From 64106c4d3d4ddba8c7bc2af75376e6d3d3d75601 Mon Sep 17 00:00:00 2001 From: Date: Mon, 29 Jun 2015 20:16:15 +0000 Subject: Update documentation --- openssl/ssl/constant.SSL_OP_ALL.html | 102 +++++ ...t.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html | 102 +++++ .../constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html | 102 +++++ openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html | 102 +++++ openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html | 102 +++++ ...onstant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html | 102 +++++ .../ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html | 102 +++++ ...constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html | 102 +++++ ...nt.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_DTLSV1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html | 102 +++++ ..._OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_SSLV2.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_SSLV3.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TICKET.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html | 102 +++++ openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html | 102 +++++ .../constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html | 102 +++++ openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html | 102 +++++ .../constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html | 102 +++++ .../ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html | 102 +++++ openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html | 102 +++++ .../constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html | 104 +++++ openssl/ssl/constant.SSL_VERIFY_NONE.html | 103 +++++ openssl/ssl/constant.SSL_VERIFY_PEER.html | 103 +++++ openssl/ssl/enum.MaybeSslStream.html | 132 ++++++ openssl/ssl/enum.SslMethod.html | 120 ++++++ openssl/ssl/error/enum.OpensslError.html | 120 ++++++ openssl/ssl/error/enum.SslError.html | 119 ++++++ openssl/ssl/error/index.html | 121 ++++++ openssl/ssl/error/sidebar-items.js | 1 + openssl/ssl/index.html | 446 +++++++++++++++++++++ openssl/ssl/sidebar-items.js | 1 + openssl/ssl/struct.Ssl.html | 111 +++++ openssl/ssl/struct.SslContext.html | 135 +++++++ openssl/ssl/struct.SslContextOptions.html | 152 +++++++ openssl/ssl/struct.SslStream.html | 148 +++++++ openssl/ssl/struct.SslVerifyMode.html | 152 +++++++ openssl/ssl/type.VerifyCallback.html | 102 +++++ openssl/ssl/type.VerifyCallbackData.html | 103 +++++ 46 files changed, 5129 insertions(+) create mode 100644 openssl/ssl/constant.SSL_OP_ALL.html create mode 100644 openssl/ssl/constant.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html create mode 100644 openssl/ssl/constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html create mode 100644 openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html create mode 100644 openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html create mode 100644 openssl/ssl/constant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html create mode 100644 openssl/ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html create mode 100644 openssl/ssl/constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html create mode 100644 openssl/ssl/constant.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_DTLSV1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SSLV2.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_SSLV3.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TICKET.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html create mode 100644 openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html create mode 100644 openssl/ssl/constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html create mode 100644 openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html create mode 100644 openssl/ssl/constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html create mode 100644 openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_NONE.html create mode 100644 openssl/ssl/constant.SSL_VERIFY_PEER.html create mode 100644 openssl/ssl/enum.MaybeSslStream.html create mode 100644 openssl/ssl/enum.SslMethod.html create mode 100644 openssl/ssl/error/enum.OpensslError.html create mode 100644 openssl/ssl/error/enum.SslError.html create mode 100644 openssl/ssl/error/index.html create mode 100644 openssl/ssl/error/sidebar-items.js create mode 100644 openssl/ssl/index.html create mode 100644 openssl/ssl/sidebar-items.js create mode 100644 openssl/ssl/struct.Ssl.html create mode 100644 openssl/ssl/struct.SslContext.html create mode 100644 openssl/ssl/struct.SslContextOptions.html create mode 100644 openssl/ssl/struct.SslStream.html create mode 100644 openssl/ssl/struct.SslVerifyMode.html create mode 100644 openssl/ssl/type.VerifyCallback.html create mode 100644 openssl/ssl/type.VerifyCallbackData.html (limited to 'openssl/ssl') diff --git a/openssl/ssl/constant.SSL_OP_ALL.html b/openssl/ssl/constant.SSL_OP_ALL.html new file mode 100644 index 0000000..5bb062e --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_ALL.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_ALL - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_ALL + + [] + + [src]

+
pub const SSL_OP_ALL: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html b/openssl/ssl/constant.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html new file mode 100644 index 0000000..cd923aa --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION + + [] + + [src]

+
pub const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html b/openssl/ssl/constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html new file mode 100644 index 0000000..439abc3 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_CIPHER_SERVER_PREFERENCE.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_CIPHER_SERVER_PREFERENCE - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_CIPHER_SERVER_PREFERENCE + + [] + + [src]

+
pub const SSL_OP_CIPHER_SERVER_PREFERENCE: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html b/openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html new file mode 100644 index 0000000..615de9e --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_CISCO_ANYCONNECT.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_CISCO_ANYCONNECT - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_CISCO_ANYCONNECT + + [] + + [src]

+
pub const SSL_OP_CISCO_ANYCONNECT: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html b/openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html new file mode 100644 index 0000000..1bcedb6 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_COOKIE_EXCHANGE.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_COOKIE_EXCHANGE - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_COOKIE_EXCHANGE + + [] + + [src]

+
pub const SSL_OP_COOKIE_EXCHANGE: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html b/openssl/ssl/constant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html new file mode 100644 index 0000000..6abbc71 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS + + [] + + [src]

