CRL_get0_nextUpdate(x: *const X509_CRL) -> *const ASN1_TIME;
+ #[cfg(any(ossl110, libressl281))]
+ pub fn X509_CRL_get0_lastUpdate(x: *const X509_CRL) -> *const ASN1_TIME;
+ #[cfg(any(ossl110, libressl281))]
+ pub fn X509_CRL_get_issuer(x: *const X509_CRL) -> *mut X509_NAME;
+
+ #[cfg(ossl110)]
+ pub fn X509_get0_extensions(req: *const X509) -> *const stack_st_X509_EXTENSION;
+
+ pub fn X509_CRL_set_version(crl: *mut X509_CRL, version: c_long) -> c_int;
+}
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_CRL_set_issuer_name(crl: *mut X509_CRL, name: #[const_ptr_if(ossl300)] X509_NAME) -> c_int;
+ }
+}
+extern "C" {
+ pub fn X509_CRL_sort(crl: *mut X509_CRL) -> c_int;
+
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_CRL_up_ref(crl: *mut X509_CRL) -> c_int;
+ pub fn X509_CRL_add0_revoked(crl: *mut X509_CRL, rev: *mut X509_REVOKED) -> c_int;
+}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl270))] {
+ extern "C" {
+ pub fn X509_CRL_set1_lastUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
+ pub fn X509_CRL_set1_nextUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
+ }
+ } else {
+ // libressl270 kept them, ossl110 "#define"s them to the variants above
+ extern "C" {
+ pub fn X509_CRL_set_lastUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
+ pub fn X509_CRL_set_nextUpdate(crl: *mut X509_CRL, tm: *const ASN1_TIME) -> c_int;
+ }
+ }
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_NAME_entry_count(n: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME) -> c_int;
+ pub fn X509_NAME_get_index_by_NID(n: #[const_ptr_if(any(ossl300, libressl280))] X509_NAME, nid: c_int, last_pos: c_int) -> c_int;
+ pub fn X509_NAME_get_entry(n: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME, loc: c_int) -> *mut X509_NAME_ENTRY;
+ pub fn X509_NAME_add_entry_by_NID(
+ x: *mut X509_NAME,
+ field: c_int,
+ ty: c_int,
+ bytes: #[const_ptr_if(any(ossl110, libressl280))] c_uchar,
+ len: c_int,
+ loc: c_int,
+ set: c_int,
+ ) -> c_int;
+ pub fn i2d_X509_NAME(n: #[const_ptr_if(ossl300)] X509_NAME, buf: *mut *mut u8) -> c_int;
+ pub fn X509_NAME_ENTRY_get_object(ne: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME_ENTRY) -> *mut ASN1_OBJECT;
+ pub fn X509_NAME_ENTRY_get_data(ne: #[const_ptr_if(any(ossl110, libressl280))] X509_NAME_ENTRY) -> *mut ASN1_STRING;
+ }
+}
+extern "C" {
+ pub fn X509_NAME_add_entry_by_txt(
+ x: *mut X509_NAME,
+ field: *const c_char,
+ ty: c_int,
+ bytes: *const c_uchar,
+ len: c_int,
+ loc: c_int,
+ set: c_int,
+ ) -> c_int;
+ pub fn d2i_X509_NAME(
+ n: *mut *mut X509_NAME,
+ pp: *mut *const c_uchar,
+ length: c_long,
+ ) -> *mut X509_NAME;
+}
+
+// "raw" X509_EXTENSION related functions
+extern "C" {
+ // in X509
+ pub fn X509_delete_ext(x: *mut X509, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_add_ext(x: *mut X509, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
+ pub fn X509_add1_ext_i2d(
+ x: *mut X509,
+ nid: c_int,
+ value: *mut c_void,
+ crit: c_int,
+ flags: c_ulong,
+ ) -> c_int;
+ // in X509_CRL
+ pub fn X509_CRL_delete_ext(x: *mut X509_CRL, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_CRL_add_ext(x: *mut X509_CRL, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
+ pub fn X509_CRL_add1_ext_i2d(
+ x: *mut X509_CRL,
+ nid: c_int,
+ value: *mut c_void,
+ crit: c_int,
+ flags: c_ulong,
+ ) -> c_int;
+ // in X509_REVOKED
+ pub fn X509_REVOKED_delete_ext(x: *mut X509_REVOKED, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_REVOKED_add_ext(
+ x: *mut X509_REVOKED,
+ ext: *mut X509_EXTENSION,
+ loc: c_int,
+ ) -> c_int;
+ pub fn X509_REVOKED_add1_ext_i2d(
+ x: *mut X509_REVOKED,
+ nid: c_int,
+ value: *mut c_void,
+ crit: c_int,
+ flags: c_ulong,
+ ) -> c_int;
+ // X509_EXTENSION stack
+ // - these getters always used *const STACK
+ pub fn X509v3_get_ext_count(x: *const stack_st_X509_EXTENSION) -> c_int;
+ pub fn X509v3_get_ext_by_NID(
+ x: *const stack_st_X509_EXTENSION,
+ nid: c_int,
+ lastpos: c_int,
+ ) -> c_int;
+ pub fn X509v3_get_ext_by_critical(
+ x: *const stack_st_X509_EXTENSION,
+ crit: c_int,
+ lastpos: c_int,
+ ) -> c_int;
+ pub fn X509v3_get_ext(x: *const stack_st_X509_EXTENSION, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509v3_delete_ext(x: *mut stack_st_X509_EXTENSION, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509v3_add_ext(
+ x: *mut *mut stack_st_X509_EXTENSION,
+ ex: *mut X509_EXTENSION,
+ loc: c_int,
+ ) -> *mut stack_st_X509_EXTENSION;
+ // - X509V3_add1_i2d in x509v3.rs
+ // X509_EXTENSION itself
+ pub fn X509_EXTENSION_create_by_NID(
+ ex: *mut *mut X509_EXTENSION,
+ nid: c_int,
+ crit: c_int,
+ data: *mut ASN1_OCTET_STRING,
+ ) -> *mut X509_EXTENSION;
+ pub fn X509_EXTENSION_set_critical(ex: *mut X509_EXTENSION, crit: c_int) -> c_int;
+ pub fn X509_EXTENSION_set_data(ex: *mut X509_EXTENSION, data: *mut ASN1_OCTET_STRING) -> c_int;
+ pub fn X509_EXTENSION_get_object(ext: *mut X509_EXTENSION) -> *mut ASN1_OBJECT;
+ pub fn X509_EXTENSION_get_data(ext: *mut X509_EXTENSION) -> *mut ASN1_OCTET_STRING;
+}
+const_ptr_api! {
+ extern "C" {
+ // in X509
+ pub fn X509_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509) -> c_int;
+ pub fn X509_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509, nid: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
+ pub fn X509_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509, crit: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_get_ext_d2i(
+ x: #[const_ptr_if(any(ossl110, libressl280))] X509,
+ nid: c_int,
+ crit: *mut c_int,
+ idx: *mut c_int,
+ ) -> *mut c_void;
+ // in X509_CRL
+ pub fn X509_CRL_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL) -> c_int;
+ pub fn X509_CRL_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, nid: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_CRL_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
+ pub fn X509_CRL_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, crit: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_CRL_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_CRL_get_ext_d2i(
+ x: #[const_ptr_if(any(ossl110, libressl280))] X509_CRL,
+ nid: c_int,
+ crit: *mut c_int,
+ idx: *mut c_int,
+ ) -> *mut c_void;
+ // in X509_REVOKED
+ pub fn X509_REVOKED_get_ext_count(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED) -> c_int;
+ pub fn X509_REVOKED_get_ext_by_NID(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, nid: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_REVOKED_get_ext_by_OBJ(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
+ pub fn X509_REVOKED_get_ext_by_critical(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, crit: c_int, lastpos: c_int) -> c_int;
+ pub fn X509_REVOKED_get_ext(x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED, loc: c_int) -> *mut X509_EXTENSION;
+ pub fn X509_REVOKED_get_ext_d2i(
+ x: #[const_ptr_if(any(ossl110, libressl280))] X509_REVOKED,
+ nid: c_int,
+ crit: *mut c_int,
+ idx: *mut c_int,
+ ) -> *mut c_void;
+ // X509_EXTENSION stack
+ pub fn X509v3_get_ext_by_OBJ(x: *const stack_st_X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, lastpos: c_int) -> c_int;
+ // X509_EXTENSION itself
+ pub fn X509_EXTENSION_create_by_OBJ(ex: *mut *mut X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT, crit: c_int, data: *mut ASN1_OCTET_STRING) -> *mut X509_EXTENSION;
+ pub fn X509_EXTENSION_set_object(ex: *mut X509_EXTENSION, obj: #[const_ptr_if(any(ossl110, libressl280))] ASN1_OBJECT) -> c_int;
+ pub fn X509_EXTENSION_get_critical(ex: #[const_ptr_if(any(ossl110, libressl280))] X509_EXTENSION) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn X509_verify_cert(ctx: *mut X509_STORE_CTX) -> c_int;
+}
+
+const_ptr_api! {
+ extern "C" {
+ #[cfg(any(ossl110, libressl270))]
+ pub fn X509_STORE_get0_objects(ctx: #[const_ptr_if(ossl300)] X509_STORE) -> *mut stack_st_X509_OBJECT;
+ }
+}
+#[cfg(any(ossl110, libressl270))]
+extern "C" {
+ pub fn X509_OBJECT_get0_X509(x: *const X509_OBJECT) -> *mut X509;
+}
+
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ extern "C" {
+ pub fn X509_OBJECT_free(a: *mut X509_OBJECT);
+ }
+ } else {
+ extern "C" {
+ pub fn X509_OBJECT_free_contents(a: *mut X509_OBJECT);
+ }
+ }
+}
+
+extern "C" {
+ pub fn X509_get_default_cert_file_env() -> *const c_char;
+ pub fn X509_get_default_cert_file() -> *const c_char;
+ pub fn X509_get_default_cert_dir_env() -> *const c_char;
+ pub fn X509_get_default_cert_dir() -> *const c_char;
+}
+
+extern "C" {
+ pub fn X509_cmp(a: *const X509, b: *const X509) -> c_int;
+ pub fn X509_NAME_cmp(a: *const X509_NAME, b: *const X509_NAME) -> c_int;
+ pub fn X509_issuer_and_serial_cmp(a: *const X509, b: *const X509) -> c_int;
+ pub fn X509_issuer_name_cmp(a: *const X509, b: *const X509) -> c_int;
+ pub fn X509_subject_name_cmp(a: *const X509, b: *const X509) -> c_int;
+ pub fn X509_CRL_cmp(a: *const X509_CRL, b: *const X509_CRL) -> c_int;
+ pub fn X509_CRL_match(a: *const X509_CRL, b: *const X509_CRL) -> c_int;
+}
+
+extern "C" {
+ pub fn X509_print(bio: *mut BIO, x509: *mut X509) -> c_int;
+ pub fn X509_REQ_print(bio: *mut BIO, req: *mut X509_REQ) -> c_int;
+}
+
+#[repr(C)]
+pub struct X509_PURPOSE {
+ pub purpose: c_int,
+ pub trust: c_int, // Default trust ID
+ pub flags: c_int,
+ pub check_purpose:
+ Option c_int>,
+ pub name: *mut c_char,
+ pub sname: *mut c_char,
+ pub usr_data: *mut c_void,
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_PURPOSE_get_by_sname(sname: #[const_ptr_if(any(ossl110, libressl280))] c_char) -> c_int;
+ pub fn X509_PURPOSE_get0(idx: c_int) -> *mut X509_PURPOSE;
+ }
+}
diff --git a/openssl-sys/src/handwritten/x509_vfy.rs b/openssl-sys/src/handwritten/x509_vfy.rs
new file mode 100644
index 0000000..9adf63f
--- /dev/null
+++ b/openssl-sys/src/handwritten/x509_vfy.rs
@@ -0,0 +1,132 @@
+use super::super::*;
+use libc::*;
+
+#[cfg(any(libressl, all(ossl102, not(ossl110))))]
+pub enum X509_VERIFY_PARAM_ID {}
+
+extern "C" {
+ #[cfg(ossl110)]
+ pub fn X509_LOOKUP_meth_free(method: *mut X509_LOOKUP_METHOD);
+}
+
+extern "C" {
+ pub fn X509_LOOKUP_free(ctx: *mut X509_LOOKUP);
+ pub fn X509_LOOKUP_hash_dir() -> *mut X509_LOOKUP_METHOD;
+ pub fn X509_LOOKUP_file() -> *mut X509_LOOKUP_METHOD;
+ pub fn X509_LOOKUP_ctrl(
+ ctx: *mut X509_LOOKUP,
+ cmd: c_int,
+ argc: *const c_char,
+ argl: c_long,
+ ret: *mut *mut c_char,
+ ) -> c_int;
+ pub fn X509_load_cert_file(ctx: *mut X509_LOOKUP, file: *const c_char, _type: c_int) -> c_int;
+ pub fn X509_load_crl_file(ctx: *mut X509_LOOKUP, file: *const c_char, _type: c_int) -> c_int;
+}
+
+extern "C" {
+ pub fn X509_STORE_new() -> *mut X509_STORE;
+ pub fn X509_STORE_free(store: *mut X509_STORE);
+
+ pub fn X509_STORE_CTX_new() -> *mut X509_STORE_CTX;
+
+ pub fn X509_STORE_CTX_free(ctx: *mut X509_STORE_CTX);
+ pub fn X509_STORE_CTX_init(
+ ctx: *mut X509_STORE_CTX,
+ store: *mut X509_STORE,
+ x509: *mut X509,
+ chain: *mut stack_st_X509,
+ ) -> c_int;
+ pub fn X509_STORE_CTX_cleanup(ctx: *mut X509_STORE_CTX);
+
+ pub fn X509_STORE_add_cert(store: *mut X509_STORE, x: *mut X509) -> c_int;
+
+ pub fn X509_STORE_add_lookup(
+ store: *mut X509_STORE,
+ meth: *mut X509_LOOKUP_METHOD,
+ ) -> *mut X509_LOOKUP;
+
+ pub fn X509_STORE_set_default_paths(store: *mut X509_STORE) -> c_int;
+ pub fn X509_STORE_set_flags(store: *mut X509_STORE, flags: c_ulong) -> c_int;
+ pub fn X509_STORE_set_purpose(ctx: *mut X509_STORE, purpose: c_int) -> c_int;
+ pub fn X509_STORE_set_trust(ctx: *mut X509_STORE, trust: c_int) -> c_int;
+
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_STORE_set1_param(store: *mut X509_STORE, pm: #[const_ptr_if(ossl300)] X509_VERIFY_PARAM) -> c_int;
+ }
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509_STORE_CTX_get_ex_data(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX, idx: c_int) -> *mut c_void;
+ pub fn X509_STORE_CTX_get_error(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> c_int;
+ pub fn X509_STORE_CTX_get_error_depth(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> c_int;
+ pub fn X509_STORE_CTX_get_current_cert(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> *mut X509;
+ }
+}
+extern "C" {
+ pub fn X509_STORE_CTX_set_error(ctx: *mut X509_STORE_CTX, error: c_int);
+}
+cfg_if! {
+ if #[cfg(any(ossl110, libressl350))] {
+ const_ptr_api! {
+ extern "C" {
+ pub fn X509_STORE_CTX_get0_chain(ctx: #[const_ptr_if(ossl300)] X509_STORE_CTX) -> *mut stack_st_X509;
+ }
+ }
+ } else {
+ extern "C" {
+ pub fn X509_STORE_CTX_get_chain(ctx: *mut X509_STORE_CTX) -> *mut stack_st_X509;
+ }
+ }
+}
+
+extern "C" {
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_new() -> *mut X509_VERIFY_PARAM;
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_free(param: *mut X509_VERIFY_PARAM);
+
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set_flags(param: *mut X509_VERIFY_PARAM, flags: c_ulong) -> c_int;
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_clear_flags(param: *mut X509_VERIFY_PARAM, flags: c_ulong) -> c_int;
+
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set_time(param: *mut X509_VERIFY_PARAM, t: time_t);
+
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set_depth(param: *mut X509_VERIFY_PARAM, depth: c_int);
+}
+const_ptr_api! {
+ extern "C" {
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_get_flags(param: #[const_ptr_if(ossl300)] X509_VERIFY_PARAM) -> c_ulong;
+ }
+}
+
+extern "C" {
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set1_host(
+ param: *mut X509_VERIFY_PARAM,
+ name: *const c_char,
+ namelen: size_t,
+ ) -> c_int;
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set_hostflags(param: *mut X509_VERIFY_PARAM, flags: c_uint);
+ #[cfg(any(ossl102, libressl261))]
+ pub fn X509_VERIFY_PARAM_set1_ip(
+ param: *mut X509_VERIFY_PARAM,
+ ip: *const c_uchar,
+ iplen: size_t,
+ ) -> c_int;
+ #[cfg(ossl110)]
+ pub fn X509_VERIFY_PARAM_set_auth_level(param: *mut X509_VERIFY_PARAM, lvl: c_int);
+ #[cfg(ossl110)]
+ pub fn X509_VERIFY_PARAM_get_auth_level(param: *const X509_VERIFY_PARAM) -> c_int;
+ #[cfg(ossl102)]
+ pub fn X509_VERIFY_PARAM_set_purpose(param: *mut X509_VERIFY_PARAM, purpose: c_int) -> c_int;
+}
diff --git a/openssl-sys/src/handwritten/x509v3.rs b/openssl-sys/src/handwritten/x509v3.rs
new file mode 100644
index 0000000..d0923e3
--- /dev/null
+++ b/openssl-sys/src/handwritten/x509v3.rs
@@ -0,0 +1,104 @@
+use super::super::*;
+use libc::*;
+
+pub enum CONF_METHOD {}
+
+extern "C" {
+ pub fn GENERAL_NAME_free(name: *mut GENERAL_NAME);
+}
+
+#[repr(C)]
+pub struct ACCESS_DESCRIPTION {
+ pub method: *mut ASN1_OBJECT,
+ pub location: *mut GENERAL_NAME,
+}
+
+stack!(stack_st_ACCESS_DESCRIPTION);
+
+extern "C" {
+ pub fn ACCESS_DESCRIPTION_free(ad: *mut ACCESS_DESCRIPTION);
+}
+
+#[repr(C)]
+pub struct AUTHORITY_KEYID {
+ pub keyid: *mut ASN1_OCTET_STRING,
+ pub issuer: *mut stack_st_GENERAL_NAME,
+ pub serial: *mut ASN1_INTEGER,
+}
+
+extern "C" {
+ pub fn AUTHORITY_KEYID_free(akid: *mut AUTHORITY_KEYID);
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509V3_EXT_nconf_nid(
+ conf: *mut CONF,
+ ctx: *mut X509V3_CTX,
+ ext_nid: c_int,
+ value: #[const_ptr_if(any(ossl110, libressl280))] c_char,
+ ) -> *mut X509_EXTENSION;
+ pub fn X509V3_EXT_nconf(
+ conf: *mut CONF,
+ ctx: *mut X509V3_CTX,
+ name: #[const_ptr_if(any(ossl110, libressl280))] c_char,
+ value: #[const_ptr_if(any(ossl110, libressl280))] c_char,
+ ) -> *mut X509_EXTENSION;
+ }
+}
+
+extern "C" {
