openssl::ssl::SSL_OP_ALL
+
+ [−]
+
+ [src]
+pub const SSL_OP_ALL: SslContextOptions=
$ BitFlags { +bits : $ value }
From 64106c4d3d4ddba8c7bc2af75376e6d3d3d75601 Mon Sep 17 00:00:00 2001 From: Date: Mon, 29 Jun 2015 20:16:15 +0000 Subject: Update documentation --- openssl/ssl/constant.SSL_OP_ALL.html | 102 +++++ ...t.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html | 102 +++++ .../constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html | 102 +++++ openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html | 102 +++++ openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html | 102 +++++ ...onstant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html | 102 +++++ .../ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html | 102 +++++ ...constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html | 102 +++++ ...nt.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_DTLSV1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html | 102 +++++ ..._OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_SSLV2.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_SSLV3.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TICKET.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html | 102 +++++ .../constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html | 102 +++++ openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html | 102 +++++ .../constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html | 102 +++++ .../ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html | 102 +++++ .../constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html | 104 +++++ openssl/ssl/constant.SSL_VERIFY_NONE.html | 103 +++++ openssl/ssl/constant.SSL_VERIFY_PEER.html | 103 +++++ openssl/ssl/enum.MaybeSslStream.html | 132 ++++++ openssl/ssl/enum.SslMethod.html | 120 ++++++ openssl/ssl/error/enum.OpensslError.html | 120 ++++++ openssl/ssl/error/enum.SslError.html | 119 ++++++ openssl/ssl/error/index.html | 121 ++++++ openssl/ssl/error/sidebar-items.js | 1 + openssl/ssl/index.html | 446 +++++++++++++++++++++ openssl/ssl/sidebar-items.js | 1 + openssl/ssl/struct.Ssl.html | 111 +++++ openssl/ssl/struct.SslContext.html | 135 +++++++ openssl/ssl/struct.SslContextOptions.html | 152 +++++++ openssl/ssl/struct.SslStream.html | 148 +++++++ openssl/ssl/struct.SslVerifyMode.html | 152 +++++++ openssl/ssl/type.VerifyCallback.html | 102 +++++ openssl/ssl/type.VerifyCallbackData.html | 103 +++++ 46 files changed, 5129 insertions(+) create mode 100644 openssl/ssl/constant.SSL_OP_ALL.html create mode 100644 openssl/ssl/constant.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html create mode 100644 openssl/ssl/constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html create mode 100644 openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html create mode 100644 openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html create mode 100644 openssl/ssl/constant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html create mode 100644 openssl/ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html create mode 100644 openssl/ssl/constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html create mode 100644 openssl/ssl/constant.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_DTLSV1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SSLV2.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SSLV3.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TICKET.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html create mode 100644 openssl/ssl/constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html create mode 100644 openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html create mode 100644 openssl/ssl/constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_NONE.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_PEER.html create mode 100644 openssl/ssl/enum.MaybeSslStream.html create mode 100644 openssl/ssl/enum.SslMethod.html create mode 100644 openssl/ssl/error/enum.OpensslError.html create mode 100644 openssl/ssl/error/enum.SslError.html create mode 100644 openssl/ssl/error/index.html create mode 100644 openssl/ssl/error/sidebar-items.js create mode 100644 openssl/ssl/index.html create mode 100644 openssl/ssl/sidebar-items.js create mode 100644 openssl/ssl/struct.Ssl.html create mode 100644 openssl/ssl/struct.SslContext.html create mode 100644 openssl/ssl/struct.SslContextOptions.html create mode 100644 openssl/ssl/struct.SslStream.html create mode 100644 openssl/ssl/struct.SslVerifyMode.html create mode 100644 openssl/ssl/type.VerifyCallback.html create mode 100644 openssl/ssl/type.VerifyCallbackData.html (limited to 'openssl/ssl') diff --git a/openssl/ssl/constant.SSL_OP_ALL.html b/openssl/ssl/constant.SSL_OP_ALL.html new file mode 100644 index 0000000..5bb062e --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_ALL.html @@ -0,0 +1,102 @@ + + +
+ + + + + + +pub const SSL_OP_ALL: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_CIPHER_SERVER_PREFERENCE: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_CISCO_ANYCONNECT: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_COOKIE_EXCHANGE: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_LEGACY_SERVER_CONNECT: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_COMPRESSION: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_DTLSV1: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_DTLSV1_2: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_QUERY_MTU: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_SSLV2: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_SSLV3: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_TICKET: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_TLSV1: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_TLSV1_1: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_NO_TLSV1_2: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_SAFARI_ECDHE_ECDSA_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_SINGLE_DH_USE: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_SINGLE_ECDH_USE: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_SSLEAY_080_CLIENT_DH_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_TLSEXT_PADDING: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_TLS_BLOCK_PADDING_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_TLS_D5_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_OP_TLS_ROLLBACK_BUG: SslContextOptions=
$ BitFlags { +bits : $ value }
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_VERIFY_FAIL_IF_NO_PEER_CERT: SslVerifyMode=
$ BitFlags { +bits : $ value }
/// Terminate handshake if client did not return a certificate. +/// Use together with SSL_VERIFY_PEER.