+
pub const SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html b/openssl/ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html new file mode 100644 index 0000000..b694d40 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_LEGACY_SERVER_CONNECT.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_LEGACY_SERVER_CONNECT - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_LEGACY_SERVER_CONNECT + + [] + + [src]

+
pub const SSL_OP_LEGACY_SERVER_CONNECT: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html b/openssl/ssl/constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html new file mode 100644 index 0000000..47e8c28 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER + + [] + + [src]

+
pub const SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html b/openssl/ssl/constant.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html new file mode 100644 index 0000000..a21f6ed --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG + + [] + + [src]

+
pub const SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html b/openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html new file mode 100644 index 0000000..67840db --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_COMPRESSION.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_COMPRESSION - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_COMPRESSION + + [] + + [src]

+
pub const SSL_OP_NO_COMPRESSION: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_DTLSV1.html b/openssl/ssl/constant.SSL_OP_NO_DTLSV1.html new file mode 100644 index 0000000..b2ead0f --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_DTLSV1.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_DTLSV1 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_DTLSV1 + + [] + + [src]

+
pub const SSL_OP_NO_DTLSV1: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html b/openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html new file mode 100644 index 0000000..2639181 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_DTLSV1_2.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_DTLSV1_2 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_DTLSV1_2 + + [] + + [src]

+
pub const SSL_OP_NO_DTLSV1_2: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html b/openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html new file mode 100644 index 0000000..95390fd --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_QUERY_MTU.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_QUERY_MTU - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_QUERY_MTU + + [] + + [src]

+
pub const SSL_OP_NO_QUERY_MTU: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html b/openssl/ssl/constant.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html new file mode 100644 index 0000000..b4a912d --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION + + [] + + [src]

+
pub const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_SSLV2.html b/openssl/ssl/constant.SSL_OP_NO_SSLV2.html new file mode 100644 index 0000000..cada27f --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_SSLV2.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_SSLV2 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_SSLV2 + + [] + + [src]

+
pub const SSL_OP_NO_SSLV2: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_SSLV3.html b/openssl/ssl/constant.SSL_OP_NO_SSLV3.html new file mode 100644 index 0000000..e9b1153 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_SSLV3.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_SSLV3 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_SSLV3 + + [] + + [src]

+
pub const SSL_OP_NO_SSLV3: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_TICKET.html b/openssl/ssl/constant.SSL_OP_NO_TICKET.html new file mode 100644 index 0000000..c38cbed --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_TICKET.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_TICKET - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_TICKET + + [] + + [src]

+
pub const SSL_OP_NO_TICKET: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_TLSV1.html b/openssl/ssl/constant.SSL_OP_NO_TLSV1.html new file mode 100644 index 0000000..9dea3f5 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_TLSV1.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_TLSV1 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_TLSV1 + + [] + + [src]

+
pub const SSL_OP_NO_TLSV1: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html b/openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html new file mode 100644 index 0000000..c1b9b93 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_TLSV1_1.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_TLSV1_1 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_TLSV1_1 + + [] + + [src]

+
pub const SSL_OP_NO_TLSV1_1: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html b/openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html new file mode 100644 index 0000000..d6b8e82 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_NO_TLSV1_2.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_NO_TLSV1_2 - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_NO_TLSV1_2 + + [] + + [src]

+
pub const SSL_OP_NO_TLSV1_2: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html b/openssl/ssl/constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html new file mode 100644 index 0000000..3412de8 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_SAFARI_ECDHE_ECDSA_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_SAFARI_ECDHE_ECDSA_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_SAFARI_ECDHE_ECDSA_BUG + + [] + + [src]

+
pub const SSL_OP_SAFARI_ECDHE_ECDSA_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html b/openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html new file mode 100644 index 0000000..9df82e2 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_SINGLE_DH_USE.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_SINGLE_DH_USE - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_SINGLE_DH_USE + + [] + + [src]

+
pub const SSL_OP_SINGLE_DH_USE: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html b/openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html new file mode 100644 index 0000000..9793849 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_SINGLE_ECDH_USE.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_SINGLE_ECDH_USE - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_SINGLE_ECDH_USE + + [] + + [src]

+
pub const SSL_OP_SINGLE_ECDH_USE: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html b/openssl/ssl/constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html new file mode 100644 index 0000000..763807e --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_SSLEAY_080_CLIENT_DH_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_SSLEAY_080_CLIENT_DH_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_SSLEAY_080_CLIENT_DH_BUG + + [] + + [src]

+
pub const SSL_OP_SSLEAY_080_CLIENT_DH_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html b/openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html new file mode 100644 index 0000000..47efeee --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_TLSEXT_PADDING.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_TLSEXT_PADDING - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_TLSEXT_PADDING + + [] + + [src]

+
pub const SSL_OP_TLSEXT_PADDING: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html b/openssl/ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html new file mode 100644 index 0000000..ea5aad5 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_TLS_BLOCK_PADDING_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_TLS_BLOCK_PADDING_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_TLS_BLOCK_PADDING_BUG + + [] + + [src]

+
pub const SSL_OP_TLS_BLOCK_PADDING_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html b/openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html new file mode 100644 index 0000000..6a1a359 --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_TLS_D5_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_TLS_D5_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_TLS_D5_BUG + + [] + + [src]