+ pub fn X509_check_issued(issuer: *mut X509, subject: *mut X509) -> c_int;
+ pub fn X509_verify(req: *mut X509, pkey: *mut EVP_PKEY) -> c_int;
+
+ pub fn X509V3_set_nconf(ctx: *mut X509V3_CTX, conf: *mut CONF);
+
+ pub fn X509V3_set_ctx(
+ ctx: *mut X509V3_CTX,
+ issuer: *mut X509,
+ subject: *mut X509,
+ req: *mut X509_REQ,
+ crl: *mut X509_CRL,
+ flags: c_int,
+ );
+
+ pub fn X509_get1_ocsp(x: *mut X509) -> *mut stack_st_OPENSSL_STRING;
+}
+
+const_ptr_api! {
+ extern "C" {
+ pub fn X509V3_get_d2i(
+ x: #[const_ptr_if(any(ossl110, libressl280))] stack_st_X509_EXTENSION,
+ nid: c_int,
+ crit: *mut c_int,
+ idx: *mut c_int,
+ ) -> *mut c_void;
+ pub fn X509V3_extensions_print(out: *mut BIO, title: #[const_ptr_if(any(ossl110, libressl280))] c_char, exts: #[const_ptr_if(any(ossl110, libressl280))] stack_st_X509_EXTENSION, flag: c_ulong, indent: c_int) -> c_int;
+ }
+}
+
+extern "C" {
+ pub fn X509V3_EXT_add_alias(nid_to: c_int, nid_from: c_int) -> c_int;
+ pub fn X509V3_EXT_d2i(ext: *mut X509_EXTENSION) -> *mut c_void;
+ pub fn X509V3_EXT_i2d(ext_nid: c_int, crit: c_int, ext: *mut c_void) -> *mut X509_EXTENSION;
+ pub fn X509V3_add1_i2d(
+ x: *mut *mut stack_st_X509_EXTENSION,
+ nid: c_int,
+ value: *mut c_void,
+ crit: c_int,
+ flags: c_ulong,
+ ) -> c_int;
+ pub fn X509V3_EXT_print(
+ out: *mut BIO,
+ ext: *mut X509_EXTENSION,
+ flag: c_ulong,
+ indent: c_int,
+ ) -> c_int;
+
+ #[cfg(ossl110)]
+ pub fn X509_get_extension_flags(x: *mut X509) -> u32;
+ #[cfg(ossl110)]
+ pub fn X509_get_key_usage(x: *mut X509) -> u32;
+ #[cfg(ossl110)]
+ pub fn X509_get_extended_key_usage(x: *mut X509) -> u32;
+}
diff --git a/openssl-sys/src/lib.rs b/openssl-sys/src/lib.rs
index e2f7c83..c308475 100644
--- a/openssl-sys/src/lib.rs
+++ b/openssl-sys/src/lib.rs
@@ -1,2679 +1,212 @@
-#![allow(non_camel_case_types, non_upper_case_globals, non_snake_case)]
-#![allow(dead_code, overflowing_literals)]
-#![doc(html_root_url="https://docs.rs/openssl-sys/0.9")]
+#![allow(
+ clippy::missing_safety_doc,
+ clippy::unreadable_literal,
+ clippy::uninlined_format_args,
+ clippy::upper_case_acronyms,
+ dead_code,
+ non_camel_case_types,
+ non_snake_case,
+ non_upper_case_globals,
+ overflowing_literals,
+ unused_imports
+)]
+#![doc(html_root_url = "https://docs.rs/openssl-sys/0.9")]
+#![recursion_limit = "128"] // configure fixed limit across all rust versions
extern crate libc;
-
-use libc::{c_void, c_int, c_char, c_ulong, c_long, c_uint, c_uchar, size_t, FILE};
-use std::ptr;
-use std::mem;
-
-#[cfg(any(ossl101, ossl102))]
-mod ossl10x;
-#[cfg(any(ossl101, ossl102))]
-pub use ossl10x::*;
-
-#[cfg(ossl110)]
-mod ossl110;
-#[cfg(ossl110)]
-pub use ossl110::*;
-
-#[cfg(libressl)]
-mod libressl;
-#[cfg(libressl)]
-pub use libressl::*;
-
-pub enum ASN1_INTEGER {}
-pub enum ASN1_GENERALIZEDTIME {}
-pub enum ASN1_STRING {}
-pub enum ASN1_BIT_STRING {}
-pub enum ASN1_TIME {}
-pub enum ASN1_TYPE {}
-pub enum ASN1_OBJECT {}
-pub enum BN_CTX {}
-pub enum BN_GENCB {}
-pub enum CMS_ContentInfo {}
-pub enum CONF {}
-pub enum CONF_METHOD {}
-pub enum COMP_METHOD {}
-pub enum EC_KEY {}
-pub enum EC_GROUP {}
-pub enum EC_METHOD {}
-pub enum EC_POINT {}
-pub enum ENGINE {}
-pub enum EVP_CIPHER_CTX {}
-pub enum EVP_MD {}
-pub enum EVP_PKEY_CTX {}
-pub enum OCSP_BASICRESP {}
-pub enum OCSP_CERTID {}
-pub enum OCSP_RESPONSE {}
-pub enum OCSP_REQUEST {}
-pub enum OCSP_ONEREQ {}
-pub enum SSL_CIPHER {}
-pub enum SSL_METHOD {}
-pub enum X509_CRL {}
-pub enum X509_EXTENSION {}
-pub enum X509_NAME {}
-pub enum X509_NAME_ENTRY {}
-pub enum X509_STORE {}
-pub enum X509_STORE_CTX {}
-pub enum bio_st {}
-pub enum DH_METHOD {}
-pub enum RSA_METHOD {}
-pub enum BN_MONT_CTX {}
-pub enum BN_BLINDING {}
-pub enum DSA_METHOD {}
-pub enum EVP_PKEY_ASN1_METHOD {}
-
-pub type bio_info_cb = Option<
- unsafe extern "C" fn(*mut BIO,
- c_int,
- *const c_char,
- c_int,
- c_long,
- c_long),
->;
-pub type GEN_SESSION_CB = Option<
- unsafe extern "C" fn(*const SSL, *mut c_uchar, *mut c_uint)
- -> c_int,
->;
-pub type tls_session_ticket_ext_cb_fn = Option<
- unsafe extern "C" fn(*mut SSL,
- *const c_uchar,
- c_int,
- *mut c_void)
- -> c_int,
->;
-pub type tls_session_secret_cb_fn = Option<
- unsafe extern "C" fn(*mut SSL,
- *mut c_void,
- *mut c_int,
- *mut stack_st_SSL_CIPHER,
- *mut *mut SSL_CIPHER,
- *mut c_void)
- -> c_int,
->;
-
-#[repr(C)]
-#[derive(Copy, Clone)]
-pub enum point_conversion_form_t {
- POINT_CONVERSION_COMPRESSED = 2,
- POINT_CONVERSION_UNCOMPRESSED = 4,
- POINT_CONVERSION_HYBRID = 6,
-}
-
-#[repr(C)]
-pub struct AES_KEY {
- // There is some business with AES_LONG which is there to ensure the values here are 32 bits
- rd_key: [u32; 4 * (AES_MAXNR as usize + 1)],
- rounds: c_int,
-}
-
-#[repr(C)]
-pub struct GENERAL_NAME {
- pub type_: c_int,
- pub d: *mut c_void,
-}
-
-#[repr(C)]
-pub struct X509V3_CTX {
- flags: c_int,
- issuer_cert: *mut c_void,
- subject_cert: *mut c_void,
- subject_req: *mut c_void,
- crl: *mut c_void,
- db_meth: *mut c_void,
- db: *mut c_void,
- // I like the last comment line, it is copied from OpenSSL sources:
- // Maybe more here
-}
-
-#[repr(C)]
-pub struct SHA_CTX {
- pub h0: SHA_LONG,
- pub h1: SHA_LONG,
- pub h2: SHA_LONG,
- pub h3: SHA_LONG,
- pub h4: SHA_LONG,
- pub Nl: SHA_LONG,
- pub Nh: SHA_LONG,
- pub data: [SHA_LONG; SHA_LBLOCK as usize],
- pub num: c_uint,
-}
-
-#[repr(C)]
-pub struct SHA256_CTX {
- pub h: [SHA_LONG; 8],
- pub Nl: SHA_LONG,
- pub Nh: SHA_LONG,
- pub data: [SHA_LONG; SHA_LBLOCK as usize],
- pub num: c_uint,
- pub md_len: c_uint,
-}
-
-#[repr(C)]
-pub struct SHA512_CTX {
- pub h: [SHA_LONG64; 8],
- pub Nl: SHA_LONG64,
- pub Nh: SHA_LONG64,
- // this is a union but we don't want to require 1.19
- u: [SHA_LONG64; SHA_LBLOCK as usize],
- pub num: c_uint,
- pub md_len: c_uint,
-}
-
-#[cfg(target_pointer_width = "64")]
-pub type BN_ULONG = libc::c_ulonglong;
-#[cfg(target_pointer_width = "32")]
-pub type BN_ULONG = c_uint;
-
-pub type CRYPTO_EX_new = unsafe extern "C" fn(parent: *mut c_void,
- ptr: *mut c_void,
- ad: *const CRYPTO_EX_DATA,
- idx: c_int,
- argl: c_long,
- argp: *const c_void)
- -> c_int;
-pub type CRYPTO_EX_dup = unsafe extern "C" fn(to: *mut CRYPTO_EX_DATA,
- from: *mut CRYPTO_EX_DATA,
- from_d: *mut c_void,
- idx: c_int,
- argl: c_long,
- argp: *mut c_void)
- -> c_int;
-pub type CRYPTO_EX_free = unsafe extern "C" fn(parent: *mut c_void,
- ptr: *mut c_void,
- ad: *mut CRYPTO_EX_DATA,
- idx: c_int,
- argl: c_long,
- argp: *mut c_void);
-pub type PasswordCallback = unsafe extern "C" fn(buf: *mut c_char,
- size: c_int,
- rwflag: c_int,
- user_data: *mut c_void)
- -> c_int;
-
-pub type SHA_LONG = c_uint;
-pub type SHA_LONG64 = u64;
-
-pub const AES_ENCRYPT: c_int = 1;
-pub const AES_DECRYPT: c_int = 0;
-
-pub const AES_MAXNR: c_int = 14;
-pub const AES_BLOCK_SIZE: c_int = 16;
-
-pub const BIO_TYPE_NONE: c_int = 0;
-
-pub const BIO_CTRL_EOF: c_int = 2;
-pub const BIO_CTRL_INFO: c_int = 3;
-pub const BIO_CTRL_FLUSH: c_int = 11;
-pub const BIO_C_SET_BUF_MEM_EOF_RETURN: c_int = 130;
-
-pub const BIO_FLAGS_READ: c_int = 0x01;
-pub const BIO_FLAGS_WRITE: c_int = 0x02;
-pub const BIO_FLAGS_IO_SPECIAL: c_int = 0x04;
-pub const BIO_FLAGS_RWS: c_int = BIO_FLAGS_READ | BIO_FLAGS_WRITE | BIO_FLAGS_IO_SPECIAL;
-pub const BIO_FLAGS_SHOULD_RETRY: c_int = 0x08;
-
-pub const CRYPTO_LOCK: c_int = 1;
-
-pub const ERR_TXT_MALLOCED: c_int = 0x01;
-pub const ERR_TXT_STRING: c_int = 0x02;
-
-pub const ERR_LIB_PEM: c_int = 9;
-pub const PEM_R_NO_START_LINE: c_int = 108;
-
-pub const EVP_MAX_MD_SIZE: c_uint = 64;
-pub const EVP_PKEY_RSA: c_int = NID_rsaEncryption;
-pub const EVP_PKEY_HMAC: c_int = NID_hmac;
-pub const EVP_PKEY_DSA: c_int = NID_dsa;
-pub const EVP_PKEY_DH: c_int = NID_dhKeyAgreement;
-pub const EVP_PKEY_EC: c_int = NID_X9_62_id_ecPublicKey;
-
-pub const EVP_PKEY_ALG_CTRL: c_int = 0x1000;
-
-pub const EVP_PKEY_CTRL_RSA_PADDING: c_int = EVP_PKEY_ALG_CTRL + 1;
-
-pub const EVP_PKEY_CTRL_GET_RSA_PADDING: c_int = EVP_PKEY_ALG_CTRL + 6;
-
-pub const EVP_CTRL_GCM_SET_IVLEN: c_int = 0x9;
-pub const EVP_CTRL_GCM_GET_TAG: c_int = 0x10;
-pub const EVP_CTRL_GCM_SET_TAG: c_int = 0x11;
-
-pub const MBSTRING_ASC: c_int = MBSTRING_FLAG | 1;
-pub const MBSTRING_BMP: c_int = MBSTRING_FLAG | 2;
-pub const MBSTRING_FLAG: c_int = 0x1000;
-pub const MBSTRING_UNIV: c_int = MBSTRING_FLAG | 4;
-pub const MBSTRING_UTF8: c_int = MBSTRING_FLAG;
-
-pub const NID_undef: c_int = 0;
-pub const NID_itu_t: c_int = 645;
-pub const NID_ccitt: c_int = 404;
-pub const NID_iso: c_int = 181;
-pub const NID_joint_iso_itu_t: c_int = 646;
-pub const NID_joint_iso_ccitt: c_int = 393;
-pub const NID_member_body: c_int = 182;
-pub const NID_identified_organization: c_int = 676;
-pub const NID_hmac_md5: c_int = 780;
-pub const NID_hmac_sha1: c_int = 781;
-pub const NID_certicom_arc: c_int = 677;
-pub const NID_international_organizations: c_int = 647;
-pub const NID_wap: c_int = 678;
-pub const NID_wap_wsg: c_int = 679;
-pub const NID_selected_attribute_types: c_int = 394;
-pub const NID_clearance: c_int = 395;
-pub const NID_ISO_US: c_int = 183;
-pub const NID_X9_57: c_int = 184;
-pub const NID_X9cm: c_int = 185;
-pub const NID_dsa: c_int = 116;
-pub const NID_dsaWithSHA1: c_int = 113;
-pub const NID_ansi_X9_62: c_int = 405;
-pub const NID_X9_62_prime_field: c_int = 406;
-pub const NID_X9_62_characteristic_two_field: c_int = 407;
-pub const NID_X9_62_id_characteristic_two_basis: c_int = 680;
-pub const NID_X9_62_onBasis: c_int = 681;
-pub const NID_X9_62_tpBasis: c_int = 682;
-pub const NID_X9_62_ppBasis: c_int = 683;
-pub const NID_X9_62_id_ecPublicKey: c_int = 408;
-pub const NID_X9_62_c2pnb163v1: c_int = 684;
-pub const NID_X9_62_c2pnb163v2: c_int = 685;
-pub const NID_X9_62_c2pnb163v3: c_int = 686;
-pub const NID_X9_62_c2pnb176v1: c_int = 687;
-pub const NID_X9_62_c2tnb191v1: c_int = 688;
-pub const NID_X9_62_c2tnb191v2: c_int = 689;
-pub const NID_X9_62_c2tnb191v3: c_int = 690;
-pub const NID_X9_62_c2onb191v4: c_int = 691;
-pub const NID_X9_62_c2onb191v5: c_int = 692;
-pub const NID_X9_62_c2pnb208w1: c_int = 693;
-pub const NID_X9_62_c2tnb239v1: c_int = 694;
-pub const NID_X9_62_c2tnb239v2: c_int = 695;
-pub const NID_X9_62_c2tnb239v3: c_int = 696;
-pub const NID_X9_62_c2onb239v4: c_int = 697;
-pub const NID_X9_62_c2onb239v5: c_int = 698;
-pub const NID_X9_62_c2pnb272w1: c_int = 699;
-pub const NID_X9_62_c2pnb304w1: c_int = 700;
-pub const NID_X9_62_c2tnb359v1: c_int = 701;
-pub const NID_X9_62_c2pnb368w1: c_int = 702;
-pub const NID_X9_62_c2tnb431r1: c_int = 703;
-pub const NID_X9_62_prime192v1: c_int = 409;
-pub const NID_X9_62_prime192v2: c_int = 410;
-pub const NID_X9_62_prime192v3: c_int = 411;
-pub const NID_X9_62_prime239v1: c_int = 412;
-pub const NID_X9_62_prime239v2: c_int = 413;
-pub const NID_X9_62_prime239v3: c_int = 414;
-pub const NID_X9_62_prime256v1: c_int = 415;
-pub const NID_ecdsa_with_SHA1: c_int = 416;
-pub const NID_ecdsa_with_Recommended: c_int = 791;
-pub const NID_ecdsa_with_Specified: c_int = 792;
-pub const NID_ecdsa_with_SHA224: c_int = 793;
-pub const NID_ecdsa_with_SHA256: c_int = 794;
-pub const NID_ecdsa_with_SHA384: c_int = 795;
-pub const NID_ecdsa_with_SHA512: c_int = 796;
-pub const NID_secp112r1: c_int = 704;
-pub const NID_secp112r2: c_int = 705;
-pub const NID_secp128r1: c_int = 706;
-pub const NID_secp128r2: c_int = 707;
-pub const NID_secp160k1: c_int = 708;
-pub const NID_secp160r1: c_int = 709;
-pub const NID_secp160r2: c_int = 710;
-pub const NID_secp192k1: c_int = 711;
-pub const NID_secp224k1: c_int = 712;
-pub const NID_secp224r1: c_int = 713;
-pub const NID_secp256k1: c_int = 714;
-pub const NID_secp384r1: c_int = 715;
-pub const NID_secp521r1: c_int = 716;
-pub const NID_sect113r1: c_int = 717;
-pub const NID_sect113r2: c_int = 718;
-pub const NID_sect131r1: c_int = 719;
-pub const NID_sect131r2: c_int = 720;
-pub const NID_sect163k1: c_int = 721;
-pub const NID_sect163r1: c_int = 722;
-pub const NID_sect163r2: c_int = 723;
-pub const NID_sect193r1: c_int = 724;
-pub const NID_sect193r2: c_int = 725;
-pub const NID_sect233k1: c_int = 726;
-pub const NID_sect233r1: c_int = 727;
-pub const NID_sect239k1: c_int = 728;
-pub const NID_sect283k1: c_int = 729;
-pub const NID_sect283r1: c_int = 730;
-pub const NID_sect409k1: c_int = 731;
-pub const NID_sect409r1: c_int = 732;
-pub const NID_sect571k1: c_int = 733;
-pub const NID_sect571r1: c_int = 734;
-pub const NID_wap_wsg_idm_ecid_wtls1: c_int = 735;
-pub const NID_wap_wsg_idm_ecid_wtls3: c_int = 736;
-pub const NID_wap_wsg_idm_ecid_wtls4: c_int = 737;
-pub const NID_wap_wsg_idm_ecid_wtls5: c_int = 738;
-pub const NID_wap_wsg_idm_ecid_wtls6: c_int = 739;
-pub const NID_wap_wsg_idm_ecid_wtls7: c_int = 740;
-pub const NID_wap_wsg_idm_ecid_wtls8: c_int = 741;
-pub const NID_wap_wsg_idm_ecid_wtls9: c_int = 742;
-pub const NID_wap_wsg_idm_ecid_wtls10: c_int = 743;
-pub const NID_wap_wsg_idm_ecid_wtls11: c_int = 744;
-pub const NID_wap_wsg_idm_ecid_wtls12: c_int = 745;
-pub const NID_cast5_cbc: c_int = 108;
-pub const NID_cast5_ecb: c_int = 109;
-pub const NID_cast5_cfb64: c_int = 110;
-pub const NID_cast5_ofb64: c_int = 111;
-pub const NID_pbeWithMD5AndCast5_CBC: c_int = 112;
-pub const NID_id_PasswordBasedMAC: c_int = 782;
-pub const NID_id_DHBasedMac: c_int = 783;
-pub const NID_rsadsi: c_int = 1;
-pub const NID_pkcs: c_int = 2;
-pub const NID_pkcs1: c_int = 186;
-pub const NID_rsaEncryption: c_int = 6;
-pub const NID_md2WithRSAEncryption: c_int = 7;
-pub const NID_md4WithRSAEncryption: c_int = 396;
-pub const NID_md5WithRSAEncryption: c_int = 8;
-pub const NID_sha1WithRSAEncryption: c_int = 65;
-pub const NID_rsaesOaep: c_int = 919;
-pub const NID_mgf1: c_int = 911;
-pub const NID_rsassaPss: c_int = 912;
-pub const NID_sha256WithRSAEncryption: c_int = 668;
-pub const NID_sha384WithRSAEncryption: c_int = 669;
-pub const NID_sha512WithRSAEncryption: c_int = 670;
-pub const NID_sha224WithRSAEncryption: c_int = 671;
-pub const NID_pkcs3: c_int = 27;
-pub const NID_dhKeyAgreement: c_int = 28;
-pub const NID_pkcs5: c_int = 187;
-pub const NID_pbeWithMD2AndDES_CBC: c_int = 9;
-pub const NID_pbeWithMD5AndDES_CBC: c_int = 10;
-pub const NID_pbeWithMD2AndRC2_CBC: c_int = 168;
-pub const NID_pbeWithMD5AndRC2_CBC: c_int = 169;
-pub const NID_pbeWithSHA1AndDES_CBC: c_int = 170;
-pub const NID_pbeWithSHA1AndRC2_CBC: c_int = 68;
-pub const NID_id_pbkdf2: c_int = 69;
-pub const NID_pbes2: c_int = 161;
-pub const NID_pbmac1: c_int = 162;
-pub const NID_pkcs7: c_int = 20;
-pub const NID_pkcs7_data: c_int = 21;
-pub const NID_pkcs7_signed: c_int = 22;
-pub const NID_pkcs7_enveloped: c_int = 23;
-pub const NID_pkcs7_signedAndEnveloped: c_int = 24;
-pub const NID_pkcs7_digest: c_int = 25;
-pub const NID_pkcs7_encrypted: c_int = 26;
-pub const NID_pkcs9: c_int = 47;
-pub const NID_pkcs9_emailAddress: c_int = 48;
-pub const NID_pkcs9_unstructuredName: c_int = 49;
-pub const NID_pkcs9_contentType: c_int = 50;
-pub const NID_pkcs9_messageDigest: c_int = 51;
-pub const NID_pkcs9_signingTime: c_int = 52;
-pub const NID_pkcs9_countersignature: c_int = 53;
-pub const NID_pkcs9_challengePassword: c_int = 54;
-pub const NID_pkcs9_unstructuredAddress: c_int = 55;
-pub const NID_pkcs9_extCertAttributes: c_int = 56;
-pub const NID_ext_req: c_int = 172;
-pub const NID_SMIMECapabilities: c_int = 167;
-pub const NID_SMIME: c_int = 188;
-pub const NID_id_smime_mod: c_int = 189;
-pub const NID_id_smime_ct: c_int = 190;