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_VERIFY_NONE: SslVerifyMode=
$ BitFlags { +bits : $ value }
/// Do not verify the server's certificate
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub const SSL_VERIFY_PEER: SslVerifyMode=
$ BitFlags { +bits : $ value }
/// Verify that the server's certificate is trusted
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub enum MaybeSslStream<S> where S: Read + Write {
+ Ssl(SslStream<S>),
+ Normal(S),
+}
A utility type to help in cases where the use of SSL is decided at runtime.
+Ssl | A connection using SSL + |
Normal | A connection not using SSL + |
impl<S> MaybeSslStream<S> where S: Read + Write
fn get_ref(&self) -> &S
Returns a reference to the underlying stream.
+fn get_mut(&mut self) -> &mut S
Returns a mutable reference to the underlying stream.
+ +It is inadvisable to read from or write to the underlying stream.
+impl<S> Read for MaybeSslStream<S> where S: Read + Write
fn read(&mut self, buf: &mut [u8]) -> Result<usize>
fn read_to_end(&mut self, buf: &mut Vec<u8>) -> Result<usize, Error>
fn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>
fn by_ref(&mut self) -> &mut Self
fn bytes(self) -> Bytes<Self>
fn chars(self) -> Chars<Self>
fn chain<R>(self, next: R) -> Chain<Self, R> where R: Read
fn take(self, limit: u64) -> Take<Self>
fn tee<W>(self, out: W) -> Tee<Self, W> where W: Write
impl<S> Write for MaybeSslStream<S> where S: Read + Write
fn write(&mut self, buf: &[u8]) -> Result<usize>
fn flush(&mut self) -> Result<()>
fn write_all(&mut self, buf: &[u8]) -> Result<(), Error>
fn write_fmt(&mut self, fmt: Arguments) -> Result<(), Error>
fn by_ref(&mut self) -> &mut Self
fn broadcast<W>(self, other: W) -> Broadcast<Self, W> where W: Write
impl<S: Debug> Debug for MaybeSslStream<S> where S: Read + Write, S: Debug, S: Debug
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub enum SslMethod { + Sslv23, + Sslv3, + Tlsv1, +}
Determines the SSL method supported
+Sslv23 | Support the SSLv2, SSLv3 and TLSv1 protocols. + |
Sslv3 | Only support the SSLv3 protocol. + |
Tlsv1 | Only support the TLSv1 protocol. + |
impl SslMethod
impl Eq for SslMethod
impl PartialEq for SslMethod
impl Hash for SslMethod
fn hash<__H: Hasher>(&self, __arg_0: &mut __H)
fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher
impl Debug for SslMethod
impl Clone for SslMethod
fn clone(&self) -> SslMethod
fn clone_from(&mut self, source: &Self)
impl Copy for SslMethod
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub enum OpensslError { + UnknownError { + library: String, + function: String, + reason: String, + }, +}
An error from the OpenSSL library
+UnknownError | An unknown error +Fields+ +
|
impl Eq for OpensslError
impl PartialEq for OpensslError
fn eq(&self, __arg_0: &OpensslError) -> bool
fn ne(&self, __arg_0: &OpensslError) -> bool
impl Clone for OpensslError
fn clone(&self) -> OpensslError
fn clone_from(&mut self, source: &Self)
impl Debug for OpensslError
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub enum SslError { + StreamError(Error), + SslSessionClosed, + OpenSslErrors(Vec<OpensslError>), +}
An SSL error
+StreamError | The underlying stream reported an error + |
SslSessionClosed | The SSL session has been closed by the other end + |
OpenSslErrors | An error in the OpenSSL library + |
impl SslError
fn get() -> SslError
Creates a new OpenSslErrors
with the current contents of the error
+stack.