+
pub const SSL_OP_TLS_D5_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html b/openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html new file mode 100644 index 0000000..a2d167f --- /dev/null +++ b/openssl/ssl/constant.SSL_OP_TLS_ROLLBACK_BUG.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::SSL_OP_TLS_ROLLBACK_BUG - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_OP_TLS_ROLLBACK_BUG + + [] + + [src]

+
pub const SSL_OP_TLS_ROLLBACK_BUG: SslContextOptions = $ BitFlags {
+bits : $ value }
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html b/openssl/ssl/constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html new file mode 100644 index 0000000..ca0849d --- /dev/null +++ b/openssl/ssl/constant.SSL_VERIFY_FAIL_IF_NO_PEER_CERT.html @@ -0,0 +1,104 @@ + + + + + + + + + + openssl::ssl::SSL_VERIFY_FAIL_IF_NO_PEER_CERT - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_VERIFY_FAIL_IF_NO_PEER_CERT + + [] + + [src]

+
pub const SSL_VERIFY_FAIL_IF_NO_PEER_CERT: SslVerifyMode = $ BitFlags {
+bits : $ value }

/// Terminate handshake if client did not return a certificate. +/// Use together with SSL_VERIFY_PEER.

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_VERIFY_NONE.html b/openssl/ssl/constant.SSL_VERIFY_NONE.html new file mode 100644 index 0000000..681942f --- /dev/null +++ b/openssl/ssl/constant.SSL_VERIFY_NONE.html @@ -0,0 +1,103 @@ + + + + + + + + + + openssl::ssl::SSL_VERIFY_NONE - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_VERIFY_NONE + + [] + + [src]

+
pub const SSL_VERIFY_NONE: SslVerifyMode = $ BitFlags {
+bits : $ value }

/// Do not verify the server's certificate

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/constant.SSL_VERIFY_PEER.html b/openssl/ssl/constant.SSL_VERIFY_PEER.html new file mode 100644 index 0000000..8dfc675 --- /dev/null +++ b/openssl/ssl/constant.SSL_VERIFY_PEER.html @@ -0,0 +1,103 @@ + + + + + + + + + + openssl::ssl::SSL_VERIFY_PEER - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::SSL_VERIFY_PEER + + [] + + [src]

+
pub const SSL_VERIFY_PEER: SslVerifyMode = $ BitFlags {
+bits : $ value }

/// Verify that the server's certificate is trusted

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/enum.MaybeSslStream.html b/openssl/ssl/enum.MaybeSslStream.html new file mode 100644 index 0000000..99719a1 --- /dev/null +++ b/openssl/ssl/enum.MaybeSslStream.html @@ -0,0 +1,132 @@ + + + + + + + + + + openssl::ssl::MaybeSslStream - Rust + + + + + + + + + + + + + + + +
+

Enum openssl::ssl::MaybeSslStream + + [] + + [src]

+
pub enum MaybeSslStream<S> where S: Read + Write {
+    Ssl(SslStream<S>),
+    Normal(S),
+}

A utility type to help in cases where the use of SSL is decided at runtime.

+

Variants

+
Ssl

A connection using SSL

+
Normal

A connection not using SSL

+

Methods

impl<S> MaybeSslStream<S> where S: Read + Write

fn get_ref(&self) -> &S

+

Returns a reference to the underlying stream.

+

fn get_mut(&mut self) -> &mut S

+

Returns a mutable reference to the underlying stream.

+ +

Warning

+

It is inadvisable to read from or write to the underlying stream.

+

Trait Implementations

impl<S> Read for MaybeSslStream<S> where S: Read + Write

fn read(&mut self, buf: &mut [u8]) -> Result<usize>

+

fn read_to_end(&mut self, buf: &mut Vec<u8>) -> Result<usize, Error>

+

fn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>

+

fn by_ref(&mut self) -> &mut Self

+

fn bytes(self) -> Bytes<Self>

+

fn chars(self) -> Chars<Self>

+

fn chain<R>(self, next: R) -> Chain<Self, R> where R: Read

+

fn take(self, limit: u64) -> Take<Self>

+

fn tee<W>(self, out: W) -> Tee<Self, W> where W: Write

+

impl<S> Write for MaybeSslStream<S> where S: Read + Write

fn write(&mut self, buf: &[u8]) -> Result<usize>

+

fn flush(&mut self) -> Result<()>

+

fn write_all(&mut self, buf: &[u8]) -> Result<(), Error>

+

fn write_fmt(&mut self, fmt: Arguments) -> Result<(), Error>

+

fn by_ref(&mut self) -> &mut Self

+

fn broadcast<W>(self, other: W) -> Broadcast<Self, W> where W: Write

+

Derived Implementations

impl<S: Debug> Debug for MaybeSslStream<S> where S: Read + Write, S: Debug, S: Debug

fn fmt(&self, __arg_0: &mut Formatter) -> Result

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/enum.SslMethod.html b/openssl/ssl/enum.SslMethod.html new file mode 100644 index 0000000..941eac8 --- /dev/null +++ b/openssl/ssl/enum.SslMethod.html @@ -0,0 +1,120 @@ + + + + + + + + + + openssl::ssl::SslMethod - Rust + + + + + + + + + + + + + + + +
+

Enum openssl::ssl::SslMethod + + [] + + [src]

+
pub enum SslMethod {
+    Sslv23,
+    Sslv3,
+    Tlsv1,
+}

Determines the SSL method supported

+

Variants

+
Sslv23

Support the SSLv2, SSLv3 and TLSv1 protocols.