-pub const NID_id_smime_aa: c_int = 191;
-pub const NID_id_smime_alg: c_int = 192;
-pub const NID_id_smime_cd: c_int = 193;
-pub const NID_id_smime_spq: c_int = 194;
-pub const NID_id_smime_cti: c_int = 195;
-pub const NID_id_smime_mod_cms: c_int = 196;
-pub const NID_id_smime_mod_ess: c_int = 197;
-pub const NID_id_smime_mod_oid: c_int = 198;
-pub const NID_id_smime_mod_msg_v3: c_int = 199;
-pub const NID_id_smime_mod_ets_eSignature_88: c_int = 200;
-pub const NID_id_smime_mod_ets_eSignature_97: c_int = 201;
-pub const NID_id_smime_mod_ets_eSigPolicy_88: c_int = 202;
-pub const NID_id_smime_mod_ets_eSigPolicy_97: c_int = 203;
-pub const NID_id_smime_ct_receipt: c_int = 204;
-pub const NID_id_smime_ct_authData: c_int = 205;
-pub const NID_id_smime_ct_publishCert: c_int = 206;
-pub const NID_id_smime_ct_TSTInfo: c_int = 207;
-pub const NID_id_smime_ct_TDTInfo: c_int = 208;
-pub const NID_id_smime_ct_contentInfo: c_int = 209;
-pub const NID_id_smime_ct_DVCSRequestData: c_int = 210;
-pub const NID_id_smime_ct_DVCSResponseData: c_int = 211;
-pub const NID_id_smime_ct_compressedData: c_int = 786;
-pub const NID_id_ct_asciiTextWithCRLF: c_int = 787;
-pub const NID_id_smime_aa_receiptRequest: c_int = 212;
-pub const NID_id_smime_aa_securityLabel: c_int = 213;
-pub const NID_id_smime_aa_mlExpandHistory: c_int = 214;
-pub const NID_id_smime_aa_contentHint: c_int = 215;
-pub const NID_id_smime_aa_msgSigDigest: c_int = 216;
-pub const NID_id_smime_aa_encapContentType: c_int = 217;
-pub const NID_id_smime_aa_contentIdentifier: c_int = 218;
-pub const NID_id_smime_aa_macValue: c_int = 219;
-pub const NID_id_smime_aa_equivalentLabels: c_int = 220;
-pub const NID_id_smime_aa_contentReference: c_int = 221;
-pub const NID_id_smime_aa_encrypKeyPref: c_int = 222;
-pub const NID_id_smime_aa_signingCertificate: c_int = 223;
-pub const NID_id_smime_aa_smimeEncryptCerts: c_int = 224;
-pub const NID_id_smime_aa_timeStampToken: c_int = 225;
-pub const NID_id_smime_aa_ets_sigPolicyId: c_int = 226;
-pub const NID_id_smime_aa_ets_commitmentType: c_int = 227;
-pub const NID_id_smime_aa_ets_signerLocation: c_int = 228;
-pub const NID_id_smime_aa_ets_signerAttr: c_int = 229;
-pub const NID_id_smime_aa_ets_otherSigCert: c_int = 230;
-pub const NID_id_smime_aa_ets_contentTimestamp: c_int = 231;
-pub const NID_id_smime_aa_ets_CertificateRefs: c_int = 232;
-pub const NID_id_smime_aa_ets_RevocationRefs: c_int = 233;
-pub const NID_id_smime_aa_ets_certValues: c_int = 234;
-pub const NID_id_smime_aa_ets_revocationValues: c_int = 235;
-pub const NID_id_smime_aa_ets_escTimeStamp: c_int = 236;
-pub const NID_id_smime_aa_ets_certCRLTimestamp: c_int = 237;
-pub const NID_id_smime_aa_ets_archiveTimeStamp: c_int = 238;
-pub const NID_id_smime_aa_signatureType: c_int = 239;
-pub const NID_id_smime_aa_dvcs_dvc: c_int = 240;
-pub const NID_id_smime_alg_ESDHwith3DES: c_int = 241;
-pub const NID_id_smime_alg_ESDHwithRC2: c_int = 242;
-pub const NID_id_smime_alg_3DESwrap: c_int = 243;
-pub const NID_id_smime_alg_RC2wrap: c_int = 244;
-pub const NID_id_smime_alg_ESDH: c_int = 245;
-pub const NID_id_smime_alg_CMS3DESwrap: c_int = 246;
-pub const NID_id_smime_alg_CMSRC2wrap: c_int = 247;
-pub const NID_id_alg_PWRI_KEK: c_int = 893;
-pub const NID_id_smime_cd_ldap: c_int = 248;
-pub const NID_id_smime_spq_ets_sqt_uri: c_int = 249;
-pub const NID_id_smime_spq_ets_sqt_unotice: c_int = 250;
-pub const NID_id_smime_cti_ets_proofOfOrigin: c_int = 251;
-pub const NID_id_smime_cti_ets_proofOfReceipt: c_int = 252;
-pub const NID_id_smime_cti_ets_proofOfDelivery: c_int = 253;
-pub const NID_id_smime_cti_ets_proofOfSender: c_int = 254;
-pub const NID_id_smime_cti_ets_proofOfApproval: c_int = 255;
-pub const NID_id_smime_cti_ets_proofOfCreation: c_int = 256;
-pub const NID_friendlyName: c_int = 156;
-pub const NID_localKeyID: c_int = 157;
-pub const NID_ms_csp_name: c_int = 417;
-pub const NID_LocalKeySet: c_int = 856;
-pub const NID_x509Certificate: c_int = 158;
-pub const NID_sdsiCertificate: c_int = 159;
-pub const NID_x509Crl: c_int = 160;
-pub const NID_pbe_WithSHA1And128BitRC4: c_int = 144;
-pub const NID_pbe_WithSHA1And40BitRC4: c_int = 145;
-pub const NID_pbe_WithSHA1And3_Key_TripleDES_CBC: c_int = 146;
-pub const NID_pbe_WithSHA1And2_Key_TripleDES_CBC: c_int = 147;
-pub const NID_pbe_WithSHA1And128BitRC2_CBC: c_int = 148;
-pub const NID_pbe_WithSHA1And40BitRC2_CBC: c_int = 149;
-pub const NID_keyBag: c_int = 150;
-pub const NID_pkcs8ShroudedKeyBag: c_int = 151;
-pub const NID_certBag: c_int = 152;
-pub const NID_crlBag: c_int = 153;
-pub const NID_secretBag: c_int = 154;
-pub const NID_safeContentsBag: c_int = 155;
-pub const NID_md2: c_int = 3;
-pub const NID_md4: c_int = 257;
-pub const NID_md5: c_int = 4;
-pub const NID_md5_sha1: c_int = 114;
-pub const NID_hmacWithMD5: c_int = 797;
-pub const NID_hmacWithSHA1: c_int = 163;
-pub const NID_hmacWithSHA224: c_int = 798;
-pub const NID_hmacWithSHA256: c_int = 799;
-pub const NID_hmacWithSHA384: c_int = 800;
-pub const NID_hmacWithSHA512: c_int = 801;
-pub const NID_rc2_cbc: c_int = 37;
-pub const NID_rc2_ecb: c_int = 38;
-pub const NID_rc2_cfb64: c_int = 39;
-pub const NID_rc2_ofb64: c_int = 40;
-pub const NID_rc2_40_cbc: c_int = 98;
-pub const NID_rc2_64_cbc: c_int = 166;
-pub const NID_rc4: c_int = 5;
-pub const NID_rc4_40: c_int = 97;
-pub const NID_des_ede3_cbc: c_int = 44;
-pub const NID_rc5_cbc: c_int = 120;
-pub const NID_rc5_ecb: c_int = 121;
-pub const NID_rc5_cfb64: c_int = 122;
-pub const NID_rc5_ofb64: c_int = 123;
-pub const NID_ms_ext_req: c_int = 171;
-pub const NID_ms_code_ind: c_int = 134;
-pub const NID_ms_code_com: c_int = 135;
-pub const NID_ms_ctl_sign: c_int = 136;
-pub const NID_ms_sgc: c_int = 137;
-pub const NID_ms_efs: c_int = 138;
-pub const NID_ms_smartcard_login: c_int = 648;
-pub const NID_ms_upn: c_int = 649;
-pub const NID_idea_cbc: c_int = 34;
-pub const NID_idea_ecb: c_int = 36;
-pub const NID_idea_cfb64: c_int = 35;
-pub const NID_idea_ofb64: c_int = 46;
-pub const NID_bf_cbc: c_int = 91;
-pub const NID_bf_ecb: c_int = 92;
-pub const NID_bf_cfb64: c_int = 93;
-pub const NID_bf_ofb64: c_int = 94;
-pub const NID_id_pkix: c_int = 127;
-pub const NID_id_pkix_mod: c_int = 258;
-pub const NID_id_pe: c_int = 175;
-pub const NID_id_qt: c_int = 259;
-pub const NID_id_kp: c_int = 128;
-pub const NID_id_it: c_int = 260;
-pub const NID_id_pkip: c_int = 261;
-pub const NID_id_alg: c_int = 262;
-pub const NID_id_cmc: c_int = 263;
-pub const NID_id_on: c_int = 264;
-pub const NID_id_pda: c_int = 265;
-pub const NID_id_aca: c_int = 266;
-pub const NID_id_qcs: c_int = 267;
-pub const NID_id_cct: c_int = 268;
-pub const NID_id_ppl: c_int = 662;
-pub const NID_id_ad: c_int = 176;
-pub const NID_id_pkix1_explicit_88: c_int = 269;
-pub const NID_id_pkix1_implicit_88: c_int = 270;
-pub const NID_id_pkix1_explicit_93: c_int = 271;
-pub const NID_id_pkix1_implicit_93: c_int = 272;
-pub const NID_id_mod_crmf: c_int = 273;
-pub const NID_id_mod_cmc: c_int = 274;
-pub const NID_id_mod_kea_profile_88: c_int = 275;
-pub const NID_id_mod_kea_profile_93: c_int = 276;
-pub const NID_id_mod_cmp: c_int = 277;
-pub const NID_id_mod_qualified_cert_88: c_int = 278;
-pub const NID_id_mod_qualified_cert_93: c_int = 279;
-pub const NID_id_mod_attribute_cert: c_int = 280;
-pub const NID_id_mod_timestamp_protocol: c_int = 281;
-pub const NID_id_mod_ocsp: c_int = 282;
-pub const NID_id_mod_dvcs: c_int = 283;
-pub const NID_id_mod_cmp2000: c_int = 284;
-pub const NID_info_access: c_int = 177;
-pub const NID_biometricInfo: c_int = 285;
-pub const NID_qcStatements: c_int = 286;
-pub const NID_ac_auditEntity: c_int = 287;
-pub const NID_ac_targeting: c_int = 288;
-pub const NID_aaControls: c_int = 289;
-pub const NID_sbgp_ipAddrBlock: c_int = 290;
-pub const NID_sbgp_autonomousSysNum: c_int = 291;
-pub const NID_sbgp_routerIdentifier: c_int = 292;
-pub const NID_ac_proxying: c_int = 397;
-pub const NID_sinfo_access: c_int = 398;
-pub const NID_proxyCertInfo: c_int = 663;
-pub const NID_id_qt_cps: c_int = 164;
-pub const NID_id_qt_unotice: c_int = 165;
-pub const NID_textNotice: c_int = 293;
-pub const NID_server_auth: c_int = 129;
-pub const NID_client_auth: c_int = 130;
-pub const NID_code_sign: c_int = 131;
-pub const NID_email_protect: c_int = 132;
-pub const NID_ipsecEndSystem: c_int = 294;
-pub const NID_ipsecTunnel: c_int = 295;
-pub const NID_ipsecUser: c_int = 296;
-pub const NID_time_stamp: c_int = 133;
-pub const NID_OCSP_sign: c_int = 180;
-pub const NID_dvcs: c_int = 297;
-pub const NID_id_it_caProtEncCert: c_int = 298;
-pub const NID_id_it_signKeyPairTypes: c_int = 299;
-pub const NID_id_it_encKeyPairTypes: c_int = 300;
-pub const NID_id_it_preferredSymmAlg: c_int = 301;
-pub const NID_id_it_caKeyUpdateInfo: c_int = 302;
-pub const NID_id_it_currentCRL: c_int = 303;
-pub const NID_id_it_unsupportedOIDs: c_int = 304;
-pub const NID_id_it_subscriptionRequest: c_int = 305;
-pub const NID_id_it_subscriptionResponse: c_int = 306;
-pub const NID_id_it_keyPairParamReq: c_int = 307;
-pub const NID_id_it_keyPairParamRep: c_int = 308;
-pub const NID_id_it_revPassphrase: c_int = 309;
-pub const NID_id_it_implicitConfirm: c_int = 310;
-pub const NID_id_it_confirmWaitTime: c_int = 311;
-pub const NID_id_it_origPKIMessage: c_int = 312;
-pub const NID_id_it_suppLangTags: c_int = 784;
-pub const NID_id_regCtrl: c_int = 313;
-pub const NID_id_regInfo: c_int = 314;
-pub const NID_id_regCtrl_regToken: c_int = 315;
-pub const NID_id_regCtrl_authenticator: c_int = 316;
-pub const NID_id_regCtrl_pkiPublicationInfo: c_int = 317;
-pub const NID_id_regCtrl_pkiArchiveOptions: c_int = 318;
-pub const NID_id_regCtrl_oldCertID: c_int = 319;
-pub const NID_id_regCtrl_protocolEncrKey: c_int = 320;
-pub const NID_id_regInfo_utf8Pairs: c_int = 321;
-pub const NID_id_regInfo_certReq: c_int = 322;
-pub const NID_id_alg_des40: c_int = 323;
-pub const NID_id_alg_noSignature: c_int = 324;
-pub const NID_id_alg_dh_sig_hmac_sha1: c_int = 325;
-pub const NID_id_alg_dh_pop: c_int = 326;
-pub const NID_id_cmc_statusInfo: c_int = 327;
-pub const NID_id_cmc_identification: c_int = 328;
-pub const NID_id_cmc_identityProof: c_int = 329;
-pub const NID_id_cmc_dataReturn: c_int = 330;
-pub const NID_id_cmc_transactionId: c_int = 331;
-pub const NID_id_cmc_senderNonce: c_int = 332;
-pub const NID_id_cmc_recipientNonce: c_int = 333;
-pub const NID_id_cmc_addExtensions: c_int = 334;
-pub const NID_id_cmc_encryptedPOP: c_int = 335;
-pub const NID_id_cmc_decryptedPOP: c_int = 336;
-pub const NID_id_cmc_lraPOPWitness: c_int = 337;
-pub const NID_id_cmc_getCert: c_int = 338;
-pub const NID_id_cmc_getCRL: c_int = 339;
-pub const NID_id_cmc_revokeRequest: c_int = 340;
-pub const NID_id_cmc_regInfo: c_int = 341;
-pub const NID_id_cmc_responseInfo: c_int = 342;
-pub const NID_id_cmc_queryPending: c_int = 343;
-pub const NID_id_cmc_popLinkRandom: c_int = 344;
-pub const NID_id_cmc_popLinkWitness: c_int = 345;
-pub const NID_id_cmc_confirmCertAcceptance: c_int = 346;
-pub const NID_id_on_personalData: c_int = 347;
-pub const NID_id_on_permanentIdentifier: c_int = 858;
-pub const NID_id_pda_dateOfBirth: c_int = 348;
-pub const NID_id_pda_placeOfBirth: c_int = 349;
-pub const NID_id_pda_gender: c_int = 351;
-pub const NID_id_pda_countryOfCitizenship: c_int = 352;
-pub const NID_id_pda_countryOfResidence: c_int = 353;
-pub const NID_id_aca_authenticationInfo: c_int = 354;
-pub const NID_id_aca_accessIdentity: c_int = 355;
-pub const NID_id_aca_chargingIdentity: c_int = 356;
-pub const NID_id_aca_group: c_int = 357;
-pub const NID_id_aca_role: c_int = 358;
-pub const NID_id_aca_encAttrs: c_int = 399;
-pub const NID_id_qcs_pkixQCSyntax_v1: c_int = 359;
-pub const NID_id_cct_crs: c_int = 360;
-pub const NID_id_cct_PKIData: c_int = 361;
-pub const NID_id_cct_PKIResponse: c_int = 362;
-pub const NID_id_ppl_anyLanguage: c_int = 664;
-pub const NID_id_ppl_inheritAll: c_int = 665;
-pub const NID_Independent: c_int = 667;
-pub const NID_ad_OCSP: c_int = 178;
-pub const NID_ad_ca_issuers: c_int = 179;
-pub const NID_ad_timeStamping: c_int = 363;
-pub const NID_ad_dvcs: c_int = 364;
-pub const NID_caRepository: c_int = 785;
-pub const NID_id_pkix_OCSP_basic: c_int = 365;
-pub const NID_id_pkix_OCSP_Nonce: c_int = 366;
-pub const NID_id_pkix_OCSP_CrlID: c_int = 367;
-pub const NID_id_pkix_OCSP_acceptableResponses: c_int = 368;
-pub const NID_id_pkix_OCSP_noCheck: c_int = 369;
-pub const NID_id_pkix_OCSP_archiveCutoff: c_int = 370;
-pub const NID_id_pkix_OCSP_serviceLocator: c_int = 371;
-pub const NID_id_pkix_OCSP_extendedStatus: c_int = 372;
-pub const NID_id_pkix_OCSP_valid: c_int = 373;
-pub const NID_id_pkix_OCSP_path: c_int = 374;
-pub const NID_id_pkix_OCSP_trustRoot: c_int = 375;
-pub const NID_algorithm: c_int = 376;
-pub const NID_md5WithRSA: c_int = 104;
-pub const NID_des_ecb: c_int = 29;
-pub const NID_des_cbc: c_int = 31;
-pub const NID_des_ofb64: c_int = 45;
-pub const NID_des_cfb64: c_int = 30;
-pub const NID_rsaSignature: c_int = 377;
-pub const NID_dsa_2: c_int = 67;
-pub const NID_dsaWithSHA: c_int = 66;
-pub const NID_shaWithRSAEncryption: c_int = 42;
-pub const NID_des_ede_ecb: c_int = 32;
-pub const NID_des_ede3_ecb: c_int = 33;
-pub const NID_des_ede_cbc: c_int = 43;
-pub const NID_des_ede_cfb64: c_int = 60;
-pub const NID_des_ede3_cfb64: c_int = 61;
-pub const NID_des_ede_ofb64: c_int = 62;
-pub const NID_des_ede3_ofb64: c_int = 63;
-pub const NID_desx_cbc: c_int = 80;
-pub const NID_sha: c_int = 41;
-pub const NID_sha1: c_int = 64;
-pub const NID_dsaWithSHA1_2: c_int = 70;
-pub const NID_sha1WithRSA: c_int = 115;
-pub const NID_ripemd160: c_int = 117;
-pub const NID_ripemd160WithRSA: c_int = 119;
-pub const NID_sxnet: c_int = 143;
-pub const NID_X500: c_int = 11;
-pub const NID_X509: c_int = 12;
-pub const NID_commonName: c_int = 13;
-pub const NID_surname: c_int = 100;
-pub const NID_serialNumber: c_int = 105;
-pub const NID_countryName: c_int = 14;
-pub const NID_localityName: c_int = 15;
-pub const NID_stateOrProvinceName: c_int = 16;
-pub const NID_streetAddress: c_int = 660;
-pub const NID_organizationName: c_int = 17;
-pub const NID_organizationalUnitName: c_int = 18;
-pub const NID_title: c_int = 106;
-pub const NID_description: c_int = 107;
-pub const NID_searchGuide: c_int = 859;
-pub const NID_businessCategory: c_int = 860;
-pub const NID_postalAddress: c_int = 861;
-pub const NID_postalCode: c_int = 661;
-pub const NID_postOfficeBox: c_int = 862;
-pub const NID_physicalDeliveryOfficeName: c_int = 863;
-pub const NID_telephoneNumber: c_int = 864;
-pub const NID_telexNumber: c_int = 865;
-pub const NID_teletexTerminalIdentifier: c_int = 866;
-pub const NID_facsimileTelephoneNumber: c_int = 867;
-pub const NID_x121Address: c_int = 868;
-pub const NID_internationaliSDNNumber: c_int = 869;
-pub const NID_registeredAddress: c_int = 870;
-pub const NID_destinationIndicator: c_int = 871;
-pub const NID_preferredDeliveryMethod: c_int = 872;
-pub const NID_presentationAddress: c_int = 873;
-pub const NID_supportedApplicationContext: c_int = 874;
-pub const NID_member: c_int = 875;
-pub const NID_owner: c_int = 876;
-pub const NID_roleOccupant: c_int = 877;
-pub const NID_seeAlso: c_int = 878;
-pub const NID_userPassword: c_int = 879;
-pub const NID_userCertificate: c_int = 880;
-pub const NID_cACertificate: c_int = 881;