fn from_error(err: c_ulong) -> SslError
Creates an SslError
from the raw numeric error code.
impl Display for SslError
impl Error for SslError
fn description(&self) -> &str
fn cause(&self) -> Option<&Error>
impl Debug for SslError
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub use self::SslError::*; |
pub use self::OpensslError::*; |
OpensslError | +
+ An error from the OpenSSL library + + |
+
SslError | +
+ An SSL error + + |
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
error | ++ + | +
Ssl | ++ + | +
SslContext | +
+ An SSL context object + + |
+
SslContextOptions | ++ + | +
SslStream | +
+ A stream wrapper which handles SSL encryption for an underlying stream. + + |
+
SslVerifyMode | ++ + | +
MaybeSslStream | +
+ A utility type to help in cases where the use of SSL is decided at runtime. + + |
+
SslMethod | +
+ Determines the SSL method supported + + |
+
VerifyCallback | +
+ The signature of functions that can be used to manually verify certificates + + |
+
VerifyCallbackData | +
+ The signature of functions that can be used to manually verify certificates +when user-data should be carried for all verification process + + |
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub struct Ssl { + // some fields omitted +}
impl Ssl
fn new(ctx: &SslContext) -> Result<Ssl, SslError>
fn set_hostname(&self, hostname: &str) -> Result<(), SslError>
Set the host name to be used with SNI (Server Name Indication).
+fn get_peer_certificate(&self) -> Option<X509>
fn pending(&self) -> usize
pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
+impl Send for Ssl
impl Sync for Ssl
impl Debug for Ssl
impl Drop for Ssl
fn drop(&mut self)
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub struct SslContext { + // some fields omitted +}
An SSL context object
+impl SslContext
fn new(method: SslMethod) -> Result<SslContext, SslError>
Creates a new SSL context.
+fn set_verify(&mut self, mode: SslVerifyMode, verify: Option<VerifyCallback>)
Configures the certificate verification method for new connections.
+fn set_verify_with_data<T>(&mut self, mode: SslVerifyMode, verify: VerifyCallbackData<T>, data: T) where T: Any + 'static
Configures the certificate verification method for new connections also +carrying supplied data.
+fn set_verify_depth(&mut self, depth: u32)
Sets verification depth
+fn set_read_ahead(&self, m: u32)
fn set_CA_file<P: AsRef<Path>>(&mut self, file: P) -> Result<(), SslError>
Specifies the file that contains trusted CA certificates.
+fn set_certificate_file<P: AsRef<Path>>(&mut self, file: P, file_type: X509FileType) -> Result<(), SslError>
Specifies the file that contains certificate
+fn set_certificate(&mut self, cert: &X509) -> Result<(), SslError>
Specifies the certificate
+fn add_extra_chain_cert(&mut self, cert: &X509) -> Result<(), SslError>
Adds a certificate to the certificate chain presented together with the +certificate specified using set_certificate()
+fn set_private_key_file<P: AsRef<Path>>(&mut self, file: P, file_type: X509FileType) -> Result<(), SslError>
Specifies the file that contains private key
+fn set_private_key(&mut self, key: &PKey) -> Result<(), SslError>
Specifies the private key
+fn check_private_key(&mut self) -> Result<(), SslError>
Check consistency of private key and certificate
+fn set_cipher_list(&mut self, cipher_list: &str) -> Result<(), SslError>
fn set_options(&mut self, option: SslContextOptions) -> SslContextOptions
fn get_options(&mut self) -> SslContextOptions
fn clear_options(&mut self, option: SslContextOptions) -> SslContextOptions
impl Send for SslContext
impl Sync for SslContext
impl Debug for SslContext
impl Drop for SslContext
fn drop(&mut self)
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub struct SslContextOptions { + // some fields omitted +}
impl SslContextOptions
fn empty() -> SslContextOptions
Returns an empty set of flags.
+fn all() -> SslContextOptions
Returns the set containing all flags.
+fn bits(&self) -> c_long
Returns the raw value of the flags currently stored.
+fn from_bits(bits: c_long) -> Option<SslContextOptions>
Convert from underlying bit representation, unless that +representation contains bits that do not correspond to a flag.