+
Sslv3

Only support the SSLv3 protocol.

+
Tlsv1

Only support the TLSv1 protocol.

+

Methods

impl SslMethod

fn is_dtls(&self) -> bool

+

fn is_dtlsv1(&self) -> bool

+

fn is_dtlsv1_2(&self) -> bool

+

Trait Implementations

Derived Implementations

impl Eq for SslMethod

impl PartialEq for SslMethod

fn eq(&self, __arg_0: &SslMethod) -> bool

+

fn ne(&self, __arg_0: &SslMethod) -> bool

+

impl Hash for SslMethod

fn hash<__H: Hasher>(&self, __arg_0: &mut __H)

+

fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher

+

impl Debug for SslMethod

fn fmt(&self, __arg_0: &mut Formatter) -> Result

+

impl Clone for SslMethod

fn clone(&self) -> SslMethod

+

fn clone_from(&mut self, source: &Self)

+

impl Copy for SslMethod

+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/error/enum.OpensslError.html b/openssl/ssl/error/enum.OpensslError.html new file mode 100644 index 0000000..ea81de3 --- /dev/null +++ b/openssl/ssl/error/enum.OpensslError.html @@ -0,0 +1,120 @@ + + + + + + + + + + openssl::ssl::error::OpensslError - Rust + + + + + + + + + + + + + + + +
+

Enum openssl::ssl::error::OpensslError + + [] + + [src]

+
pub enum OpensslError {
+    UnknownError {
+        library: String,
+        function: String,
+        reason: String,
+    },
+}

An error from the OpenSSL library

+

Variants

+
UnknownError

An unknown error

+

Fields

+ +
library

The library reporting the error

+
function

The function reporting the error

+
reason

The reason for the error

+

Trait Implementations

Derived Implementations

impl Eq for OpensslError

impl PartialEq for OpensslError

fn eq(&self, __arg_0: &OpensslError) -> bool

+

fn ne(&self, __arg_0: &OpensslError) -> bool

+

impl Clone for OpensslError

fn clone(&self) -> OpensslError

+

fn clone_from(&mut self, source: &Self)

+

impl Debug for OpensslError

fn fmt(&self, __arg_0: &mut Formatter) -> Result

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/error/enum.SslError.html b/openssl/ssl/error/enum.SslError.html new file mode 100644 index 0000000..d201d68 --- /dev/null +++ b/openssl/ssl/error/enum.SslError.html @@ -0,0 +1,119 @@ + + + + + + + + + + openssl::ssl::error::SslError - Rust + + + + + + + + + + + + + + + +
+

Enum openssl::ssl::error::SslError + + [] + + [src]

+
pub enum SslError {
+    StreamError(Error),
+    SslSessionClosed,
+    OpenSslErrors(Vec<OpensslError>),
+}

An SSL error

+

Variants

+
StreamError

The underlying stream reported an error

+
SslSessionClosed

The SSL session has been closed by the other end

+
OpenSslErrors

An error in the OpenSSL library

+

Methods

impl SslError

fn get() -> SslError

+

Creates a new OpenSslErrors with the current contents of the error +stack.

+

fn from_error(err: c_ulong) -> SslError

+

Creates an SslError from the raw numeric error code.

+

Trait Implementations

impl Display for SslError

fn fmt(&self, fmt: &mut Formatter) -> Result

+

impl Error for SslError

fn description(&self) -> &str

+

fn cause(&self) -> Option<&Error>

+

Derived Implementations

impl Debug for SslError

fn fmt(&self, __arg_0: &mut Formatter) -> Result

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/error/index.html b/openssl/ssl/error/index.html new file mode 100644 index 0000000..8b80ea3 --- /dev/null +++ b/openssl/ssl/error/index.html @@ -0,0 +1,121 @@ + + + + + + + + + + openssl::ssl::error - Rust + + + + + + + + + + + + + + + +
+

Module openssl::ssl::error + + [] + + [src]

+

Reexports

+
pub use self::SslError::*;
pub use self::OpensslError::*;

Enums

+ + + + + + + + + + +
OpensslError +

An error from the OpenSSL library

+ +
SslError +

An SSL error

+ +
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/error/sidebar-items.js b/openssl/ssl/error/sidebar-items.js new file mode 100644 index 0000000..df0c1b7 --- /dev/null +++ b/openssl/ssl/error/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"enum":[["OpensslError","An error from the OpenSSL library"],["SslError","An SSL error"]]}); \ No newline at end of file diff --git a/openssl/ssl/index.html b/openssl/ssl/index.html new file mode 100644 index 0000000..c6441b3 --- /dev/null +++ b/openssl/ssl/index.html @@ -0,0 +1,446 @@ + + + + + + + + + + openssl::ssl - Rust + + + + + + + + + + + + + + + +
+

Module openssl::ssl + + [] + + [src]

+

Modules

+ + + + + +
error + +

Structs

+ + + + + + + + + + + + + + + + + + + + + + + + + +
Ssl + +
SslContext +

An SSL context object

+ +
SslContextOptions + +
SslStream +

A stream wrapper which handles SSL encryption for an underlying stream.