-pub const NID_authorityRevocationList: c_int = 882;
-pub const NID_certificateRevocationList: c_int = 883;
-pub const NID_crossCertificatePair: c_int = 884;
-pub const NID_name: c_int = 173;
-pub const NID_givenName: c_int = 99;
-pub const NID_initials: c_int = 101;
-pub const NID_generationQualifier: c_int = 509;
-pub const NID_x500UniqueIdentifier: c_int = 503;
-pub const NID_dnQualifier: c_int = 174;
-pub const NID_enhancedSearchGuide: c_int = 885;
-pub const NID_protocolInformation: c_int = 886;
-pub const NID_distinguishedName: c_int = 887;
-pub const NID_uniqueMember: c_int = 888;
-pub const NID_houseIdentifier: c_int = 889;
-pub const NID_supportedAlgorithms: c_int = 890;
-pub const NID_deltaRevocationList: c_int = 891;
-pub const NID_dmdName: c_int = 892;
-pub const NID_pseudonym: c_int = 510;
-pub const NID_role: c_int = 400;
-pub const NID_X500algorithms: c_int = 378;
-pub const NID_rsa: c_int = 19;
-pub const NID_mdc2WithRSA: c_int = 96;
-pub const NID_mdc2: c_int = 95;
-pub const NID_id_ce: c_int = 81;
-pub const NID_subject_directory_attributes: c_int = 769;
-pub const NID_subject_key_identifier: c_int = 82;
-pub const NID_key_usage: c_int = 83;
-pub const NID_private_key_usage_period: c_int = 84;
-pub const NID_subject_alt_name: c_int = 85;
-pub const NID_issuer_alt_name: c_int = 86;
-pub const NID_basic_constraints: c_int = 87;
-pub const NID_crl_number: c_int = 88;
-pub const NID_crl_reason: c_int = 141;
-pub const NID_invalidity_date: c_int = 142;
-pub const NID_delta_crl: c_int = 140;
-pub const NID_issuing_distribution_point: c_int = 770;
-pub const NID_certificate_issuer: c_int = 771;
-pub const NID_name_constraints: c_int = 666;
-pub const NID_crl_distribution_points: c_int = 103;
-pub const NID_certificate_policies: c_int = 89;
-pub const NID_any_policy: c_int = 746;
-pub const NID_policy_mappings: c_int = 747;
-pub const NID_authority_key_identifier: c_int = 90;
-pub const NID_policy_constraints: c_int = 401;
-pub const NID_ext_key_usage: c_int = 126;
-pub const NID_freshest_crl: c_int = 857;
-pub const NID_inhibit_any_policy: c_int = 748;
-pub const NID_target_information: c_int = 402;
-pub const NID_no_rev_avail: c_int = 403;
-pub const NID_anyExtendedKeyUsage: c_int = 910;
-pub const NID_netscape: c_int = 57;
-pub const NID_netscape_cert_extension: c_int = 58;
-pub const NID_netscape_data_type: c_int = 59;
-pub const NID_netscape_cert_type: c_int = 71;
-pub const NID_netscape_base_url: c_int = 72;
-pub const NID_netscape_revocation_url: c_int = 73;
-pub const NID_netscape_ca_revocation_url: c_int = 74;
-pub const NID_netscape_renewal_url: c_int = 75;
-pub const NID_netscape_ca_policy_url: c_int = 76;
-pub const NID_netscape_ssl_server_name: c_int = 77;
-pub const NID_netscape_comment: c_int = 78;
-pub const NID_netscape_cert_sequence: c_int = 79;
-pub const NID_ns_sgc: c_int = 139;
-pub const NID_org: c_int = 379;
-pub const NID_dod: c_int = 380;
-pub const NID_iana: c_int = 381;
-pub const NID_Directory: c_int = 382;
-pub const NID_Management: c_int = 383;
-pub const NID_Experimental: c_int = 384;
-pub const NID_Private: c_int = 385;
-pub const NID_Security: c_int = 386;
-pub const NID_SNMPv2: c_int = 387;
-pub const NID_Mail: c_int = 388;
-pub const NID_Enterprises: c_int = 389;
-pub const NID_dcObject: c_int = 390;
-pub const NID_mime_mhs: c_int = 504;
-pub const NID_mime_mhs_headings: c_int = 505;
-pub const NID_mime_mhs_bodies: c_int = 506;
-pub const NID_id_hex_partial_message: c_int = 507;
-pub const NID_id_hex_multipart_message: c_int = 508;
-pub const NID_zlib_compression: c_int = 125;
-pub const NID_aes_128_ecb: c_int = 418;
-pub const NID_aes_128_cbc: c_int = 419;
-pub const NID_aes_128_ofb128: c_int = 420;
-pub const NID_aes_128_cfb128: c_int = 421;
-pub const NID_id_aes128_wrap: c_int = 788;
-pub const NID_aes_128_gcm: c_int = 895;
-pub const NID_aes_128_ccm: c_int = 896;
-pub const NID_id_aes128_wrap_pad: c_int = 897;
-pub const NID_aes_192_ecb: c_int = 422;
-pub const NID_aes_192_cbc: c_int = 423;
-pub const NID_aes_192_ofb128: c_int = 424;
-pub const NID_aes_192_cfb128: c_int = 425;
-pub const NID_id_aes192_wrap: c_int = 789;
-pub const NID_aes_192_gcm: c_int = 898;
-pub const NID_aes_192_ccm: c_int = 899;
-pub const NID_id_aes192_wrap_pad: c_int = 900;
-pub const NID_aes_256_ecb: c_int = 426;
-pub const NID_aes_256_cbc: c_int = 427;
-pub const NID_aes_256_ofb128: c_int = 428;
-pub const NID_aes_256_cfb128: c_int = 429;
-pub const NID_id_aes256_wrap: c_int = 790;
-pub const NID_aes_256_gcm: c_int = 901;
-pub const NID_aes_256_ccm: c_int = 902;
-pub const NID_id_aes256_wrap_pad: c_int = 903;
-pub const NID_aes_128_cfb1: c_int = 650;
-pub const NID_aes_192_cfb1: c_int = 651;
-pub const NID_aes_256_cfb1: c_int = 652;
-pub const NID_aes_128_cfb8: c_int = 653;
-pub const NID_aes_192_cfb8: c_int = 654;
-pub const NID_aes_256_cfb8: c_int = 655;
-pub const NID_aes_128_ctr: c_int = 904;
-pub const NID_aes_192_ctr: c_int = 905;
-pub const NID_aes_256_ctr: c_int = 906;
-pub const NID_aes_128_xts: c_int = 913;
-pub const NID_aes_256_xts: c_int = 914;
-pub const NID_des_cfb1: c_int = 656;
-pub const NID_des_cfb8: c_int = 657;
-pub const NID_des_ede3_cfb1: c_int = 658;
-pub const NID_des_ede3_cfb8: c_int = 659;
-pub const NID_sha256: c_int = 672;
-pub const NID_sha384: c_int = 673;
-pub const NID_sha512: c_int = 674;
-pub const NID_sha224: c_int = 675;
-pub const NID_dsa_with_SHA224: c_int = 802;
-pub const NID_dsa_with_SHA256: c_int = 803;
-pub const NID_hold_instruction_code: c_int = 430;
-pub const NID_hold_instruction_none: c_int = 431;
-pub const NID_hold_instruction_call_issuer: c_int = 432;
-pub const NID_hold_instruction_reject: c_int = 433;
-pub const NID_data: c_int = 434;
-pub const NID_pss: c_int = 435;
-pub const NID_ucl: c_int = 436;
-pub const NID_pilot: c_int = 437;
-pub const NID_pilotAttributeType: c_int = 438;
-pub const NID_pilotAttributeSyntax: c_int = 439;
-pub const NID_pilotObjectClass: c_int = 440;
-pub const NID_pilotGroups: c_int = 441;
-pub const NID_iA5StringSyntax: c_int = 442;
-pub const NID_caseIgnoreIA5StringSyntax: c_int = 443;
-pub const NID_pilotObject: c_int = 444;
-pub const NID_pilotPerson: c_int = 445;
-pub const NID_account: c_int = 446;
-pub const NID_document: c_int = 447;
-pub const NID_room: c_int = 448;
-pub const NID_documentSeries: c_int = 449;
-pub const NID_Domain: c_int = 392;
-pub const NID_rFC822localPart: c_int = 450;
-pub const NID_dNSDomain: c_int = 451;
-pub const NID_domainRelatedObject: c_int = 452;
-pub const NID_friendlyCountry: c_int = 453;
-pub const NID_simpleSecurityObject: c_int = 454;
-pub const NID_pilotOrganization: c_int = 455;
-pub const NID_pilotDSA: c_int = 456;
-pub const NID_qualityLabelledData: c_int = 457;
-pub const NID_userId: c_int = 458;
-pub const NID_textEncodedORAddress: c_int = 459;
-pub const NID_rfc822Mailbox: c_int = 460;
-pub const NID_info: c_int = 461;
-pub const NID_favouriteDrink: c_int = 462;
-pub const NID_roomNumber: c_int = 463;
-pub const NID_photo: c_int = 464;
-pub const NID_userClass: c_int = 465;
-pub const NID_host: c_int = 466;
-pub const NID_manager: c_int = 467;
-pub const NID_documentIdentifier: c_int = 468;
-pub const NID_documentTitle: c_int = 469;
-pub const NID_documentVersion: c_int = 470;
-pub const NID_documentAuthor: c_int = 471;
-pub const NID_documentLocation: c_int = 472;
-pub const NID_homeTelephoneNumber: c_int = 473;
-pub const NID_secretary: c_int = 474;
-pub const NID_otherMailbox: c_int = 475;
-pub const NID_lastModifiedTime: c_int = 476;
-pub const NID_lastModifiedBy: c_int = 477;
-pub const NID_domainComponent: c_int = 391;
-pub const NID_aRecord: c_int = 478;
-pub const NID_pilotAttributeType27: c_int = 479;
-pub const NID_mXRecord: c_int = 480;
-pub const NID_nSRecord: c_int = 481;
-pub const NID_sOARecord: c_int = 482;
-pub const NID_cNAMERecord: c_int = 483;
-pub const NID_associatedDomain: c_int = 484;
-pub const NID_associatedName: c_int = 485;
-pub const NID_homePostalAddress: c_int = 486;
-pub const NID_personalTitle: c_int = 487;
-pub const NID_mobileTelephoneNumber: c_int = 488;
-pub const NID_pagerTelephoneNumber: c_int = 489;
-pub const NID_friendlyCountryName: c_int = 490;
-pub const NID_organizationalStatus: c_int = 491;
-pub const NID_janetMailbox: c_int = 492;
-pub const NID_mailPreferenceOption: c_int = 493;
-pub const NID_buildingName: c_int = 494;
-pub const NID_dSAQuality: c_int = 495;
-pub const NID_singleLevelQuality: c_int = 496;
-pub const NID_subtreeMinimumQuality: c_int = 497;
-pub const NID_subtreeMaximumQuality: c_int = 498;
-pub const NID_personalSignature: c_int = 499;
-pub const NID_dITRedirect: c_int = 500;
-pub const NID_audio: c_int = 501;
-pub const NID_documentPublisher: c_int = 502;
-pub const NID_id_set: c_int = 512;
-pub const NID_set_ctype: c_int = 513;
-pub const NID_set_msgExt: c_int = 514;
-pub const NID_set_attr: c_int = 515;
-pub const NID_set_policy: c_int = 516;
-pub const NID_set_certExt: c_int = 517;
-pub const NID_set_brand: c_int = 518;
-pub const NID_setct_PANData: c_int = 519;
-pub const NID_setct_PANToken: c_int = 520;
-pub const NID_setct_PANOnly: c_int = 521;
-pub const NID_setct_OIData: c_int = 522;
-pub const NID_setct_PI: c_int = 523;
-pub const NID_setct_PIData: c_int = 524;
-pub const NID_setct_PIDataUnsigned: c_int = 525;
-pub const NID_setct_HODInput: c_int = 526;
-pub const NID_setct_AuthResBaggage: c_int = 527;
-pub const NID_setct_AuthRevReqBaggage: c_int = 528;
-pub const NID_setct_AuthRevResBaggage: c_int = 529;
-pub const NID_setct_CapTokenSeq: c_int = 530;
-pub const NID_setct_PInitResData: c_int = 531;
-pub const NID_setct_PI_TBS: c_int = 532;
-pub const NID_setct_PResData: c_int = 533;
-pub const NID_setct_AuthReqTBS: c_int = 534;
-pub const NID_setct_AuthResTBS: c_int = 535;
-pub const NID_setct_AuthResTBSX: c_int = 536;
-pub const NID_setct_AuthTokenTBS: c_int = 537;
-pub const NID_setct_CapTokenData: c_int = 538;
-pub const NID_setct_CapTokenTBS: c_int = 539;
-pub const NID_setct_AcqCardCodeMsg: c_int = 540;
-pub const NID_setct_AuthRevReqTBS: c_int = 541;
-pub const NID_setct_AuthRevResData: c_int = 542;
-pub const NID_setct_AuthRevResTBS: c_int = 543;
-pub const NID_setct_CapReqTBS: c_int = 544;
-pub const NID_setct_CapReqTBSX: c_int = 545;
-pub const NID_setct_CapResData: c_int = 546;
-pub const NID_setct_CapRevReqTBS: c_int = 547;
-pub const NID_setct_CapRevReqTBSX: c_int = 548;
-pub const NID_setct_CapRevResData: c_int = 549;
-pub const NID_setct_CredReqTBS: c_int = 550;
-pub const NID_setct_CredReqTBSX: c_int = 551;
-pub const NID_setct_CredResData: c_int = 552;
-pub const NID_setct_CredRevReqTBS: c_int = 553;
-pub const NID_setct_CredRevReqTBSX: c_int = 554;
-pub const NID_setct_CredRevResData: c_int = 555;
-pub const NID_setct_PCertReqData: c_int = 556;
-pub const NID_setct_PCertResTBS: c_int = 557;
-pub const NID_setct_BatchAdminReqData: c_int = 558;
-pub const NID_setct_BatchAdminResData: c_int = 559;
-pub const NID_setct_CardCInitResTBS: c_int = 560;
-pub const NID_setct_MeAqCInitResTBS: c_int = 561;
-pub const NID_setct_RegFormResTBS: c_int = 562;
-pub const NID_setct_CertReqData: c_int = 563;
-pub const NID_setct_CertReqTBS: c_int = 564;
-pub const NID_setct_CertResData: c_int = 565;
-pub const NID_setct_CertInqReqTBS: c_int = 566;
-pub const NID_setct_ErrorTBS: c_int = 567;
-pub const NID_setct_PIDualSignedTBE: c_int = 568;
-pub const NID_setct_PIUnsignedTBE: c_int = 569;
-pub const NID_setct_AuthReqTBE: c_int = 570;
-pub const NID_setct_AuthResTBE: c_int = 571;
-pub const NID_setct_AuthResTBEX: c_int = 572;
-pub const NID_setct_AuthTokenTBE: c_int = 573;
-pub const NID_setct_CapTokenTBE: c_int = 574;
-pub const NID_setct_CapTokenTBEX: c_int = 575;
-pub const NID_setct_AcqCardCodeMsgTBE: c_int = 576;
-pub const NID_setct_AuthRevReqTBE: c_int = 577;
-pub const NID_setct_AuthRevResTBE: c_int = 578;
-pub const NID_setct_AuthRevResTBEB: c_int = 579;
-pub const NID_setct_CapReqTBE: c_int = 580;
-pub const NID_setct_CapReqTBEX: c_int = 581;
-pub const NID_setct_CapResTBE: c_int = 582;
-pub const NID_setct_CapRevReqTBE: c_int = 583;
-pub const NID_setct_CapRevReqTBEX: c_int = 584;
-pub const NID_setct_CapRevResTBE: c_int = 585;
-pub const NID_setct_CredReqTBE: c_int = 586;
-pub const NID_setct_CredReqTBEX: c_int = 587;
-pub const NID_setct_CredResTBE: c_int = 588;
-pub const NID_setct_CredRevReqTBE: c_int = 589;
-pub const NID_setct_CredRevReqTBEX: c_int = 590;
-pub const NID_setct_CredRevResTBE: c_int = 591;
-pub const NID_setct_BatchAdminReqTBE: c_int = 592;
-pub const NID_setct_BatchAdminResTBE: c_int = 593;
-pub const NID_setct_RegFormReqTBE: c_int = 594;
-pub const NID_setct_CertReqTBE: c_int = 595;
-pub const NID_setct_CertReqTBEX: c_int = 596;
-pub const NID_setct_CertResTBE: c_int = 597;
-pub const NID_setct_CRLNotificationTBS: c_int = 598;
-pub const NID_setct_CRLNotificationResTBS: c_int = 599;
-pub const NID_setct_BCIDistributionTBS: c_int = 600;
-pub const NID_setext_genCrypt: c_int = 601;
-pub const NID_setext_miAuth: c_int = 602;
-pub const NID_setext_pinSecure: c_int = 603;
-pub const NID_setext_pinAny: c_int = 604;
-pub const NID_setext_track2: c_int = 605;
-pub const NID_setext_cv: c_int = 606;
-pub const NID_set_policy_root: c_int = 607;
-pub const NID_setCext_hashedRoot: c_int = 608;
-pub const NID_setCext_certType: c_int = 609;
-pub const NID_setCext_merchData: c_int = 610;
-pub const NID_setCext_cCertRequired: c_int = 611;
-pub const NID_setCext_tunneling: c_int = 612;
-pub const NID_setCext_setExt: c_int = 613;
-pub const NID_setCext_setQualf: c_int = 614;
-pub const NID_setCext_PGWYcapabilities: c_int = 615;
-pub const NID_setCext_TokenIdentifier: c_int = 616;
-pub const NID_setCext_Track2Data: c_int = 617;
-pub const NID_setCext_TokenType: c_int = 618;
-pub const NID_setCext_IssuerCapabilities: c_int = 619;
-pub const NID_setAttr_Cert: c_int = 620;
-pub const NID_setAttr_PGWYcap: c_int = 621;
-pub const NID_setAttr_TokenType: c_int = 622;
-pub const NID_setAttr_IssCap: c_int = 623;
-pub const NID_set_rootKeyThumb: c_int = 624;
-pub const NID_set_addPolicy: c_int = 625;
-pub const NID_setAttr_Token_EMV: c_int = 626;
-pub const NID_setAttr_Token_B0Prime: c_int = 627;
-pub const NID_setAttr_IssCap_CVM: c_int = 628;
-pub const NID_setAttr_IssCap_T2: c_int = 629;
-pub const NID_setAttr_IssCap_Sig: c_int = 630;
-pub const NID_setAttr_GenCryptgrm: c_int = 631;
-pub const NID_setAttr_T2Enc: c_int = 632;
-pub const NID_setAttr_T2cleartxt: c_int = 633;
-pub const NID_setAttr_TokICCsig: c_int = 634;
-pub const NID_setAttr_SecDevSig: c_int = 635;
-pub const NID_set_brand_IATA_ATA: c_int = 636;
-pub const NID_set_brand_Diners: c_int = 637;
-pub const NID_set_brand_AmericanExpress: c_int = 638;
-pub const NID_set_brand_JCB: c_int = 639;
-pub const NID_set_brand_Visa: c_int = 640;
-pub const NID_set_brand_MasterCard: c_int = 641;
-pub const NID_set_brand_Novus: c_int = 642;
-pub const NID_des_cdmf: c_int = 643;
-pub const NID_rsaOAEPEncryptionSET: c_int = 644;
-pub const NID_ipsec3: c_int = 749;
-pub const NID_ipsec4: c_int = 750;
-pub const NID_whirlpool: c_int = 804;
-pub const NID_cryptopro: c_int = 805;
-pub const NID_cryptocom: c_int = 806;
-pub const NID_id_GostR3411_94_with_GostR3410_2001: c_int = 807;
-pub const NID_id_GostR3411_94_with_GostR3410_94: c_int = 808;
-pub const NID_id_GostR3411_94: c_int = 809;
-pub const NID_id_HMACGostR3411_94: c_int = 810;