+fn from_bits_truncate(bits: c_long) -> SslContextOptions
Convert from underlying bit representation, dropping any bits +that do not correspond to flags.
+fn is_empty(&self) -> bool
Returns true
if no flags are currently stored.
fn is_all(&self) -> bool
Returns true
if all flags are currently set.
fn intersects(&self, other: SslContextOptions) -> bool
Returns true
if there are flags common to both self
and other
.
fn contains(&self, other: SslContextOptions) -> bool
Returns true
all of the flags in other
are contained within self
.
fn insert(&mut self, other: SslContextOptions)
Inserts the specified flags in-place.
+fn remove(&mut self, other: SslContextOptions)
Removes the specified flags in-place.
+fn toggle(&mut self, other: SslContextOptions)
Toggles the specified flags in-place.
+impl Debug for SslContextOptions
impl BitOr for SslContextOptions
type Output = SslContextOptions
fn bitor(self, other: SslContextOptions) -> SslContextOptions
impl BitXor for SslContextOptions
type Output = SslContextOptions
fn bitxor(self, other: SslContextOptions) -> SslContextOptions
impl BitAnd for SslContextOptions
type Output = SslContextOptions
fn bitand(self, other: SslContextOptions) -> SslContextOptions
impl Sub for SslContextOptions
type Output = SslContextOptions
fn sub(self, other: SslContextOptions) -> SslContextOptions
impl Not for SslContextOptions
type Output = SslContextOptions
fn not(self) -> SslContextOptions
impl Hash for SslContextOptions
fn hash<__H: Hasher>(&self, __arg_0: &mut __H)
fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher
impl Ord for SslContextOptions
fn cmp(&self, __arg_0: &SslContextOptions) -> Ordering
impl PartialOrd for SslContextOptions
fn partial_cmp(&self, __arg_0: &SslContextOptions) -> Option<Ordering>
fn lt(&self, __arg_0: &SslContextOptions) -> bool
fn le(&self, __arg_0: &SslContextOptions) -> bool
fn gt(&self, __arg_0: &SslContextOptions) -> bool
fn ge(&self, __arg_0: &SslContextOptions) -> bool
impl Clone for SslContextOptions
fn clone(&self) -> SslContextOptions
fn clone_from(&mut self, source: &Self)
impl Eq for SslContextOptions
impl PartialEq for SslContextOptions
fn eq(&self, __arg_0: &SslContextOptions) -> bool
fn ne(&self, __arg_0: &SslContextOptions) -> bool
impl Copy for SslContextOptions
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub struct SslStream<S> { + // some fields omitted +}
A stream wrapper which handles SSL encryption for an underlying stream.
+impl SslStream<TcpStream>
fn try_clone(&self) -> Result<SslStream<TcpStream>>
Create a new independently owned handle to the underlying socket.
+impl<S: Read + Write> SslStream<S>
fn new_server_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError>
fn new_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError>
Attempts to create a new SSL stream from a given Ssl
instance.
fn new(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError>
Creates a new SSL stream
+fn new_server(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError>
Creates a new SSL server stream
+fn get_ref(&self) -> &S
Returns a reference to the underlying stream.
+fn get_peer_certificate(&self) -> Option<X509>
Return the certificate of the peer
+fn get_mut(&mut self) -> &mut S
Returns a mutable reference to the underlying stream.
+ +It is inadvisable to read from or write to the underlying stream as it +will most likely desynchronize the SSL session.
+fn get_compression(&self) -> Option<String>
Get the compression currently in use. The result will be +either None, indicating no compression is in use, or a string +with the compression name.
+fn pending(&self) -> usize
pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
+impl<S> Debug for SslStream<S> where S: Debug
impl<S: Read + Write> Read for SslStream<S>
fn read(&mut self, buf: &mut [u8]) -> Result<usize>
fn read_to_end(&mut self, buf: &mut Vec<u8>) -> Result<usize, Error>
fn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>
fn by_ref(&mut self) -> &mut Self
fn bytes(self) -> Bytes<Self>
fn chars(self) -> Chars<Self>
fn chain<R>(self, next: R) -> Chain<Self, R> where R: Read
fn take(self, limit: u64) -> Take<Self>
fn tee<W>(self, out: W) -> Tee<Self, W> where W: Write
impl<S: Read + Write> Write for SslStream<S>
fn write(&mut self, buf: &[u8]) -> Result<usize>
fn flush(&mut self) -> Result<()>
fn write_all(&mut self, buf: &[u8]) -> Result<(), Error>
fn write_fmt(&mut self, fmt: Arguments) -> Result<(), Error>
fn by_ref(&mut self) -> &mut Self
fn broadcast<W>(self, other: W) -> Broadcast<Self, W> where W: Write
impl<S: Clone> Clone for SslStream<S> where S: Clone
fn clone(&self) -> SslStream<S>
fn clone_from(&mut self, source: &Self)
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
pub struct SslVerifyMode { + // some fields omitted +}
impl SslVerifyMode
fn empty() -> SslVerifyMode
Returns an empty set of flags.