+ +
SslVerifyMode + +

Enums

+ + + + + + + + + + +
MaybeSslStream +

A utility type to help in cases where the use of SSL is decided at runtime.

+ +
SslMethod +

Determines the SSL method supported

+ +

Constants

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
SSL_OP_ALL + +
SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION + +
SSL_OP_CIPHER_SERVER_PREFERENCE + +
SSL_OP_CISCO_ANYCONNECT + +
SSL_OP_COOKIE_EXCHANGE + +
SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS + +
SSL_OP_LEGACY_SERVER_CONNECT + +
SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER + +
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG + +
SSL_OP_NO_COMPRESSION + +
SSL_OP_NO_DTLSV1 + +
SSL_OP_NO_DTLSV1_2 + +
SSL_OP_NO_QUERY_MTU + +
SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION + +
SSL_OP_NO_SSLV2 + +
SSL_OP_NO_SSLV3 + +
SSL_OP_NO_TICKET + +
SSL_OP_NO_TLSV1 + +
SSL_OP_NO_TLSV1_1 + +
SSL_OP_NO_TLSV1_2 + +
SSL_OP_SAFARI_ECDHE_ECDSA_BUG + +
SSL_OP_SINGLE_DH_USE + +
SSL_OP_SINGLE_ECDH_USE + +
SSL_OP_SSLEAY_080_CLIENT_DH_BUG + +
SSL_OP_TLSEXT_PADDING + +
SSL_OP_TLS_BLOCK_PADDING_BUG + +
SSL_OP_TLS_D5_BUG + +
SSL_OP_TLS_ROLLBACK_BUG + +
SSL_VERIFY_FAIL_IF_NO_PEER_CERT +

/// Terminate handshake if client did not return a certificate. +/// Use together with SSL_VERIFY_PEER.

+ +
SSL_VERIFY_NONE +

/// Do not verify the server's certificate

+ +
SSL_VERIFY_PEER +

/// Verify that the server's certificate is trusted

+ +

Type Definitions

+ + + + + + + + + + +
VerifyCallback +

The signature of functions that can be used to manually verify certificates

+ +
VerifyCallbackData +

The signature of functions that can be used to manually verify certificates +when user-data should be carried for all verification process

+ +

Implementations

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/sidebar-items.js b/openssl/ssl/sidebar-items.js new file mode 100644 index 0000000..b5412a6 --- /dev/null +++ b/openssl/ssl/sidebar-items.js @@ -0,0 +1 @@ +initSidebarItems({"constant":[["SSL_OP_ALL",""],["SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION",""],["SSL_OP_CIPHER_SERVER_PREFERENCE",""],["SSL_OP_CISCO_ANYCONNECT",""],["SSL_OP_COOKIE_EXCHANGE",""],["SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS",""],["SSL_OP_LEGACY_SERVER_CONNECT",""],["SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER",""],["SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG",""],["SSL_OP_NO_COMPRESSION",""],["SSL_OP_NO_DTLSV1",""],["SSL_OP_NO_DTLSV1_2",""],["SSL_OP_NO_QUERY_MTU",""],["SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION",""],["SSL_OP_NO_SSLV2",""],["SSL_OP_NO_SSLV3",""],["SSL_OP_NO_TICKET",""],["SSL_OP_NO_TLSV1",""],["SSL_OP_NO_TLSV1_1",""],["SSL_OP_NO_TLSV1_2",""],["SSL_OP_SAFARI_ECDHE_ECDSA_BUG",""],["SSL_OP_SINGLE_DH_USE",""],["SSL_OP_SINGLE_ECDH_USE",""],["SSL_OP_SSLEAY_080_CLIENT_DH_BUG",""],["SSL_OP_TLSEXT_PADDING",""],["SSL_OP_TLS_BLOCK_PADDING_BUG",""],["SSL_OP_TLS_D5_BUG",""],["SSL_OP_TLS_ROLLBACK_BUG",""],["SSL_VERIFY_FAIL_IF_NO_PEER_CERT","/// Terminate handshake if client did not return a certificate. /// Use together with SSL_VERIFY_PEER."],["SSL_VERIFY_NONE","/// Do not verify the server's certificate"],["SSL_VERIFY_PEER","/// Verify that the server's certificate is trusted"]],"enum":[["MaybeSslStream","A utility type to help in cases where the use of SSL is decided at runtime."],["SslMethod","Determines the SSL method supported"]],"mod":[["error",""]],"struct":[["Ssl",""],["SslContext","An SSL context object"],["SslContextOptions",""],["SslStream","A stream wrapper which handles SSL encryption for an underlying stream."],["SslVerifyMode",""]],"type":[["VerifyCallback","The signature of functions that can be used to manually verify certificates"],["VerifyCallbackData","The signature of functions that can be used to manually verify certificates when user-data should be carried for all verification process"]]}); \ No newline at end of file diff --git a/openssl/ssl/struct.Ssl.html b/openssl/ssl/struct.Ssl.html new file mode 100644 index 0000000..336353b --- /dev/null +++ b/openssl/ssl/struct.Ssl.html @@ -0,0 +1,111 @@ + + + + + + + + + + openssl::ssl::Ssl - Rust + + + + + + + + + + + + + + + +
+

Struct openssl::ssl::Ssl + + [] + + [src]

+
pub struct Ssl {
+    // some fields omitted
+}

Methods

impl Ssl

fn new(ctx: &SslContext) -> Result<Ssl, SslError>

+

fn set_hostname(&self, hostname: &str) -> Result<(), SslError>

+

Set the host name to be used with SNI (Server Name Indication).