-pub const NID_id_GostR3410_2001: c_int = 811;
-pub const NID_id_GostR3410_94: c_int = 812;
-pub const NID_id_Gost28147_89: c_int = 813;
-pub const NID_gost89_cnt: c_int = 814;
-pub const NID_id_Gost28147_89_MAC: c_int = 815;
-pub const NID_id_GostR3411_94_prf: c_int = 816;
-pub const NID_id_GostR3410_2001DH: c_int = 817;
-pub const NID_id_GostR3410_94DH: c_int = 818;
-pub const NID_id_Gost28147_89_CryptoPro_KeyMeshing: c_int = 819;
-pub const NID_id_Gost28147_89_None_KeyMeshing: c_int = 820;
-pub const NID_id_GostR3411_94_TestParamSet: c_int = 821;
-pub const NID_id_GostR3411_94_CryptoProParamSet: c_int = 822;
-pub const NID_id_Gost28147_89_TestParamSet: c_int = 823;
-pub const NID_id_Gost28147_89_CryptoPro_A_ParamSet: c_int = 824;
-pub const NID_id_Gost28147_89_CryptoPro_B_ParamSet: c_int = 825;
-pub const NID_id_Gost28147_89_CryptoPro_C_ParamSet: c_int = 826;
-pub const NID_id_Gost28147_89_CryptoPro_D_ParamSet: c_int = 827;
-pub const NID_id_Gost28147_89_CryptoPro_Oscar_1_1_ParamSet: c_int = 828;
-pub const NID_id_Gost28147_89_CryptoPro_Oscar_1_0_ParamSet: c_int = 829;
-pub const NID_id_Gost28147_89_CryptoPro_RIC_1_ParamSet: c_int = 830;
-pub const NID_id_GostR3410_94_TestParamSet: c_int = 831;
-pub const NID_id_GostR3410_94_CryptoPro_A_ParamSet: c_int = 832;
-pub const NID_id_GostR3410_94_CryptoPro_B_ParamSet: c_int = 833;
-pub const NID_id_GostR3410_94_CryptoPro_C_ParamSet: c_int = 834;
-pub const NID_id_GostR3410_94_CryptoPro_D_ParamSet: c_int = 835;
-pub const NID_id_GostR3410_94_CryptoPro_XchA_ParamSet: c_int = 836;
-pub const NID_id_GostR3410_94_CryptoPro_XchB_ParamSet: c_int = 837;
-pub const NID_id_GostR3410_94_CryptoPro_XchC_ParamSet: c_int = 838;
-pub const NID_id_GostR3410_2001_TestParamSet: c_int = 839;
-pub const NID_id_GostR3410_2001_CryptoPro_A_ParamSet: c_int = 840;
-pub const NID_id_GostR3410_2001_CryptoPro_B_ParamSet: c_int = 841;
-pub const NID_id_GostR3410_2001_CryptoPro_C_ParamSet: c_int = 842;
-pub const NID_id_GostR3410_2001_CryptoPro_XchA_ParamSet: c_int = 843;
-pub const NID_id_GostR3410_2001_CryptoPro_XchB_ParamSet: c_int = 844;
-pub const NID_id_GostR3410_94_a: c_int = 845;
-pub const NID_id_GostR3410_94_aBis: c_int = 846;
-pub const NID_id_GostR3410_94_b: c_int = 847;
-pub const NID_id_GostR3410_94_bBis: c_int = 848;
-pub const NID_id_Gost28147_89_cc: c_int = 849;
-pub const NID_id_GostR3410_94_cc: c_int = 850;
-pub const NID_id_GostR3410_2001_cc: c_int = 851;
-pub const NID_id_GostR3411_94_with_GostR3410_94_cc: c_int = 852;
-pub const NID_id_GostR3411_94_with_GostR3410_2001_cc: c_int = 853;
-pub const NID_id_GostR3410_2001_ParamSet_cc: c_int = 854;
-pub const NID_camellia_128_cbc: c_int = 751;
-pub const NID_camellia_192_cbc: c_int = 752;
-pub const NID_camellia_256_cbc: c_int = 753;
-pub const NID_id_camellia128_wrap: c_int = 907;
-pub const NID_id_camellia192_wrap: c_int = 908;
-pub const NID_id_camellia256_wrap: c_int = 909;
-pub const NID_camellia_128_ecb: c_int = 754;
-pub const NID_camellia_128_ofb128: c_int = 766;
-pub const NID_camellia_128_cfb128: c_int = 757;
-pub const NID_camellia_192_ecb: c_int = 755;
-pub const NID_camellia_192_ofb128: c_int = 767;
-pub const NID_camellia_192_cfb128: c_int = 758;
-pub const NID_camellia_256_ecb: c_int = 756;
-pub const NID_camellia_256_ofb128: c_int = 768;
-pub const NID_camellia_256_cfb128: c_int = 759;
-pub const NID_camellia_128_cfb1: c_int = 760;
-pub const NID_camellia_192_cfb1: c_int = 761;
-pub const NID_camellia_256_cfb1: c_int = 762;
-pub const NID_camellia_128_cfb8: c_int = 763;
-pub const NID_camellia_192_cfb8: c_int = 764;
-pub const NID_camellia_256_cfb8: c_int = 765;
-pub const NID_kisa: c_int = 773;
-pub const NID_seed_ecb: c_int = 776;
-pub const NID_seed_cbc: c_int = 777;
-pub const NID_seed_cfb128: c_int = 779;
-pub const NID_seed_ofb128: c_int = 778;
-pub const NID_hmac: c_int = 855;
-pub const NID_cmac: c_int = 894;
-pub const NID_rc4_hmac_md5: c_int = 915;
-pub const NID_aes_128_cbc_hmac_sha1: c_int = 916;
-pub const NID_aes_192_cbc_hmac_sha1: c_int = 917;
-pub const NID_aes_256_cbc_hmac_sha1: c_int = 918;
-
-pub const OCSP_NOCERTS: c_ulong = 0x1;
-pub const OCSP_NOINTERN: c_ulong = 0x2;
-pub const OCSP_NOSIGS: c_ulong = 0x4;
-pub const OCSP_NOCHAIN: c_ulong = 0x8;
-pub const OCSP_NOVERIFY: c_ulong = 0x10;
-pub const OCSP_NOEXPLICIT: c_ulong = 0x20;
-pub const OCSP_NOCASIGN: c_ulong = 0x40;
-pub const OCSP_NODELEGATED: c_ulong = 0x80;
-pub const OCSP_NOCHECKS: c_ulong = 0x100;
-pub const OCSP_TRUSTOTHER: c_ulong = 0x200;
-pub const OCSP_RESPID_KEY: c_ulong = 0x400;
-pub const OCSP_NOTIME: c_ulong = 0x800;
-
-pub const V_OCSP_CERTSTATUS_GOOD: c_int = 0;
-pub const V_OCSP_CERTSTATUS_REVOKED: c_int = 1;
-pub const V_OCSP_CERTSTATUS_UNKNOWN: c_int = 2;
-
-pub const OCSP_REVOKED_STATUS_NOSTATUS: c_int = -1;
-pub const OCSP_REVOKED_STATUS_UNSPECIFIED: c_int = 0;
-pub const OCSP_REVOKED_STATUS_KEYCOMPROMISE: c_int = 1;
-pub const OCSP_REVOKED_STATUS_CACOMPROMISE: c_int = 2;
-pub const OCSP_REVOKED_STATUS_AFFILIATIONCHANGED: c_int = 3;
-pub const OCSP_REVOKED_STATUS_SUPERSEDED: c_int = 4;
-pub const OCSP_REVOKED_STATUS_CESSATIONOFOPERATION: c_int = 5;
-pub const OCSP_REVOKED_STATUS_CERTIFICATEHOLD: c_int = 6;
-pub const OCSP_REVOKED_STATUS_REMOVEFROMCRL: c_int = 8;
-
-pub const OCSP_RESPONSE_STATUS_SUCCESSFUL: c_int = 0;
-pub const OCSP_RESPONSE_STATUS_MALFORMEDREQUEST: c_int = 1;
-pub const OCSP_RESPONSE_STATUS_INTERNALERROR: c_int = 2;
-pub const OCSP_RESPONSE_STATUS_TRYLATER: c_int = 3;
-pub const OCSP_RESPONSE_STATUS_SIGREQUIRED: c_int = 5;
-pub const OCSP_RESPONSE_STATUS_UNAUTHORIZED: c_int = 6;
-
-pub const OPENSSL_EC_NAMED_CURVE: c_int = 1;
-
-pub const PKCS5_SALT_LEN: c_int = 8;
-pub const PKCS12_DEFAULT_ITER: c_int = 2048;
-
-pub const RSA_F4: c_long = 0x10001;
-
-pub const RSA_PKCS1_PADDING: c_int = 1;
-pub const RSA_SSLV23_PADDING: c_int = 2;
-pub const RSA_NO_PADDING: c_int = 3;
-pub const RSA_PKCS1_OAEP_PADDING: c_int = 4;
-pub const RSA_X931_PADDING: c_int = 5;
-
-pub const SHA_LBLOCK: c_int = 16;
-
-pub const SSL_CTRL_SET_TMP_DH: c_int = 3;
-pub const SSL_CTRL_SET_TMP_ECDH: c_int = 4;
-pub const SSL_CTRL_EXTRA_CHAIN_CERT: c_int = 14;
-pub const SSL_CTRL_MODE: c_int = 33;
-pub const SSL_CTRL_SET_READ_AHEAD: c_int = 41;
-pub const SSL_CTRL_SET_TLSEXT_SERVERNAME_CB: c_int = 53;
-pub const SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG: c_int = 54;
-pub const SSL_CTRL_SET_TLSEXT_HOSTNAME: c_int = 55;
-pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB: c_int = 63;
-pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG: c_int = 64;
-pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE: c_int = 65;
-pub const SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: c_int = 70;
-pub const SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: c_int = 71;
-pub const SSL_CTRL_GET_EXTRA_CHAIN_CERTS: c_int = 82;
-#[cfg(not(any(ossl101, libressl)))]
-pub const SSL_CTRL_SET_VERIFY_CERT_STORE: c_int = 106;
-
-pub const SSL_MODE_ENABLE_PARTIAL_WRITE: c_long = 0x1;
-pub const SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER: c_long = 0x2;
-pub const SSL_MODE_AUTO_RETRY: c_long = 0x4;
-pub const SSL_MODE_NO_AUTO_CHAIN: c_long = 0x8;
-pub const SSL_MODE_RELEASE_BUFFERS: c_long = 0x10;
-#[cfg(not(libressl))]
-pub const SSL_MODE_SEND_CLIENTHELLO_TIME: c_long = 0x20;
-#[cfg(not(libressl))]
-pub const SSL_MODE_SEND_SERVERHELLO_TIME: c_long = 0x40;
-#[cfg(not(libressl))]
-pub const SSL_MODE_SEND_FALLBACK_SCSV: c_long = 0x80;
-
-pub const SSL_ERROR_NONE: c_int = 0;
-pub const SSL_ERROR_SSL: c_int = 1;
-pub const SSL_ERROR_SYSCALL: c_int = 5;
-pub const SSL_ERROR_WANT_ACCEPT: c_int = 8;
-pub const SSL_ERROR_WANT_CONNECT: c_int = 7;
-pub const SSL_ERROR_WANT_READ: c_int = 2;
-pub const SSL_ERROR_WANT_WRITE: c_int = 3;
-pub const SSL_ERROR_WANT_X509_LOOKUP: c_int = 4;
-pub const SSL_ERROR_ZERO_RETURN: c_int = 6;
-pub const SSL_VERIFY_NONE: c_int = 0;
-pub const SSL_VERIFY_PEER: c_int = 1;
-pub const SSL_VERIFY_FAIL_IF_NO_PEER_CERT: c_int = 2;
-
-#[cfg(not(any(libressl261, libressl262, libressl26x, ossl101)))]
-pub const SSL_OP_TLSEXT_PADDING: c_ulong = 0x00000010;
-#[cfg(any(libressl261, libressl262, libressl26x))]
-pub const SSL_OP_TLSEXT_PADDING: c_ulong = 0x0;
-pub const SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: c_ulong = 0x00000800;
-#[cfg(not(any(libressl261, libressl262, libressl26x)))]
-pub const SSL_OP_CRYPTOPRO_TLSEXT_BUG: c_ulong = 0x80000000;
-#[cfg(any(libressl261, libressl262, libressl26x))]
-pub const SSL_OP_CRYPTOPRO_TLSEXT_BUG: c_ulong = 0x0;
-pub const SSL_OP_LEGACY_SERVER_CONNECT: c_ulong = 0x00000004;
-#[cfg(not(libressl))]
-pub const SSL_OP_SAFARI_ECDHE_ECDSA_BUG: c_ulong = 0x00000040;
-#[cfg(not(any(libressl, ossl110f)))]
-pub const SSL_OP_ALL: c_ulong = 0x80000BFF;
-#[cfg(ossl110f)]
-pub const SSL_OP_ALL: c_ulong = SSL_OP_CRYPTOPRO_TLSEXT_BUG | SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
- SSL_OP_LEGACY_SERVER_CONNECT | SSL_OP_TLSEXT_PADDING |
- SSL_OP_SAFARI_ECDHE_ECDSA_BUG;
-pub const SSL_OP_NO_QUERY_MTU: c_ulong = 0x00001000;
-pub const SSL_OP_COOKIE_EXCHANGE: c_ulong = 0x00002000;
-pub const SSL_OP_NO_TICKET: c_ulong = 0x00004000;
-#[cfg(not(libressl))]
-pub const SSL_OP_CISCO_ANYCONNECT: c_ulong = 0x00008000;
-pub const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: c_ulong = 0x00010000;
-#[cfg(not(libressl))]
-pub const SSL_OP_NO_COMPRESSION: c_ulong = 0x00020000;
-#[cfg(not(libressl))]
-pub const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: c_ulong = 0x00040000;
-pub const SSL_OP_CIPHER_SERVER_PREFERENCE: c_ulong = 0x00400000;
-pub const SSL_OP_TLS_ROLLBACK_BUG: c_ulong = 0x00800000;
-#[cfg(not(libressl))]
-pub const SSL_OP_NO_SSLv3: c_ulong = 0x02000000;
-pub const SSL_OP_NO_TLSv1: c_ulong = 0x04000000;
-pub const SSL_OP_NO_TLSv1_2: c_ulong = 0x08000000;
-pub const SSL_OP_NO_TLSv1_1: c_ulong = 0x10000000;
-
-#[cfg(not(any(ossl101, libressl)))]
-pub const SSL_OP_NO_DTLSv1: c_ulong = 0x04000000;
-#[cfg(not(any(ossl101, libressl)))]
-pub const SSL_OP_NO_DTLSv1_2: c_ulong = 0x08000000;
-#[cfg(not(any(ossl101, libressl)))]
-pub const SSL_OP_NO_SSL_MASK: c_ulong = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 |
- SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2;
-
-pub const TLSEXT_NAMETYPE_host_name: c_int = 0;
-
-pub const TLSEXT_STATUSTYPE_ocsp: c_int = 1;
-
-pub const SSL_TLSEXT_ERR_OK: c_int = 0;
-pub const SSL_TLSEXT_ERR_ALERT_WARNING: c_int = 1;
-pub const SSL_TLSEXT_ERR_ALERT_FATAL: c_int = 2;
-pub const SSL_TLSEXT_ERR_NOACK: c_int = 3;
-
-pub const OPENSSL_NPN_UNSUPPORTED: c_int = 0;
-pub const OPENSSL_NPN_NEGOTIATED: c_int = 1;
-pub const OPENSSL_NPN_NO_OVERLAP: c_int = 2;
-
-pub const V_ASN1_GENERALIZEDTIME: c_int = 24;
-pub const V_ASN1_UTCTIME: c_int = 23;
-
-pub const X509_FILETYPE_ASN1: c_int = 2;
-pub const X509_FILETYPE_DEFAULT: c_int = 3;
-pub const X509_FILETYPE_PEM: c_int = 1;
-pub const X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: c_int = 31;
-pub const X509_V_ERR_AKID_SKID_MISMATCH: c_int = 30;
-pub const X509_V_ERR_APPLICATION_VERIFICATION: c_int = 50;
-pub const X509_V_ERR_CERT_CHAIN_TOO_LONG: c_int = 22;
-pub const X509_V_ERR_CERT_HAS_EXPIRED: c_int = 10;
-pub const X509_V_ERR_CERT_NOT_YET_VALID: c_int = 9;
-pub const X509_V_ERR_CERT_REJECTED: c_int = 28;
-pub const X509_V_ERR_CERT_REVOKED: c_int = 23;
-pub const X509_V_ERR_CERT_SIGNATURE_FAILURE: c_int = 7;
-pub const X509_V_ERR_CERT_UNTRUSTED: c_int = 27;
-pub const X509_V_ERR_CRL_HAS_EXPIRED: c_int = 12;
-pub const X509_V_ERR_CRL_NOT_YET_VALID: c_int = 11;
-pub const X509_V_ERR_CRL_PATH_VALIDATION_ERROR: c_int = 54;
-pub const X509_V_ERR_CRL_SIGNATURE_FAILURE: c_int = 8;
-pub const X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: c_int = 18;
-pub const X509_V_ERR_DIFFERENT_CRL_SCOPE: c_int = 44;
-pub const X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: c_int = 14;
-pub const X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: c_int = 13;
-pub const X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: c_int = 15;
-pub const X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: c_int = 16;
-pub const X509_V_ERR_EXCLUDED_VIOLATION: c_int = 48;
-pub const X509_V_ERR_INVALID_CA: c_int = 24;
-pub const X509_V_ERR_INVALID_EXTENSION: c_int = 41;
-pub const X509_V_ERR_INVALID_NON_CA: c_int = 37;
-pub const X509_V_ERR_INVALID_POLICY_EXTENSION: c_int = 42;
-pub const X509_V_ERR_INVALID_PURPOSE: c_int = 26;
-pub const X509_V_ERR_KEYUSAGE_NO_CERTSIGN: c_int = 32;
-pub const X509_V_ERR_KEYUSAGE_NO_CRL_SIGN: c_int = 35;
-pub const X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE: c_int = 39;
-pub const X509_V_ERR_NO_EXPLICIT_POLICY: c_int = 43;
-pub const X509_V_ERR_OUT_OF_MEM: c_int = 17;
-pub const X509_V_ERR_PATH_LENGTH_EXCEEDED: c_int = 25;
-pub const X509_V_ERR_PERMITTED_VIOLATION: c_int = 47;
-pub const X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED: c_int = 40;
-pub const X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED: c_int = 38;
-pub const X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: c_int = 19;
-pub const X509_V_ERR_SUBJECT_ISSUER_MISMATCH: c_int = 29;
-pub const X509_V_ERR_SUBTREE_MINMAX: c_int = 49;
-pub const X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: c_int = 6;
-pub const X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: c_int = 4;
-pub const X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: c_int = 5;
-pub const X509_V_ERR_UNABLE_TO_GET_CRL: c_int = 3;
-pub const X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER: c_int = 33;
-pub const X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: c_int = 2;
-pub const X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: c_int = 20;
-pub const X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: c_int = 21;
-pub const X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION: c_int = 36;
-pub const X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION: c_int = 34;
-pub const X509_V_ERR_UNNESTED_RESOURCE: c_int = 46;
-pub const X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: c_int = 52;
-pub const X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: c_int = 51;
-pub const X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE: c_int = 45;
-pub const X509_V_ERR_UNSUPPORTED_NAME_SYNTAX: c_int = 53;
-pub const X509_V_OK: c_int = 0;
-
-#[cfg(not(any(ossl101, libressl)))]
-pub const X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT: c_uint = 0x1;
-#[cfg(not(any(ossl101, libressl)))]
-pub const X509_CHECK_FLAG_NO_WILDCARDS: c_uint = 0x2;
-#[cfg(not(any(ossl101, libressl)))]
-pub const X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS: c_uint = 0x4;
-#[cfg(not(any(ossl101, libressl)))]
-pub const X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS: c_uint = 0x8;
-#[cfg(not(any(ossl101, libressl)))]
-pub const X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS: c_uint = 0x10;
-
-pub const GEN_OTHERNAME: c_int = 0;
-pub const GEN_EMAIL: c_int = 1;
-pub const GEN_DNS: c_int = 2;
-pub const GEN_X400: c_int = 3;
-pub const GEN_DIRNAME: c_int = 4;
-pub const GEN_EDIPARTY: c_int = 5;
-pub const GEN_URI: c_int = 6;
-pub const GEN_IPADD: c_int = 7;
-pub const GEN_RID: c_int = 8;
-
-// macros
-pub unsafe fn BIO_get_mem_data(b: *mut BIO, pp: *mut *mut c_char) -> c_long {
- BIO_ctrl(b, BIO_CTRL_INFO, 0, pp as *mut c_void)
-}
-
-pub unsafe fn BIO_clear_retry_flags(b: *mut BIO) {