+fn all() -> SslVerifyMode
Returns the set containing all flags.
+fn bits(&self) -> i32
Returns the raw value of the flags currently stored.
+fn from_bits(bits: i32) -> Option<SslVerifyMode>
Convert from underlying bit representation, unless that +representation contains bits that do not correspond to a flag.
+fn from_bits_truncate(bits: i32) -> SslVerifyMode
Convert from underlying bit representation, dropping any bits +that do not correspond to flags.
+fn is_empty(&self) -> bool
Returns true
if no flags are currently stored.
fn is_all(&self) -> bool
Returns true
if all flags are currently set.
fn intersects(&self, other: SslVerifyMode) -> bool
Returns true
if there are flags common to both self
and other
.
fn contains(&self, other: SslVerifyMode) -> bool
Returns true
all of the flags in other
are contained within self
.
fn insert(&mut self, other: SslVerifyMode)
Inserts the specified flags in-place.
+fn remove(&mut self, other: SslVerifyMode)
Removes the specified flags in-place.
+fn toggle(&mut self, other: SslVerifyMode)
Toggles the specified flags in-place.
+impl Debug for SslVerifyMode
impl BitOr for SslVerifyMode
type Output = SslVerifyMode
fn bitor(self, other: SslVerifyMode) -> SslVerifyMode
impl BitXor for SslVerifyMode
type Output = SslVerifyMode
fn bitxor(self, other: SslVerifyMode) -> SslVerifyMode
impl BitAnd for SslVerifyMode
type Output = SslVerifyMode
fn bitand(self, other: SslVerifyMode) -> SslVerifyMode
impl Sub for SslVerifyMode
type Output = SslVerifyMode
fn sub(self, other: SslVerifyMode) -> SslVerifyMode
impl Not for SslVerifyMode
type Output = SslVerifyMode
fn not(self) -> SslVerifyMode
impl Hash for SslVerifyMode
fn hash<__H: Hasher>(&self, __arg_0: &mut __H)
fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher
impl Ord for SslVerifyMode
fn cmp(&self, __arg_0: &SslVerifyMode) -> Ordering
impl PartialOrd for SslVerifyMode
fn partial_cmp(&self, __arg_0: &SslVerifyMode) -> Option<Ordering>
fn lt(&self, __arg_0: &SslVerifyMode) -> bool
fn le(&self, __arg_0: &SslVerifyMode) -> bool
fn gt(&self, __arg_0: &SslVerifyMode) -> bool
fn ge(&self, __arg_0: &SslVerifyMode) -> bool
impl Clone for SslVerifyMode
fn clone(&self) -> SslVerifyMode
fn clone_from(&mut self, source: &Self)
impl Eq for SslVerifyMode
impl PartialEq for SslVerifyMode
fn eq(&self, __arg_0: &SslVerifyMode) -> bool
fn ne(&self, __arg_0: &SslVerifyMode) -> bool
impl Copy for SslVerifyMode
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
type VerifyCallback = fn(preverify_ok: bool, x509_ctx: &X509StoreContext) -> bool;
The signature of functions that can be used to manually verify certificates
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+
type VerifyCallbackData<T> = fn(preverify_ok: bool, x509_ctx: &X509StoreContext, data: &T) -> bool;
The signature of functions that can be used to manually verify certificates +when user-data should be carried for all verification process
+
+ Prefix searches with a type followed by a colon (e.g.
+ fn:
) to restrict the search to a given type.
+
+ Accepted types are: fn
, mod
,
+ struct
, enum
,
+ trait
, typedef
(or
+ tdef
).
+
+ Search functions by type signature (e.g.
+ vec -> usize
)
+