+

fn get_peer_certificate(&self) -> Option<X509>

+

fn pending(&self) -> usize

+

pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).

+

Trait Implementations

impl Send for Ssl

impl Sync for Ssl

impl Debug for Ssl

fn fmt(&self, fmt: &mut Formatter) -> Result

+

impl Drop for Ssl

fn drop(&mut self)

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/struct.SslContext.html b/openssl/ssl/struct.SslContext.html new file mode 100644 index 0000000..b41db15 --- /dev/null +++ b/openssl/ssl/struct.SslContext.html @@ -0,0 +1,135 @@ + + + + + + + + + + openssl::ssl::SslContext - Rust + + + + + + + + + + + + + + + +
+

Struct openssl::ssl::SslContext + + [] + + [src]

+
pub struct SslContext {
+    // some fields omitted
+}

An SSL context object

+

Methods

impl SslContext

fn new(method: SslMethod) -> Result<SslContext, SslError>

+

Creates a new SSL context.

+

fn set_verify(&mut self, mode: SslVerifyMode, verify: Option<VerifyCallback>)

+

Configures the certificate verification method for new connections.

+

fn set_verify_with_data<T>(&mut self, mode: SslVerifyMode, verify: VerifyCallbackData<T>, data: T) where T: Any + 'static

+

Configures the certificate verification method for new connections also +carrying supplied data.

+

fn set_verify_depth(&mut self, depth: u32)

+

Sets verification depth

+

fn set_read_ahead(&self, m: u32)

+

fn set_CA_file<P: AsRef<Path>>(&mut self, file: P) -> Result<(), SslError>

+

Specifies the file that contains trusted CA certificates.

+

fn set_certificate_file<P: AsRef<Path>>(&mut self, file: P, file_type: X509FileType) -> Result<(), SslError>

+

Specifies the file that contains certificate

+

fn set_certificate(&mut self, cert: &X509) -> Result<(), SslError>

+

Specifies the certificate

+

fn add_extra_chain_cert(&mut self, cert: &X509) -> Result<(), SslError>

+

Adds a certificate to the certificate chain presented together with the +certificate specified using set_certificate()

+

fn set_private_key_file<P: AsRef<Path>>(&mut self, file: P, file_type: X509FileType) -> Result<(), SslError>

+

Specifies the file that contains private key

+

fn set_private_key(&mut self, key: &PKey) -> Result<(), SslError>

+

Specifies the private key

+

fn check_private_key(&mut self) -> Result<(), SslError>

+

Check consistency of private key and certificate

+

fn set_cipher_list(&mut self, cipher_list: &str) -> Result<(), SslError>

+

fn set_options(&mut self, option: SslContextOptions) -> SslContextOptions

+

fn get_options(&mut self) -> SslContextOptions

+

fn clear_options(&mut self, option: SslContextOptions) -> SslContextOptions

+

Trait Implementations

impl Send for SslContext

impl Sync for SslContext

impl Debug for SslContext

fn fmt(&self, fmt: &mut Formatter) -> Result

+

impl Drop for SslContext

fn drop(&mut self)

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/struct.SslContextOptions.html b/openssl/ssl/struct.SslContextOptions.html new file mode 100644 index 0000000..87b1ea8 --- /dev/null +++ b/openssl/ssl/struct.SslContextOptions.html @@ -0,0 +1,152 @@ + + + + + + + + + + openssl::ssl::SslContextOptions - Rust + + + + + + + + + + + + + + + +
+

Struct openssl::ssl::SslContextOptions + + [] + + [src]

+
pub struct SslContextOptions {
+    // some fields omitted
+}

Methods

impl SslContextOptions

fn empty() -> SslContextOptions

+

Returns an empty set of flags.

+

fn all() -> SslContextOptions

+

Returns the set containing all flags.

+

fn bits(&self) -> c_long

+

Returns the raw value of the flags currently stored.

+

fn from_bits(bits: c_long) -> Option<SslContextOptions>

+

Convert from underlying bit representation, unless that +representation contains bits that do not correspond to a flag.

+

fn from_bits_truncate(bits: c_long) -> SslContextOptions

+

Convert from underlying bit representation, dropping any bits +that do not correspond to flags.

+

fn is_empty(&self) -> bool

+

Returns true if no flags are currently stored.

+

fn is_all(&self) -> bool

+

Returns true if all flags are currently set.

+

fn intersects(&self, other: SslContextOptions) -> bool

+

Returns true if there are flags common to both self and other.

+

fn contains(&self, other: SslContextOptions) -> bool

+

Returns true all of the flags in other are contained within self.

+

fn insert(&mut self, other: SslContextOptions)

+

Inserts the specified flags in-place.

+

fn remove(&mut self, other: SslContextOptions)

+

Removes the specified flags in-place.