- BIO_clear_flags(b, BIO_FLAGS_RWS | BIO_FLAGS_SHOULD_RETRY)
-}
-
-pub unsafe fn BIO_set_retry_read(b: *mut BIO) {
- BIO_set_flags(b, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY)
-}
-
-pub unsafe fn BIO_set_retry_write(b: *mut BIO) {
- BIO_set_flags(b, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY)
-}
-
-// EVP_PKEY_CTX_ctrl macros
-pub unsafe fn EVP_PKEY_CTX_set_rsa_padding(ctx: *mut EVP_PKEY_CTX, pad: c_int) -> c_int {
- EVP_PKEY_CTX_ctrl(
- ctx,
- EVP_PKEY_RSA,
- -1,
- EVP_PKEY_CTRL_RSA_PADDING,
- pad,
- ptr::null_mut(),
- )
-}
-
-pub unsafe fn EVP_PKEY_CTX_get_rsa_padding(ctx: *mut EVP_PKEY_CTX, ppad: *mut c_int) -> c_int {
- EVP_PKEY_CTX_ctrl(
- ctx,
- EVP_PKEY_RSA,
- -1,
- EVP_PKEY_CTRL_GET_RSA_PADDING,
- 0,
- ppad as *mut c_void,
- )
-}
-
-pub unsafe fn SSL_CTX_set_mode(ctx: *mut SSL_CTX, op: c_long) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_MODE, op, ptr::null_mut())
-}
-
-pub unsafe fn SSL_CTX_set_read_ahead(ctx: *mut SSL_CTX, m: c_long) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_SET_READ_AHEAD, m, ptr::null_mut())
-}
-
-pub unsafe fn SSL_CTX_set_tmp_dh(ctx: *mut SSL_CTX, dh: *mut DH) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TMP_DH, 0, dh as *mut c_void)
-}
-
-pub unsafe fn SSL_CTX_set_tmp_ecdh(ctx: *mut SSL_CTX, key: *mut EC_KEY) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TMP_ECDH, 0, key as *mut c_void)
-}
-
-pub unsafe fn SSL_set_tmp_dh(ssl: *mut SSL, dh: *mut DH) -> c_long {
- SSL_ctrl(ssl, SSL_CTRL_SET_TMP_DH, 0, dh as *mut c_void)
-}
-
-pub unsafe fn SSL_set_tmp_ecdh(ssl: *mut SSL, key: *mut EC_KEY) -> c_long {
- SSL_ctrl(ssl, SSL_CTRL_SET_TMP_ECDH, 0, key as *mut c_void)
-}
-
-pub unsafe fn SSL_CTX_add_extra_chain_cert(ctx: *mut SSL_CTX, x509: *mut X509) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_EXTRA_CHAIN_CERT, 0, x509 as *mut c_void)
-}
-
-#[cfg(not(any(ossl101, libressl)))]
-pub unsafe fn SSL_CTX_set0_verify_cert_store(ctx: *mut SSL_CTX, st: *mut X509_STORE) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_SET_VERIFY_CERT_STORE, 0, st as *mut c_void)
-}
-
-pub unsafe fn SSL_CTX_set_tlsext_servername_callback(
- ctx: *mut SSL_CTX,
- cb: Option,
-) -> c_long {
- SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_CB, cb)
-}
-
-pub unsafe fn SSL_set_tlsext_host_name(s: *mut SSL, name: *mut c_char) -> c_long {
- SSL_ctrl(
- s,
- SSL_CTRL_SET_TLSEXT_HOSTNAME,
- TLSEXT_NAMETYPE_host_name as c_long,
- name as *mut c_void,
- )
-}
-
-pub unsafe fn SSL_set_tlsext_status_type(s: *mut SSL, type_: c_int) -> c_long {
- SSL_ctrl(
- s,
- SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,
- type_ as c_long,
- ptr::null_mut(),
- )
-}
-
-pub unsafe fn SSL_CTX_set_tlsext_status_cb(
- ctx: *mut SSL_CTX,
- cb: Option c_int>,
-) -> c_long {
- SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB, mem::transmute(cb))
-}
-
-pub unsafe fn SSL_CTX_set_tlsext_status_arg(ctx: *mut SSL_CTX, arg: *mut c_void) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG, 0, arg)
-}
-
-pub unsafe fn SSL_CTX_get_extra_chain_certs(
- ctx: *mut SSL_CTX,
- chain: *mut *mut stack_st_X509,
-) -> c_long {
- SSL_CTX_ctrl(ctx, SSL_CTRL_GET_EXTRA_CHAIN_CERTS, 0, chain as *mut c_void)
-}
-
-pub unsafe fn SSL_get_tlsext_status_ocsp_resp(ssl: *mut SSL, resp: *mut *mut c_uchar) -> c_long {
- SSL_ctrl(
- ssl,
- SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP,
- 0,
- resp as *mut c_void,
- )
-}
-
-pub unsafe fn SSL_set_tlsext_status_ocsp_resp(
- ssl: *mut SSL,
- resp: *mut c_uchar,
- len: c_long,
-) -> c_long {
- SSL_ctrl(
- ssl,
- SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP,
- len,
- resp as *mut c_void,
- )
-}
-
-pub fn ERR_GET_LIB(l: c_ulong) -> c_int {
- ((l >> 24) & 0x0FF) as c_int
-}
-
-pub fn ERR_GET_FUNC(l: c_ulong) -> c_int {
- ((l >> 12) & 0xFFF) as c_int
-}
-
-pub fn ERR_GET_REASON(l: c_ulong) -> c_int {
- (l & 0xFFF) as c_int
-}
-
-extern "C" {
- pub fn AES_set_encrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
- pub fn AES_set_decrypt_key(userKey: *const c_uchar, bits: c_int, key: *mut AES_KEY) -> c_int;
- pub fn AES_ige_encrypt(
- in_: *const c_uchar,
- out: *mut c_uchar,
- length: size_t,
- key: *const AES_KEY,
- ivec: *mut c_uchar,
- enc: c_int,
- );
-
- pub fn ASN1_INTEGER_get(dest: *const ASN1_INTEGER) -> c_long;
- pub fn ASN1_INTEGER_set(dest: *mut ASN1_INTEGER, value: c_long) -> c_int;
- pub fn ASN1_GENERALIZEDTIME_free(tm: *mut ASN1_GENERALIZEDTIME);
- pub fn ASN1_GENERALIZEDTIME_print(b: *mut BIO, tm: *const ASN1_GENERALIZEDTIME) -> c_int;
- pub fn ASN1_STRING_type_new(ty: c_int) -> *mut ASN1_STRING;
- pub fn ASN1_TIME_free(tm: *mut ASN1_TIME);
- pub fn ASN1_TIME_print(b: *mut BIO, tm: *const ASN1_TIME) -> c_int;
- pub fn ASN1_BIT_STRING_free(x: *mut ASN1_BIT_STRING);
- pub fn ASN1_OBJECT_free(x: *mut ASN1_OBJECT);
-
- pub fn BIO_ctrl(b: *mut BIO, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
- pub fn BIO_free_all(b: *mut BIO);
- pub fn BIO_new_fp(stream: *mut FILE, close_flag: c_int) -> *mut BIO;
- pub fn BIO_new_socket(sock: c_int, close_flag: c_int) -> *mut BIO;
- pub fn BIO_read(b: *mut BIO, buf: *mut c_void, len: c_int) -> c_int;
- pub fn BIO_write(b: *mut BIO, buf: *const c_void, len: c_int) -> c_int;
- #[cfg(any(ossl101, libressl))]
- pub fn BIO_new_mem_buf(buf: *mut c_void, len: c_int) -> *mut BIO;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn BIO_new_mem_buf(buf: *const c_void, len: c_int) -> *mut BIO;
- pub fn BIO_set_flags(b: *mut BIO, flags: c_int);
- pub fn BIO_clear_flags(b: *mut BIO, flags: c_int);
-
- pub fn BN_CTX_new() -> *mut BN_CTX;
- pub fn BN_CTX_free(ctx: *mut BN_CTX);
-
- pub fn BN_new() -> *mut BIGNUM;
- pub fn BN_dup(n: *const BIGNUM) -> *mut BIGNUM;
- pub fn BN_clear(bn: *mut BIGNUM);
- pub fn BN_free(bn: *mut BIGNUM);
- pub fn BN_clear_free(bn: *mut BIGNUM);
- pub fn BN_num_bits(bn: *const BIGNUM) -> c_int;
- pub fn BN_set_negative(bn: *mut BIGNUM, n: c_int);
- pub fn BN_set_word(bn: *mut BIGNUM, n: BN_ULONG) -> c_int;
- pub fn BN_add(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
- pub fn BN_div(
- dv: *mut BIGNUM,
- rem: *mut BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_exp(r: *mut BIGNUM, a: *const BIGNUM, p: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
- pub fn BN_gcd(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
- pub fn BN_mod_add(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_mod_exp(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- p: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_mod_inverse(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- n: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> *mut BIGNUM;
- pub fn BN_mod_mul(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_mod_sqr(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_mod_sub(
- r: *mut BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_mul(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
- pub fn BN_nnmod(
- rem: *mut BIGNUM,
- a: *const BIGNUM,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn BN_add_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
- pub fn BN_sub_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
- pub fn BN_mul_word(r: *mut BIGNUM, w: BN_ULONG) -> c_int;
- pub fn BN_div_word(r: *mut BIGNUM, w: BN_ULONG) -> BN_ULONG;
- pub fn BN_mod_word(r: *const BIGNUM, w: BN_ULONG) -> BN_ULONG;
- pub fn BN_sqr(r: *mut BIGNUM, a: *const BIGNUM, ctx: *mut BN_CTX) -> c_int;
- pub fn BN_sub(r: *mut BIGNUM, a: *const BIGNUM, b: *const BIGNUM) -> c_int;
- pub fn BN_clear_bit(a: *mut BIGNUM, n: c_int) -> c_int;
- pub fn BN_is_bit_set(a: *const BIGNUM, n: c_int) -> c_int;
- pub fn BN_lshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
- pub fn BN_lshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
- pub fn BN_mask_bits(a: *mut BIGNUM, n: c_int) -> c_int;
- pub fn BN_rshift(r: *mut BIGNUM, a: *const BIGNUM, n: c_int) -> c_int;
- pub fn BN_set_bit(a: *mut BIGNUM, n: c_int) -> c_int;
- pub fn BN_rshift1(r: *mut BIGNUM, a: *const BIGNUM) -> c_int;
- pub fn BN_cmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
- pub fn BN_ucmp(a: *const BIGNUM, b: *const BIGNUM) -> c_int;
- pub fn BN_generate_prime_ex(
- r: *mut BIGNUM,
- bits: c_int,
- safe: c_int,
- add: *const BIGNUM,
- rem: *const BIGNUM,
- cb: *mut BN_GENCB,
- ) -> c_int;
- pub fn BN_is_prime_ex(
- p: *const BIGNUM,
- checks: c_int,
- ctx: *mut BN_CTX,
- cb: *mut BN_GENCB,
- ) -> c_int;
- pub fn BN_is_prime_fasttest_ex(
- p: *const BIGNUM,
- checks: c_int,
- ctx: *mut BN_CTX,
- do_trial_division: c_int,
- cb: *mut BN_GENCB,
- ) -> c_int;
- pub fn BN_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
- pub fn BN_pseudo_rand(r: *mut BIGNUM, bits: c_int, top: c_int, bottom: c_int) -> c_int;
- pub fn BN_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
- pub fn BN_pseudo_rand_range(r: *mut BIGNUM, range: *const BIGNUM) -> c_int;
- pub fn BN_bin2bn(s: *const u8, size: c_int, ret: *mut BIGNUM) -> *mut BIGNUM;
- pub fn BN_bn2bin(a: *const BIGNUM, to: *mut u8) -> c_int;
- pub fn BN_dec2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
- pub fn BN_bn2dec(a: *const BIGNUM) -> *mut c_char;
- pub fn BN_hex2bn(a: *mut *mut BIGNUM, s: *const c_char) -> c_int;
- pub fn BN_bn2hex(a: *const BIGNUM) -> *mut c_char;
- pub fn BN_to_ASN1_INTEGER(bn: *const BIGNUM, ai: *mut ASN1_INTEGER) -> *mut ASN1_INTEGER;
-
- pub fn NCONF_default() -> *mut CONF_METHOD;
- pub fn NCONF_new(meth: *mut CONF_METHOD) -> *mut CONF;
- pub fn NCONF_free(conf: *mut CONF);
-
- pub fn CRYPTO_memcmp(a: *const c_void, b: *const c_void, len: size_t) -> c_int;
-
- pub fn DH_new() -> *mut DH;
- pub fn DH_free(dh: *mut DH);
- #[cfg(not(any(ossl101, libressl)))]
- pub fn DH_get_1024_160() -> *mut DH;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn DH_get_2048_224() -> *mut DH;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn DH_get_2048_256() -> *mut DH;
-
- pub fn EC_KEY_new() -> *mut EC_KEY;
- pub fn EC_KEY_new_by_curve_name(nid: c_int) -> *mut EC_KEY;
- pub fn EC_KEY_dup(key: *const EC_KEY) -> *mut EC_KEY;
- pub fn EC_KEY_set_group(key: *mut EC_KEY, group: *const EC_GROUP) -> c_int;
- pub fn EC_KEY_get0_group(key: *const EC_KEY) -> *const EC_GROUP;
- pub fn EC_KEY_set_public_key(key: *mut EC_KEY, key: *const EC_POINT) -> c_int;
- pub fn EC_KEY_get0_public_key(key: *const EC_KEY) -> *const EC_POINT;
- pub fn EC_KEY_set_private_key(key: *mut EC_KEY, key: *const BIGNUM) -> c_int;
- pub fn EC_KEY_get0_private_key(key: *const EC_KEY) -> *const BIGNUM;
- pub fn EC_KEY_generate_key(key: *mut EC_KEY) -> c_int;
- pub fn EC_KEY_check_key(key: *const EC_KEY) -> c_int;
- pub fn EC_KEY_free(key: *mut EC_KEY);
- pub fn EC_KEY_set_public_key_affine_coordinates(
- key: *mut EC_KEY,
- x: *mut BIGNUM,
- y: *mut BIGNUM,
- ) -> c_int;
-
- #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
- pub fn EC_GF2m_simple_method() -> *const EC_METHOD;
-
- pub fn EC_GROUP_new(meth: *const EC_METHOD) -> *mut EC_GROUP;
- pub fn EC_GROUP_new_curve_GFp(
- p: *const BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> *mut EC_GROUP;
- #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
- pub fn EC_GROUP_new_curve_GF2m(
- p: *const BIGNUM,
- a: *const BIGNUM,
- b: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> *mut EC_GROUP;
- pub fn EC_GROUP_new_by_curve_name(nid: c_int) -> *mut EC_GROUP;
- pub fn EC_GROUP_get_curve_GFp(
- group: *const EC_GROUP,
- p: *mut BIGNUM,
- a: *mut BIGNUM,
- b: *mut BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
- pub fn EC_GROUP_get_curve_GF2m(
- group: *const EC_GROUP,
- p: *mut BIGNUM,
- a: *mut BIGNUM,
- b: *mut BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_GROUP_get_degree(group: *const EC_GROUP) -> c_int;
- pub fn EC_GROUP_get_order(
- group: *const EC_GROUP,
- order: *mut BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_GROUP_set_asn1_flag(key: *mut EC_GROUP, flag: c_int);
-
- pub fn EC_GROUP_free(group: *mut EC_GROUP);
-
- pub fn EC_POINT_new(group: *const EC_GROUP) -> *mut EC_POINT;
- pub fn EC_POINT_add(
- group: *const EC_GROUP,
- r: *mut EC_POINT,
- a: *const EC_POINT,
- b: *const EC_POINT,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_POINT_mul(
- group: *const EC_GROUP,
- r: *mut EC_POINT,
- n: *const BIGNUM,
- q: *const EC_POINT,
- m: *const BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_POINT_invert(group: *const EC_GROUP, r: *mut EC_POINT, ctx: *mut BN_CTX) -> c_int;
- pub fn EC_POINT_point2oct(
- group: *const EC_GROUP,
- p: *const EC_POINT,
- form: point_conversion_form_t,
- buf: *mut c_uchar,
- len: size_t,
- ctx: *mut BN_CTX,
- ) -> size_t;
- pub fn EC_POINT_oct2point(
- group: *const EC_GROUP,
- p: *mut EC_POINT,
- buf: *const c_uchar,
- len: size_t,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_POINT_cmp(
- group: *const EC_GROUP,
- a: *const EC_POINT,
- b: *const EC_POINT,
- ctx: *mut BN_CTX,
- ) -> c_int;
- pub fn EC_POINT_free(point: *mut EC_POINT);
- pub fn EC_POINT_get_affine_coordinates_GFp(
- group: *const EC_GROUP,
- p: *const EC_POINT,
- x: *mut BIGNUM,
- y: *mut BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
- #[cfg(not(osslconf = "OPENSSL_NO_EC2M"))]
- pub fn EC_POINT_get_affine_coordinates_GF2m(
- group: *const EC_GROUP,
- p: *const EC_POINT,
- x: *mut BIGNUM,
- y: *mut BIGNUM,
- ctx: *mut BN_CTX,
- ) -> c_int;
-
- pub fn ERR_peek_last_error() -> c_ulong;
- pub fn ERR_get_error() -> c_ulong;
- pub fn ERR_get_error_line_data(
- file: *mut *const c_char,
- line: *mut c_int,
- data: *mut *const c_char,
- flags: *mut c_int,
- ) -> c_ulong;
- pub fn ERR_lib_error_string(err: c_ulong) -> *const c_char;
- pub fn ERR_func_error_string(err: c_ulong) -> *const c_char;
- pub fn ERR_reason_error_string(err: c_ulong) -> *const c_char;
- pub fn ERR_clear_error();
-
- pub fn EVP_md5() -> *const EVP_MD;
- pub fn EVP_ripemd160() -> *const EVP_MD;
- pub fn EVP_sha1() -> *const EVP_MD;
- pub fn EVP_sha224() -> *const EVP_MD;
- pub fn EVP_sha256() -> *const EVP_MD;
- pub fn EVP_sha384() -> *const EVP_MD;
- pub fn EVP_sha512() -> *const EVP_MD;
-
- pub fn EVP_aes_128_cbc() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_ecb() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_xts() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_ctr() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_gcm() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_cfb1() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_cfb128() -> *const EVP_CIPHER;
- pub fn EVP_aes_128_cfb8() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_cbc() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_ecb() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_xts() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_ctr() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_gcm() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_cfb1() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_cfb128() -> *const EVP_CIPHER;
- pub fn EVP_aes_256_cfb8() -> *const EVP_CIPHER;
- pub fn EVP_bf_cbc() -> *const EVP_CIPHER;
- pub fn EVP_bf_ecb() -> *const EVP_CIPHER;
- pub fn EVP_bf_cfb64() -> *const EVP_CIPHER;
- pub fn EVP_bf_ofb() -> *const EVP_CIPHER;
- pub fn EVP_rc4() -> *const EVP_CIPHER;
-
- pub fn EVP_des_cbc() -> *const EVP_CIPHER;
- pub fn EVP_des_ecb() -> *const EVP_CIPHER;
-
- pub fn EVP_BytesToKey(
- typ: *const EVP_CIPHER,
- md: *const EVP_MD,
- salt: *const u8,
- data: *const u8,
- datalen: c_int,
- count: c_int,
- key: *mut u8,
- iv: *mut u8,
- ) -> c_int;
-
- pub fn EVP_CIPHER_CTX_new() -> *mut EVP_CIPHER_CTX;
- pub fn EVP_CIPHER_CTX_set_padding(ctx: *mut EVP_CIPHER_CTX, padding: c_int) -> c_int;
- pub fn EVP_CIPHER_CTX_set_key_length(ctx: *mut EVP_CIPHER_CTX, keylen: c_int) -> c_int;
- pub fn EVP_CIPHER_CTX_ctrl(
- ctx: *mut EVP_CIPHER_CTX,
- type_: c_int,
- arg: c_int,
- ptr: *mut c_void,
- ) -> c_int;
- pub fn EVP_CIPHER_CTX_free(ctx: *mut EVP_CIPHER_CTX);
-
- pub fn EVP_CipherInit(
- ctx: *mut EVP_CIPHER_CTX,
- evp: *const EVP_CIPHER,
- key: *const u8,
- iv: *const u8,
- mode: c_int,
- ) -> c_int;
- pub fn EVP_CipherInit_ex(
- ctx: *mut EVP_CIPHER_CTX,
- type_: *const EVP_CIPHER,
- impl_: *mut ENGINE,
- key: *const c_uchar,
- iv: *const c_uchar,
- enc: c_int,
- ) -> c_int;
- pub fn EVP_CipherUpdate(
- ctx: *mut EVP_CIPHER_CTX,
- outbuf: *mut u8,
- outlen: *mut c_int,
- inbuf: *const u8,
- inlen: c_int,
- ) -> c_int;
- pub fn EVP_CipherFinal(ctx: *mut EVP_CIPHER_CTX, res: *mut u8, len: *mut c_int) -> c_int;
-
- pub fn EVP_DigestInit(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD) -> c_int;
- pub fn EVP_DigestInit_ex(ctx: *mut EVP_MD_CTX, typ: *const EVP_MD, imple: *mut ENGINE)
- -> c_int;
- pub fn EVP_DigestUpdate(ctx: *mut EVP_MD_CTX, data: *const c_void, n: size_t) -> c_int;
- pub fn EVP_DigestFinal(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
- pub fn EVP_DigestFinal_ex(ctx: *mut EVP_MD_CTX, res: *mut u8, n: *mut u32) -> c_int;
-
- pub fn EVP_DigestSignInit(
- ctx: *mut EVP_MD_CTX,
- pctx: *mut *mut EVP_PKEY_CTX,
- type_: *const EVP_MD,
- e: *mut ENGINE,
- pkey: *mut EVP_PKEY,
- ) -> c_int;
- pub fn EVP_DigestSignFinal(
- ctx: *mut EVP_MD_CTX,
- sig: *mut c_uchar,
- siglen: *mut size_t,
- ) -> c_int;
- pub fn EVP_DigestVerifyInit(
- ctx: *mut EVP_MD_CTX,
- pctx: *mut *mut EVP_PKEY_CTX,
- type_: *const EVP_MD,
- e: *mut ENGINE,
- pkey: *mut EVP_PKEY,
- ) -> c_int;
- #[cfg(any(ossl101, libressl))]
- pub fn EVP_DigestVerifyFinal(
- ctx: *mut EVP_MD_CTX,
- sigret: *mut c_uchar,
- siglen: size_t,
- ) -> c_int;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn EVP_DigestVerifyFinal(
- ctx: *mut EVP_MD_CTX,
- sigret: *const c_uchar,
- siglen: size_t,
- ) -> c_int;
-
- pub fn EVP_MD_CTX_copy_ex(dst: *mut EVP_MD_CTX, src: *const EVP_MD_CTX) -> c_int;
-
- pub fn EVP_PKEY_new() -> *mut EVP_PKEY;
- pub fn EVP_PKEY_free(k: *mut EVP_PKEY);
- pub fn EVP_PKEY_assign(pkey: *mut EVP_PKEY, typ: c_int, key: *mut c_void) -> c_int;
- pub fn EVP_PKEY_copy_parameters(to: *mut EVP_PKEY, from: *const EVP_PKEY) -> c_int;
- pub fn EVP_PKEY_get1_RSA(k: *mut EVP_PKEY) -> *mut RSA;
- pub fn EVP_PKEY_set1_RSA(k: *mut EVP_PKEY, r: *mut RSA) -> c_int;
- pub fn EVP_PKEY_get1_DSA(k: *mut EVP_PKEY) -> *mut DSA;
- pub fn EVP_PKEY_get1_DH(k: *mut EVP_PKEY) -> *mut DH;
- pub fn EVP_PKEY_get1_EC_KEY(k: *mut EVP_PKEY) -> *mut EC_KEY;
- pub fn EVP_PKEY_cmp(a: *const EVP_PKEY, b: *const EVP_PKEY) -> c_int;
- pub fn EVP_PKEY_new_mac_key(
- type_: c_int,
- e: *mut ENGINE,
- key: *const c_uchar,
- keylen: c_int,
- ) -> *mut EVP_PKEY;
- pub fn EVP_PKEY_derive_init(ctx: *mut EVP_PKEY_CTX) -> c_int;
- pub fn EVP_PKEY_derive_set_peer(ctx: *mut EVP_PKEY_CTX, peer: *mut EVP_PKEY) -> c_int;
- pub fn EVP_PKEY_derive(ctx: *mut EVP_PKEY_CTX, key: *mut c_uchar, size: *mut size_t) -> c_int;
- pub fn d2i_PKCS8PrivateKey_bio(
- bp: *mut BIO,
- x: *mut *mut EVP_PKEY,
- cb: Option,
- u: *mut c_void,
- ) -> *mut EVP_PKEY;
-
- pub fn EVP_PKEY_CTX_new(k: *mut EVP_PKEY, e: *mut ENGINE) -> *mut EVP_PKEY_CTX;
- pub fn EVP_PKEY_CTX_free(ctx: *mut EVP_PKEY_CTX);
- pub fn EVP_PKEY_CTX_ctrl(
- ctx: *mut EVP_PKEY_CTX,
- keytype: c_int,
- optype: c_int,
- cmd: c_int,
- p1: c_int,
- p2: *mut c_void,
- ) -> c_int;
-
- pub fn HMAC_CTX_copy(dst: *mut HMAC_CTX, src: *mut HMAC_CTX) -> c_int;
-
- pub fn OBJ_obj2nid(o: *const ASN1_OBJECT) -> c_int;
- pub fn OBJ_obj2txt(
- buf: *mut c_char,
- buf_len: c_int,
- a: *const ASN1_OBJECT,
- no_name: c_int,
- ) -> c_int;
-
- pub fn OCSP_BASICRESP_new() -> *mut OCSP_BASICRESP;
- pub fn OCSP_BASICRESP_free(r: *mut OCSP_BASICRESP);
- pub fn OCSP_basic_verify(
- bs: *mut OCSP_BASICRESP,
- certs: *mut stack_st_X509,
- st: *mut X509_STORE,
- flags: c_ulong,
- ) -> c_int;
- pub fn OCSP_resp_find_status(
- bs: *mut OCSP_BASICRESP,
- id: *mut OCSP_CERTID,
- status: *mut c_int,
- reason: *mut c_int,
- revtime: *mut *mut ASN1_GENERALIZEDTIME,
- thisupd: *mut *mut ASN1_GENERALIZEDTIME,
- nextupd: *mut *mut ASN1_GENERALIZEDTIME,
- ) -> c_int;
- pub fn OCSP_check_validity(
- thisupd: *mut ASN1_GENERALIZEDTIME,
- nextupd: *mut ASN1_GENERALIZEDTIME,
- sec: c_long,
- maxsec: c_long,
- ) -> c_int;
-
- pub fn OCSP_CERTID_free(id: *mut OCSP_CERTID);
-
- pub fn OCSP_RESPONSE_new() -> *mut OCSP_RESPONSE;
- pub fn OCSP_RESPONSE_free(r: *mut OCSP_RESPONSE);
- pub fn i2d_OCSP_RESPONSE(a: *mut OCSP_RESPONSE, pp: *mut *mut c_uchar) -> c_int;
- pub fn d2i_OCSP_RESPONSE(
- a: *mut *mut OCSP_RESPONSE,
- pp: *mut *const c_uchar,
- length: c_long,
- ) -> *mut OCSP_RESPONSE;
- pub fn OCSP_response_create(status: c_int, bs: *mut OCSP_BASICRESP) -> *mut OCSP_RESPONSE;
- pub fn OCSP_response_status(resp: *mut OCSP_RESPONSE) -> c_int;
- pub fn OCSP_response_get1_basic(resp: *mut OCSP_RESPONSE) -> *mut OCSP_BASICRESP;
-
- pub fn OCSP_REQUEST_new() -> *mut OCSP_REQUEST;
- pub fn OCSP_REQUEST_free(r: *mut OCSP_REQUEST);
- pub fn i2d_OCSP_REQUEST(a: *mut OCSP_REQUEST, pp: *mut *mut c_uchar) -> c_int;
- pub fn d2i_OCSP_REQUEST(
- a: *mut *mut OCSP_REQUEST,
- pp: *mut *const c_uchar,
- length: c_long,
- ) -> *mut OCSP_REQUEST;
- pub fn OCSP_request_add0_id(r: *mut OCSP_REQUEST, id: *mut OCSP_CERTID) -> *mut OCSP_ONEREQ;
-
- pub fn OCSP_ONEREQ_free(r: *mut OCSP_ONEREQ);
-
- pub fn PEM_read_bio_DHparams(
- bio: *mut BIO,
- out: *mut *mut DH,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut DH;
- pub fn PEM_read_bio_X509(
- bio: *mut BIO,
- out: *mut *mut X509,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut X509;
- pub fn PEM_read_bio_X509_REQ(
- bio: *mut BIO,
- out: *mut *mut X509_REQ,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut X509_REQ;
- pub fn PEM_read_bio_PrivateKey(
- bio: *mut BIO,
- out: *mut *mut EVP_PKEY,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut EVP_PKEY;
- pub fn PEM_read_bio_PUBKEY(
- bio: *mut BIO,
- out: *mut *mut EVP_PKEY,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut EVP_PKEY;
-
- pub fn PEM_read_bio_RSAPrivateKey(
- bio: *mut BIO,
- rsa: *mut *mut RSA,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut RSA;
- pub fn PEM_read_bio_RSA_PUBKEY(
- bio: *mut BIO,
- rsa: *mut *mut RSA,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut RSA;
-
- pub fn PEM_write_bio_DHparams(bio: *mut BIO, x: *const DH) -> c_int;
- pub fn PEM_write_bio_PrivateKey(
- bio: *mut BIO,
- pkey: *mut EVP_PKEY,
- cipher: *const EVP_CIPHER,
- kstr: *mut c_uchar,
- klen: c_int,
- callback: Option,
- user_data: *mut c_void,
- ) -> c_int;
- pub fn PEM_write_bio_PKCS8PrivateKey(
- bio: *mut BIO,
- pkey: *mut EVP_PKEY,
- cipher: *const EVP_CIPHER,
- kstr: *mut c_char,
- klen: c_int,
- callback: Option,
- user_data: *mut c_void,
- ) -> c_int;
- pub fn PEM_write_bio_PUBKEY(bp: *mut BIO, x: *mut EVP_PKEY) -> c_int;
- pub fn PEM_write_bio_RSAPrivateKey(
- bp: *mut BIO,
- rsa: *mut RSA,
- cipher: *const EVP_CIPHER,
- kstr: *mut c_uchar,
- klen: c_int,
- callback: Option,
- user_data: *mut c_void,
- ) -> c_int;
- pub fn PEM_write_bio_RSAPublicKey(bp: *mut BIO, rsa: *const RSA) -> c_int;
- pub fn PEM_write_bio_RSA_PUBKEY(bp: *mut BIO, rsa: *mut RSA) -> c_int;
-
- pub fn PEM_read_bio_DSAPrivateKey(
- bp: *mut BIO,
- dsa: *mut *mut DSA,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut DSA;
- pub fn PEM_read_bio_DSA_PUBKEY(
- bp: *mut BIO,
- dsa: *mut *mut DSA,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut DSA;
- pub fn PEM_write_bio_DSAPrivateKey(
- bp: *mut BIO,
- dsa: *mut DSA,
- cipher: *const EVP_CIPHER,
- kstr: *mut c_uchar,
- klen: c_int,
- callback: Option,
- user_data: *mut c_void,
- ) -> c_int;
- pub fn PEM_write_bio_DSA_PUBKEY(bp: *mut BIO, dsa: *mut DSA) -> c_int;
-
- pub fn PEM_write_bio_X509(bio: *mut BIO, x509: *mut X509) -> c_int;
- pub fn PEM_write_bio_X509_REQ(bio: *mut BIO, x509: *mut X509_REQ) -> c_int;
-
- pub fn PEM_write_bio_ECPrivateKey(
- bio: *mut BIO,
- key: *mut EC_KEY,
- cipher: *const EVP_CIPHER,
- kstr: *mut c_uchar,
- klen: c_int,
- callback: Option,
- user_data: *mut c_void,
- ) -> c_int;
- pub fn PEM_read_bio_ECPrivateKey(
- bio: *mut BIO,
- key: *mut *mut EC_KEY,
- callback: Option,
- user_data: *mut c_void,
- ) -> *mut EC_KEY;
-
- pub fn PKCS5_PBKDF2_HMAC_SHA1(
- pass: *const c_char,
- passlen: c_int,
- salt: *const u8,
- saltlen: c_int,
- iter: c_int,
- keylen: c_int,
- out: *mut u8,
- ) -> c_int;
- pub fn PKCS5_PBKDF2_HMAC(
- pass: *const c_char,
- passlen: c_int,
- salt: *const c_uchar,
- saltlen: c_int,
- iter: c_int,
- digest: *const EVP_MD,
- keylen: c_int,
- out: *mut u8,
- ) -> c_int;
-
- pub fn RAND_bytes(buf: *mut u8, num: c_int) -> c_int;
- pub fn RAND_status() -> c_int;
-
- pub fn RSA_new() -> *mut RSA;
- pub fn RSA_free(rsa: *mut RSA);
- pub fn RSA_generate_key_ex(
- rsa: *mut RSA,
- bits: c_int,
- e: *mut BIGNUM,
- cb: *mut BN_GENCB,
- ) -> c_int;
- pub fn RSA_private_decrypt(
- flen: c_int,
- from: *const u8,
- to: *mut u8,
- k: *mut RSA,
- pad: c_int,
- ) -> c_int;
- pub fn RSA_public_decrypt(
- flen: c_int,
- from: *const u8,
- to: *mut u8,
- k: *mut RSA,
- pad: c_int,
- ) -> c_int;
- pub fn RSA_private_encrypt(
- flen: c_int,
- from: *const u8,
- to: *mut u8,
- k: *mut RSA,
- pad: c_int,
- ) -> c_int;
- pub fn RSA_public_encrypt(
- flen: c_int,
- from: *const u8,
- to: *mut u8,
- k: *mut RSA,
- pad: c_int,
- ) -> c_int;
- pub fn RSA_sign(
- t: c_int,
- m: *const u8,
- mlen: c_uint,
- sig: *mut u8,
- siglen: *mut c_uint,
- k: *mut RSA,
- ) -> c_int;
- pub fn RSA_size(k: *const RSA) -> c_int;
- pub fn RSA_verify(
- t: c_int,
- m: *const u8,
- mlen: c_uint,
- sig: *const u8,
- siglen: c_uint,
- k: *mut RSA,
- ) -> c_int;
-
- pub fn DSA_new() -> *mut DSA;
- pub fn DSA_free(dsa: *mut DSA);
- pub fn DSA_size(dsa: *const DSA) -> c_int;
- pub fn DSA_generate_parameters_ex(
- dsa: *mut DSA,
- bits: c_int,
- seed: *const c_uchar,
- seed_len: c_int,
- counter_ref: *mut c_int,
- h_ret: *mut c_ulong,
- cb: *mut BN_GENCB,
- ) -> c_int;
- pub fn DSA_generate_key(dsa: *mut DSA) -> c_int;
- pub fn DSA_sign(
- dummy: c_int,
- dgst: *const c_uchar,
- len: c_int,
- sigret: *mut c_uchar,
- siglen: *mut c_uint,
- dsa: *mut DSA,
- ) -> c_int;
- pub fn DSA_verify(
- dummy: c_int,
- dgst: *const c_uchar,
- len: c_int,
- sigbuf: *const c_uchar,
- siglen: c_int,
- dsa: *mut DSA,
- ) -> c_int;
-
- pub fn SHA1(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
- pub fn SHA224(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
- pub fn SHA256(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
- pub fn SHA384(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
- pub fn SHA512(d: *const c_uchar, n: size_t, md: *mut c_uchar) -> *mut c_uchar;
-
- pub fn SHA1_Init(c: *mut SHA_CTX) -> c_int;
- pub fn SHA1_Update(c: *mut SHA_CTX, data: *const c_void, len: size_t) -> c_int;
- pub fn SHA1_Final(md: *mut c_uchar, c: *mut SHA_CTX) -> c_int;
- pub fn SHA256_Init(c: *mut SHA256_CTX) -> c_int;
- pub fn SHA256_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
- pub fn SHA256_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
- pub fn SHA224_Init(c: *mut SHA256_CTX) -> c_int;
- pub fn SHA224_Update(c: *mut SHA256_CTX, data: *const c_void, len: size_t) -> c_int;
- pub fn SHA224_Final(md: *mut c_uchar, c: *mut SHA256_CTX) -> c_int;
- pub fn SHA384_Init(c: *mut SHA512_CTX) -> c_int;
- pub fn SHA384_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
- pub fn SHA384_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
- pub fn SHA512_Init(c: *mut SHA512_CTX) -> c_int;
- pub fn SHA512_Update(c: *mut SHA512_CTX, data: *const c_void, len: size_t) -> c_int;
- pub fn SHA512_Final(md: *mut c_uchar, c: *mut SHA512_CTX) -> c_int;
-
- pub fn SSL_new(ctx: *mut SSL_CTX) -> *mut SSL;
- pub fn SSL_pending(ssl: *const SSL) -> c_int;
- pub fn SSL_free(ssl: *mut SSL);
- pub fn SSL_set_bio(ssl: *mut SSL, rbio: *mut BIO, wbio: *mut BIO);
- pub fn SSL_get_rbio(ssl: *const SSL) -> *mut BIO;
- pub fn SSL_get_wbio(ssl: *const SSL) -> *mut BIO;
- pub fn SSL_accept(ssl: *mut SSL) -> c_int;
- pub fn SSL_connect(ssl: *mut SSL) -> c_int;
- pub fn SSL_do_handshake(ssl: *mut SSL) -> c_int;
- pub fn SSL_ctrl(ssl: *mut SSL, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
- pub fn SSL_get_error(ssl: *const SSL, ret: c_int) -> c_int;
- pub fn SSL_read(ssl: *mut SSL, buf: *mut c_void, num: c_int) -> c_int;
- pub fn SSL_write(ssl: *mut SSL, buf: *const c_void, num: c_int) -> c_int;
- pub fn SSL_get_ex_data_X509_STORE_CTX_idx() -> c_int;
- pub fn SSL_get_SSL_CTX(ssl: *const SSL) -> *mut SSL_CTX;
- pub fn SSL_set_SSL_CTX(ssl: *mut SSL, ctx: *mut SSL_CTX) -> *mut SSL_CTX;
- #[cfg(not(any(osslconf = "OPENSSL_NO_COMP", libressl)))]
- pub fn SSL_get_current_compression(ssl: *mut SSL) -> *const COMP_METHOD;
- #[cfg(libressl)]
- pub fn SSL_get_current_compression(ssl: *mut SSL) -> *const libc::c_void;
- pub fn SSL_get_peer_certificate(ssl: *const SSL) -> *mut X509;
- pub fn SSL_get_peer_cert_chain(ssl: *const SSL) -> *mut stack_st_X509;
- pub fn SSL_get_ssl_method(ssl: *mut SSL) -> *const SSL_METHOD;
- pub fn SSL_get_version(ssl: *const SSL) -> *const c_char;
- pub fn SSL_state_string(ssl: *const SSL) -> *const c_char;
- pub fn SSL_state_string_long(ssl: *const SSL) -> *const c_char;
- pub fn SSL_set_verify(
- ssl: *mut SSL,
- mode: c_int,
- verify_callback: Option c_int>,
- );
- pub fn SSL_set_ex_data(ssl: *mut SSL, idx: c_int, data: *mut c_void) -> c_int;
- pub fn SSL_get_ex_data(ssl: *const SSL, idx: c_int) -> *mut c_void;
- pub fn SSL_get_servername(ssl: *const SSL, name_type: c_int) -> *const c_char;
- pub fn SSL_get_current_cipher(ssl: *const SSL) -> *const SSL_CIPHER;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn SSL_get0_param(ssl: *mut SSL) -> *mut X509_VERIFY_PARAM;
- pub fn SSL_get_verify_result(ssl: *const SSL) -> c_long;
- pub fn SSL_shutdown(ssl: *mut SSL) -> c_int;
- pub fn SSL_get_certificate(ssl: *const SSL) -> *mut X509;
- #[cfg(any(ossl101, libressl))]
- pub fn SSL_get_privatekey(ssl: *mut SSL) -> *mut EVP_PKEY;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn SSL_get_privatekey(ssl: *const SSL) -> *mut EVP_PKEY;
- pub fn SSL_load_client_CA_file(file: *const c_char) -> *mut stack_st_X509_NAME;
- pub fn SSL_set_tmp_dh_callback(
- ctx: *mut SSL,
- dh: unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
- );
-
- #[cfg(not(any(osslconf = "OPENSSL_NO_COMP", libressl)))]
- pub fn SSL_COMP_get_name(comp: *const COMP_METHOD) -> *const c_char;
- #[cfg(libressl)]
- pub fn SSL_COMP_get_name(comp: *const libc::c_void) -> *const c_char;
-
- pub fn SSL_CIPHER_get_name(cipher: *const SSL_CIPHER) -> *const c_char;
- pub fn SSL_CIPHER_get_bits(cipher: *const SSL_CIPHER, alg_bits: *mut c_int) -> c_int;
- pub fn SSL_CIPHER_description(
- cipher: *const SSL_CIPHER,
+pub use libc::*;
+
+#[cfg(feature = "unstable_boringssl")]
+extern crate bssl_sys;
+#[cfg(feature = "unstable_boringssl")]
+pub use bssl_sys::*;
+
+#[cfg(all(boringssl, not(feature = "unstable_boringssl")))]
+#[path = "."]