+

fn toggle(&mut self, other: SslContextOptions)

+

Toggles the specified flags in-place.

+

Trait Implementations

impl Debug for SslContextOptions

fn fmt(&self, f: &mut Formatter) -> Result

+

impl BitOr for SslContextOptions

type Output = SslContextOptions

+

fn bitor(self, other: SslContextOptions) -> SslContextOptions

+

impl BitXor for SslContextOptions

type Output = SslContextOptions

+

fn bitxor(self, other: SslContextOptions) -> SslContextOptions

+

impl BitAnd for SslContextOptions

type Output = SslContextOptions

+

fn bitand(self, other: SslContextOptions) -> SslContextOptions

+

impl Sub for SslContextOptions

type Output = SslContextOptions

+

fn sub(self, other: SslContextOptions) -> SslContextOptions

+

impl Not for SslContextOptions

type Output = SslContextOptions

+

fn not(self) -> SslContextOptions

+

Derived Implementations

impl Hash for SslContextOptions

fn hash<__H: Hasher>(&self, __arg_0: &mut __H)

+

fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher

+

impl Ord for SslContextOptions

fn cmp(&self, __arg_0: &SslContextOptions) -> Ordering

+

impl PartialOrd for SslContextOptions

fn partial_cmp(&self, __arg_0: &SslContextOptions) -> Option<Ordering>

+

fn lt(&self, __arg_0: &SslContextOptions) -> bool

+

fn le(&self, __arg_0: &SslContextOptions) -> bool

+

fn gt(&self, __arg_0: &SslContextOptions) -> bool

+

fn ge(&self, __arg_0: &SslContextOptions) -> bool

+

impl Clone for SslContextOptions

fn clone(&self) -> SslContextOptions

+

fn clone_from(&mut self, source: &Self)

+

impl Eq for SslContextOptions

impl PartialEq for SslContextOptions

fn eq(&self, __arg_0: &SslContextOptions) -> bool

+

fn ne(&self, __arg_0: &SslContextOptions) -> bool

+

impl Copy for SslContextOptions

+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/struct.SslStream.html b/openssl/ssl/struct.SslStream.html new file mode 100644 index 0000000..6e31889 --- /dev/null +++ b/openssl/ssl/struct.SslStream.html @@ -0,0 +1,148 @@ + + + + + + + + + + openssl::ssl::SslStream - Rust + + + + + + + + + + + + + + + +
+

Struct openssl::ssl::SslStream + + [] + + [src]

+
pub struct SslStream<S> {
+    // some fields omitted
+}

A stream wrapper which handles SSL encryption for an underlying stream.

+

Methods

impl SslStream<TcpStream>

fn try_clone(&self) -> Result<SslStream<TcpStream>>

+

Create a new independently owned handle to the underlying socket.

+

impl<S: Read + Write> SslStream<S>

fn new_server_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError>

+

fn new_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError>

+

Attempts to create a new SSL stream from a given Ssl instance.

+

fn new(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError>

+

Creates a new SSL stream

+

fn new_server(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError>

+

Creates a new SSL server stream

+

fn get_ref(&self) -> &S

+

Returns a reference to the underlying stream.

+

fn get_peer_certificate(&self) -> Option<X509>

+

Return the certificate of the peer

+

fn get_mut(&mut self) -> &mut S

+

Returns a mutable reference to the underlying stream.

+ +

Warning

+

It is inadvisable to read from or write to the underlying stream as it +will most likely desynchronize the SSL session.

+

fn get_compression(&self) -> Option<String>

+

Get the compression currently in use. The result will be +either None, indicating no compression is in use, or a string +with the compression name.

+

fn pending(&self) -> usize

+

pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).

+

Trait Implementations

impl<S> Debug for SslStream<S> where S: Debug

fn fmt(&self, fmt: &mut Formatter) -> Result

+

impl<S: Read + Write> Read for SslStream<S>

fn read(&mut self, buf: &mut [u8]) -> Result<usize>

+

fn read_to_end(&mut self, buf: &mut Vec<u8>) -> Result<usize, Error>

+

fn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>

+

fn by_ref(&mut self) -> &mut Self

+

fn bytes(self) -> Bytes<Self>

+

fn chars(self) -> Chars<Self>

+

fn chain<R>(self, next: R) -> Chain<Self, R> where R: Read

+

fn take(self, limit: u64) -> Take<Self>

+

fn tee<W>(self, out: W) -> Tee<Self, W> where W: Write

+

impl<S: Read + Write> Write for SslStream<S>

fn write(&mut self, buf: &[u8]) -> Result<usize>

+

fn flush(&mut self) -> Result<()>

+

fn write_all(&mut self, buf: &[u8]) -> Result<(), Error>

+

fn write_fmt(&mut self, fmt: Arguments) -> Result<(), Error>

+

fn by_ref(&mut self) -> &mut Self

+

fn broadcast<W>(self, other: W) -> Broadcast<Self, W> where W: Write

+

Derived Implementations

impl<S: Clone> Clone for SslStream<S> where S: Clone

fn clone(&self) -> SslStream<S>

+

fn clone_from(&mut self, source: &Self)

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/struct.SslVerifyMode.html b/openssl/ssl/struct.SslVerifyMode.html new file mode 100644 index 0000000..075559f --- /dev/null +++ b/openssl/ssl/struct.SslVerifyMode.html @@ -0,0 +1,152 @@ + + + + + + + + + + openssl::ssl::SslVerifyMode - Rust + + + + + + + + + + + + + + + +
+

Struct openssl::ssl::SslVerifyMode + + [] + + [src]

+
pub struct SslVerifyMode {
+    // some fields omitted
+}

Methods

impl SslVerifyMode

fn empty() -> SslVerifyMode

+

Returns an empty set of flags.

+

fn all() -> SslVerifyMode

+

Returns the set containing all flags.

+

fn bits(&self) -> i32

+

Returns the raw value of the flags currently stored.

+

fn from_bits(bits: i32) -> Option<SslVerifyMode>

+

Convert from underlying bit representation, unless that +representation contains bits that do not correspond to a flag.

+

fn from_bits_truncate(bits: i32) -> SslVerifyMode

+

Convert from underlying bit representation, dropping any bits +that do not correspond to flags.

+

fn is_empty(&self) -> bool

+

Returns true if no flags are currently stored.

+

fn is_all(&self) -> bool

+

Returns true if all flags are currently set.

+

fn intersects(&self, other: SslVerifyMode) -> bool

+

Returns true if there are flags common to both self and other.

+

fn contains(&self, other: SslVerifyMode) -> bool

+

Returns true all of the flags in other are contained within self.

+

fn insert(&mut self, other: SslVerifyMode)

+

Inserts the specified flags in-place.

+

fn remove(&mut self, other: SslVerifyMode)

+

Removes the specified flags in-place.

+

fn toggle(&mut self, other: SslVerifyMode)

+

Toggles the specified flags in-place.

+

Trait Implementations

impl Debug for SslVerifyMode

fn fmt(&self, f: &mut Formatter) -> Result

+

impl BitOr for SslVerifyMode

type Output = SslVerifyMode

+

fn bitor(self, other: SslVerifyMode) -> SslVerifyMode

+

impl BitXor for SslVerifyMode

type Output = SslVerifyMode

+

fn bitxor(self, other: SslVerifyMode) -> SslVerifyMode

+

impl BitAnd for SslVerifyMode

type Output = SslVerifyMode

+

fn bitand(self, other: SslVerifyMode) -> SslVerifyMode

+

impl Sub for SslVerifyMode

type Output = SslVerifyMode

+

fn sub(self, other: SslVerifyMode) -> SslVerifyMode

+

impl Not for SslVerifyMode

type Output = SslVerifyMode

+

fn not(self) -> SslVerifyMode

+

Derived Implementations

impl Hash for SslVerifyMode

fn hash<__H: Hasher>(&self, __arg_0: &mut __H)

+

fn hash_slice<H>(data: &[Self], state: &mut H) where H: Hasher

+

impl Ord for SslVerifyMode

fn cmp(&self, __arg_0: &SslVerifyMode) -> Ordering

+

impl PartialOrd for SslVerifyMode

fn partial_cmp(&self, __arg_0: &SslVerifyMode) -> Option<Ordering>

+

fn lt(&self, __arg_0: &SslVerifyMode) -> bool

+

fn le(&self, __arg_0: &SslVerifyMode) -> bool

+

fn gt(&self, __arg_0: &SslVerifyMode) -> bool

+

fn ge(&self, __arg_0: &SslVerifyMode) -> bool

+

impl Clone for SslVerifyMode

fn clone(&self) -> SslVerifyMode

+

fn clone_from(&mut self, source: &Self)

+

impl Eq for SslVerifyMode

impl PartialEq for SslVerifyMode

fn eq(&self, __arg_0: &SslVerifyMode) -> bool

+

fn ne(&self, __arg_0: &SslVerifyMode) -> bool

+

impl Copy for SslVerifyMode

+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/type.VerifyCallback.html b/openssl/ssl/type.VerifyCallback.html new file mode 100644 index 0000000..8319a1a --- /dev/null +++ b/openssl/ssl/type.VerifyCallback.html @@ -0,0 +1,102 @@ + + + + + + + + + + openssl::ssl::VerifyCallback - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::VerifyCallback + + [] + + [src]

+
type VerifyCallback = fn(preverify_ok: bool, x509_ctx: &X509StoreContext) -> bool;

The signature of functions that can be used to manually verify certificates

+
+ + + + + + + + + + + + + + + \ No newline at end of file diff --git a/openssl/ssl/type.VerifyCallbackData.html b/openssl/ssl/type.VerifyCallbackData.html new file mode 100644 index 0000000..7ca96c4 --- /dev/null +++ b/openssl/ssl/type.VerifyCallbackData.html @@ -0,0 +1,103 @@ + + + + + + + + + + openssl::ssl::VerifyCallbackData - Rust + + + + + + + + + + + + + + + +
+

openssl::ssl::VerifyCallbackData + + [] + + [src]

+
type VerifyCallbackData<T> = fn(preverify_ok: bool, x509_ctx: &X509StoreContext, data: &T) -> bool;

The signature of functions that can be used to manually verify certificates +when user-data should be carried for all verification process

+
+ + + + + + + + + + + + + + + \ No newline at end of file -- cgit v1.2.3