+mod boringssl {
+ include!(concat!(env!("OUT_DIR"), "/bindgen.rs"));
+
+ pub fn init() {
+ unsafe {
+ CRYPTO_library_init();
+ }
+ }
+}
+#[cfg(all(boringssl, not(feature = "unstable_boringssl")))]
+pub use boringssl::*;
+
+#[cfg(openssl)]
+#[path = "."]
+mod openssl {
+ use libc::*;
+
+ #[cfg(feature = "bindgen")]
+ include!(concat!(env!("OUT_DIR"), "/bindgen.rs"));
+
+ pub use self::aes::*;
+ pub use self::asn1::*;
+ pub use self::bio::*;
+ pub use self::bn::*;
+ pub use self::cms::*;
+ pub use self::crypto::*;
+ pub use self::dtls1::*;
+ pub use self::ec::*;
+ pub use self::err::*;
+ pub use self::evp::*;
+ #[cfg(not(feature = "bindgen"))]
+ pub use self::handwritten::*;
+ pub use self::obj_mac::*;
+ pub use self::ocsp::*;
+ pub use self::pem::*;
+ pub use self::pkcs7::*;
+ pub use self::rsa::*;
+ pub use self::sha::*;
+ pub use self::srtp::*;
+ pub use self::ssl::*;
+ pub use self::ssl3::*;
+ pub use self::tls1::*;
+ pub use self::types::*;
+ pub use self::x509::*;
+ pub use self::x509_vfy::*;
+ pub use self::x509v3::*;
+
+ #[macro_use]
+ mod macros;
+
+ mod aes;
+ mod asn1;
+ mod bio;
+ mod bn;
+ mod cms;
+ mod crypto;
+ mod dtls1;
+ mod ec;
+ mod err;
+ mod evp;
+ #[cfg(not(feature = "bindgen"))]
+ mod handwritten;
+ mod obj_mac;
+ mod ocsp;
+ mod pem;
+ mod pkcs7;
+ mod rsa;
+ mod sha;
+ mod srtp;
+ mod ssl;
+ mod ssl3;
+ mod tls1;
+ mod types;
+ mod x509;
+ mod x509_vfy;
+ mod x509v3;
+
+ use std::sync::Once;
+ // explicitly initialize to work around https://github.com/openssl/openssl/issues/3505
+ static INIT: Once = Once::new();
+
+ // FIXME remove
+ pub type PasswordCallback = unsafe extern "C" fn(
buf: *mut c_char,
size: c_int,
- ) -> *mut c_char;
-
- pub fn SSL_CTX_new(method: *const SSL_METHOD) -> *mut SSL_CTX;
- pub fn SSL_CTX_free(ctx: *mut SSL_CTX);
- pub fn SSL_CTX_ctrl(ctx: *mut SSL_CTX, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
- pub fn SSL_CTX_callback_ctrl(
- ctx: *mut SSL_CTX,
- cmd: c_int,
- fp: Option,
- ) -> c_long;
- pub fn SSL_CTX_set_verify(
- ctx: *mut SSL_CTX,
- mode: c_int,
- verify_callback: Option c_int>,
- );
- pub fn SSL_CTX_set_verify_depth(ctx: *mut SSL_CTX, depth: c_int);
- pub fn SSL_CTX_load_verify_locations(
- ctx: *mut SSL_CTX,
- CAfile: *const c_char,
- CApath: *const c_char,
- ) -> c_int;
- pub fn SSL_CTX_set_default_verify_paths(ctx: *mut SSL_CTX) -> c_int;
- pub fn SSL_CTX_set_ex_data(ctx: *mut SSL_CTX, idx: c_int, data: *mut c_void) -> c_int;
- pub fn SSL_CTX_get_ex_data(ctx: *const SSL_CTX, idx: c_int) -> *mut c_void;
- pub fn SSL_CTX_set_session_id_context(
- ssl: *mut SSL_CTX,
- sid_ctx: *const c_uchar,
- sid_ctx_len: c_uint,
- ) -> c_int;
-
- pub fn SSL_CTX_use_certificate_file(
- ctx: *mut SSL_CTX,
- cert_file: *const c_char,
- file_type: c_int,
- ) -> c_int;
- pub fn SSL_CTX_use_certificate_chain_file(
- ctx: *mut SSL_CTX,
- cert_chain_file: *const c_char,
- ) -> c_int;
- pub fn SSL_CTX_use_certificate(ctx: *mut SSL_CTX, cert: *mut X509) -> c_int;
-
- pub fn SSL_CTX_use_PrivateKey_file(
- ctx: *mut SSL_CTX,
- key_file: *const c_char,
- file_type: c_int,
- ) -> c_int;
- pub fn SSL_CTX_use_PrivateKey(ctx: *mut SSL_CTX, key: *mut EVP_PKEY) -> c_int;
- pub fn SSL_CTX_check_private_key(ctx: *const SSL_CTX) -> c_int;
- pub fn SSL_CTX_set_client_CA_list(ctx: *mut SSL_CTX, list: *mut stack_st_X509_NAME);
- pub fn SSL_CTX_get_cert_store(ctx: *const SSL_CTX) -> *mut X509_STORE;
- pub fn SSL_CTX_set_tmp_dh_callback(
- ctx: *mut SSL_CTX,
- dh: unsafe extern "C" fn(ssl: *mut SSL, is_export: c_int, keylength: c_int) -> *mut DH,
- );
-
- #[cfg(not(any(ossl101, libressl)))]
- pub fn SSL_CTX_get0_certificate(ctx: *const SSL_CTX) -> *mut X509;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn SSL_CTX_get0_privatekey(ctx: *const SSL_CTX) -> *mut EVP_PKEY;
-
- pub fn SSL_CTX_set_cipher_list(ssl: *mut SSL_CTX, s: *const c_char) -> c_int;
-
- pub fn SSL_CTX_set_next_protos_advertised_cb(
- ssl: *mut SSL_CTX,
- cb: extern "C" fn(ssl: *mut SSL,
- out: *mut *const c_uchar,
- outlen: *mut c_uint,
- arg: *mut c_void)
- -> c_int,
- arg: *mut c_void,
- );
- pub fn SSL_CTX_set_next_proto_select_cb(
- ssl: *mut SSL_CTX,
- cb: extern "C" fn(ssl: *mut SSL,
- out: *mut *mut c_uchar,
- outlen: *mut c_uchar,
- inbuf: *const c_uchar,
- inlen: c_uint,
- arg: *mut c_void)
- -> c_int,
- arg: *mut c_void,
- );
- #[cfg(not(osslconf = "OPENSSL_NO_PSK"))]
- pub fn SSL_CTX_set_psk_client_callback(
- ssl: *mut SSL_CTX,
- psk_client_cb: Option<
- extern "C" fn(*mut SSL,
- *const c_char,
- *mut c_char,
- c_uint,
- *mut c_uchar,
- c_uint)
- -> c_uint,
- >,
- );
- pub fn SSL_select_next_proto(
- out: *mut *mut c_uchar,
- outlen: *mut c_uchar,
- inbuf: *const c_uchar,
- inlen: c_uint,
- client: *const c_uchar,
- client_len: c_uint,
- ) -> c_int;
- pub fn SSL_get0_next_proto_negotiated(
- s: *const SSL,
- data: *mut *const c_uchar,
- len: *mut c_uint,
- );
- pub fn SSL_get_session(s: *const SSL) -> *mut SSL_SESSION;
- pub fn SSL_set_session(ssl: *mut SSL, session: *mut SSL_SESSION) -> c_int;
- #[cfg(not(any(ossl101, libressl, ossl110f)))]
- pub fn SSL_is_server(s: *mut SSL) -> c_int;
- #[cfg(ossl110f)]
- pub fn SSL_is_server(s: *const SSL) -> c_int;
-
- pub fn SSL_SESSION_free(s: *mut SSL_SESSION);
- pub fn SSL_SESSION_get_id(s: *const SSL_SESSION, len: *mut c_uint) -> *const c_uchar;
-
- #[cfg(not(ossl101))]
- pub fn SSL_CTX_set_alpn_protos(s: *mut SSL_CTX, data: *const c_uchar, len: c_uint) -> c_int;
-
- #[cfg(not(ossl101))]
- pub fn SSL_set_alpn_protos(s: *mut SSL, data: *const c_uchar, len: c_uint) -> c_int;
-
- #[cfg(not(ossl101))]
- pub fn SSL_CTX_set_alpn_select_cb(
- ssl: *mut SSL_CTX,
- cb: extern "C" fn(ssl: *mut SSL,
- out: *mut *const c_uchar,
- outlen: *mut c_uchar,
- inbuf: *const c_uchar,
- inlen: c_uint,
- arg: *mut c_void)
- -> c_int,
- arg: *mut c_void,
- );
- #[cfg(not(ossl101))]
- pub fn SSL_get0_alpn_selected(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint);
-
- pub fn X509_add_ext(x: *mut X509, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
- pub fn X509_digest(
- x: *const X509,
- digest: *const EVP_MD,
- buf: *mut c_uchar,
- len: *mut c_uint,
- ) -> c_int;
- pub fn X509_free(x: *mut X509);
- pub fn X509_REQ_free(x: *mut X509_REQ);
- pub fn X509_get_serialNumber(x: *mut X509) -> *mut ASN1_INTEGER;
- pub fn X509_gmtime_adj(time: *mut ASN1_TIME, adj: c_long) -> *mut ASN1_TIME;
- pub fn X509_new() -> *mut X509;
- pub fn X509_set_issuer_name(x: *mut X509, name: *mut X509_NAME) -> c_int;
- pub fn X509_set_subject_name(x: *mut X509, name: *mut X509_NAME) -> c_int;
- pub fn X509_set_serialNumber(x: *mut X509, sn: *mut ASN1_INTEGER) -> c_int;
- pub fn X509_set_version(x: *mut X509, version: c_long) -> c_int;
- pub fn X509_set_pubkey(x: *mut X509, pkey: *mut EVP_PKEY) -> c_int;
- pub fn X509_sign(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
- pub fn X509_get_pubkey(x: *mut X509) -> *mut EVP_PKEY;
- pub fn X509_to_X509_REQ(x: *mut X509, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> *mut X509_REQ;
- pub fn X509_verify_cert_error_string(n: c_long) -> *const c_char;
- pub fn X509_get1_ocsp(x: *mut X509) -> *mut stack_st_OPENSSL_STRING;
- pub fn X509_check_issued(issuer: *mut X509, subject: *mut X509) -> c_int;
-
- pub fn X509_ALGOR_free(x: *mut X509_ALGOR);
-
- pub fn X509_EXTENSION_free(ext: *mut X509_EXTENSION);
-
- pub fn X509_NAME_new() -> *mut X509_NAME;
- pub fn X509_NAME_free(x: *mut X509_NAME);
- pub fn X509_NAME_add_entry_by_txt(
- x: *mut X509_NAME,
- field: *const c_char,
- ty: c_int,
- bytes: *const c_uchar,
- len: c_int,
- loc: c_int,
- set: c_int,
- ) -> c_int;
- pub fn X509_NAME_get_index_by_NID(n: *mut X509_NAME, nid: c_int, last_pos: c_int) -> c_int;
-
- pub fn X509_NAME_ENTRY_free(x: *mut X509_NAME_ENTRY);
-
- pub fn ASN1_STRING_free(x: *mut ASN1_STRING);
- pub fn ASN1_STRING_length(x: *const ASN1_STRING) -> c_int;
-
- pub fn ASN1_INTEGER_free(x: *mut ASN1_INTEGER);
-
- pub fn X509_STORE_new() -> *mut X509_STORE;
- pub fn X509_STORE_free(store: *mut X509_STORE);
- pub fn X509_STORE_add_cert(store: *mut X509_STORE, x: *mut X509) -> c_int;
- pub fn X509_STORE_set_default_paths(store: *mut X509_STORE) -> c_int;
-
- pub fn X509_STORE_CTX_free(ctx: *mut X509_STORE_CTX);
- pub fn X509_STORE_CTX_get_current_cert(ctx: *mut X509_STORE_CTX) -> *mut X509;
- pub fn X509_STORE_CTX_get_error(ctx: *mut X509_STORE_CTX) -> c_int;
- pub fn X509_STORE_CTX_get_ex_data(ctx: *mut X509_STORE_CTX, idx: c_int) -> *mut c_void;
- pub fn X509_STORE_CTX_get_error_depth(ctx: *mut X509_STORE_CTX) -> c_int;
-
- pub fn X509V3_set_ctx(
- ctx: *mut X509V3_CTX,
- issuer: *mut X509,
- subject: *mut X509,
- req: *mut X509_REQ,
- crl: *mut X509_CRL,
- flags: c_int,
- );
- pub fn X509V3_set_nconf(ctx: *mut X509V3_CTX, conf: *mut CONF);
-
- pub fn X509_REQ_new() -> *mut X509_REQ;
- pub fn X509_REQ_set_version(req: *mut X509_REQ, version: c_long) -> c_int;
- pub fn X509_REQ_set_subject_name(req: *mut X509_REQ, name: *mut X509_NAME) -> c_int;
- pub fn X509_REQ_set_pubkey(req: *mut X509_REQ, pkey: *mut EVP_PKEY) -> c_int;
- pub fn X509_REQ_add_extensions(req: *mut X509_REQ, exts: *mut stack_st_X509_EXTENSION)
- -> c_int;
- pub fn X509_REQ_sign(x: *mut X509_REQ, pkey: *mut EVP_PKEY, md: *const EVP_MD) -> c_int;
-
- #[cfg(not(ossl101))]
- pub fn X509_VERIFY_PARAM_free(param: *mut X509_VERIFY_PARAM);
- #[cfg(not(any(ossl101, libressl)))]
- pub fn X509_VERIFY_PARAM_set_hostflags(param: *mut X509_VERIFY_PARAM, flags: c_uint);
- #[cfg(not(any(ossl101, libressl)))]
- pub fn X509_VERIFY_PARAM_set1_host(
- param: *mut X509_VERIFY_PARAM,
- name: *const c_char,
- namelen: size_t,
- ) -> c_int;
- #[cfg(not(any(ossl101, libressl)))]
- pub fn X509_VERIFY_PARAM_set1_ip(
- param: *mut X509_VERIFY_PARAM,
- ip: *const c_uchar,
- iplen: size_t,
- ) -> c_int;
-
- pub fn d2i_DHparams(k: *mut *mut DH, pp: *mut *const c_uchar, length: c_long) -> *mut DH;
- pub fn i2d_DHparams(dh: *const DH, pp: *mut *mut c_uchar) -> c_int;
-
- pub fn d2i_DSAPublicKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long) -> *mut DSA;
- pub fn i2d_DSAPublicKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
- pub fn d2i_DSAPrivateKey(a: *mut *mut DSA, pp: *mut *const c_uchar, length: c_long)
- -> *mut DSA;
- pub fn i2d_DSAPrivateKey(a: *const DSA, pp: *mut *mut c_uchar) -> c_int;
-
- pub fn d2i_ECPrivateKey(
- k: *mut *mut EC_KEY,
- pp: *mut *const c_uchar,
- length: c_long,
- ) -> *mut EC_KEY;
- pub fn i2d_ECPrivateKey(ec_key: *mut EC_KEY, pp: *mut *mut c_uchar) -> c_int;
-
- pub fn d2i_X509(a: *mut *mut X509, pp: *mut *const c_uchar, length: c_long) -> *mut X509;
- pub fn d2i_X509_REQ(
- a: *mut *mut X509_REQ,
- pp: *mut *const c_uchar,
- length: c_long,
- ) -> *mut X509_REQ;
- pub fn i2d_X509_bio(b: *mut BIO, x: *mut X509) -> c_int;
- pub fn i2d_X509(x: *mut X509, buf: *mut *mut u8) -> c_int;
- pub fn i2d_X509_REQ_bio(b: *mut BIO, x: *mut X509_REQ) -> c_int;
- pub fn i2d_X509_REQ(x: *mut X509_REQ, buf: *mut *mut u8) -> c_int;
-
- pub fn d2i_AutoPrivateKey(
- a: *mut *mut EVP_PKEY,
- pp: *mut *const c_uchar,
- length: c_long,
- ) -> *mut EVP_PKEY;
- pub fn d2i_PUBKEY(k: *mut *mut EVP_PKEY, buf: *mut *const u8, len: c_long) -> *mut EVP_PKEY;
- pub fn i2d_PUBKEY_bio(b: *mut BIO, x: *mut EVP_PKEY) -> c_int;
- pub fn i2d_PrivateKey_bio(b: *mut BIO, x: *mut EVP_PKEY) -> c_int;
- pub fn i2d_PUBKEY(k: *mut EVP_PKEY, buf: *mut *mut u8) -> c_int;
- pub fn i2d_PrivateKey(k: *mut EVP_PKEY, buf: *mut *mut u8) -> c_int;
-
- pub fn i2d_RSA_PUBKEY(k: *mut RSA, buf: *mut *mut u8) -> c_int;
- pub fn d2i_RSA_PUBKEY(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
- pub fn i2d_RSAPublicKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
- pub fn d2i_RSAPublicKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
- pub fn i2d_RSAPrivateKey(k: *const RSA, buf: *mut *mut u8) -> c_int;
- pub fn d2i_RSAPrivateKey(k: *mut *mut RSA, buf: *mut *const u8, len: c_long) -> *mut RSA;
-
- pub fn i2d_PKCS12_bio(b: *mut BIO, a: *mut PKCS12) -> c_int;
- pub fn i2d_PKCS12(a: *mut PKCS12, buf: *mut *mut u8) -> c_int;
- pub fn d2i_PKCS12(a: *mut *mut PKCS12, pp: *mut *const u8, length: c_long) -> *mut PKCS12;
- pub fn PKCS12_parse(
- p12: *mut PKCS12,
- pass: *const c_char,
- pkey: *mut *mut EVP_PKEY,
- cert: *mut *mut X509,
- ca: *mut *mut stack_st_X509,
- ) -> c_int;
- pub fn PKCS12_free(p12: *mut PKCS12);
-
- pub fn GENERAL_NAME_free(name: *mut GENERAL_NAME);
-
- pub fn HMAC_Init_ex(
- ctx: *mut HMAC_CTX,
- key: *const c_void,
- len: c_int,
- md: *const EVP_MD,
- impl_: *mut ENGINE,
+ rwflag: c_int,
+ user_data: *mut c_void,
) -> c_int;
- pub fn HMAC_Update(ctx: *mut HMAC_CTX, data: *const c_uchar, len: size_t) -> c_int;
- pub fn HMAC_Final(ctx: *mut HMAC_CTX, md: *mut c_uchar, len: *mut c_uint) -> c_int;
- #[cfg(not(libressl))]
- pub fn CMS_decrypt(
- cms: *mut CMS_ContentInfo,
- pkey: *mut EVP_PKEY,
- cert: *mut X509,
- dcont: *mut BIO,
- out: *mut BIO,
- flags: c_uint,
- ) -> c_int;
- #[cfg(not(libressl))]
- pub fn SMIME_read_CMS(bio: *mut BIO, bcont: *mut *mut BIO) -> *mut CMS_ContentInfo;
- #[cfg(not(libressl))]
- pub fn CMS_ContentInfo_free(cms: *mut CMS_ContentInfo);
-}
+ #[cfg(ossl110)]
+ pub fn init() {
+ use std::ptr;
+
+ #[cfg(not(ossl111b))]
+ let init_options = OPENSSL_INIT_LOAD_SSL_STRINGS;
+ #[cfg(ossl111b)]
+ let init_options = OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_NO_ATEXIT;
+
+ INIT.call_once(|| unsafe {
+ OPENSSL_init_ssl(init_options, ptr::null_mut());
+ })
+ }
+
+ #[cfg(not(ossl110))]
+ pub fn init() {
+ use std::io::{self, Write};
+ use std::mem;
+ use std::process;
+ use std::sync::{Mutex, MutexGuard};
+
+ static mut MUTEXES: *mut Vec> = 0 as *mut Vec>;
+ static mut GUARDS: *mut Vec