123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633 |
- -- wolfssl.ads
- --
- -- Copyright (C) 2006-2023 wolfSSL Inc.
- --
- -- This file is part of wolfSSL.
- --
- -- wolfSSL is free software; you can redistribute it and/or modify
- -- it under the terms of the GNU General Public License as published by
- -- the Free Software Foundation; either version 2 of the License, or
- -- (at your option) any later version.
- --
- -- wolfSSL is distributed in the hope that it will be useful,
- -- but WITHOUT ANY WARRANTY; without even the implied warranty of
- -- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- -- GNU General Public License for more details.
- --
- -- You should have received a copy of the GNU General Public License
- -- along with this program; if not, write to the Free Software
- -- Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- --
- with GNAT.Sockets;
- with Interfaces.C;
- -- This package is annotated "with SPARK_Mode" that SPARK can verify
- -- the API of this package is used correctly.
- package WolfSSL with SPARK_Mode is
- type Subprogram_Result is new Integer;
- Success : constant Subprogram_Result;
- Failure : constant Subprogram_Result;
- function Initialize return Subprogram_Result;
- -- Initializes the wolfSSL library for use. Must be called once per
- -- application and before any other call to the library.
- function Finalize return Subprogram_Result;
- -- Un-initializes the wolfSSL library from further use.
- -- Doesn't have to be called, though it will free any resources
- -- used by the library.
- subtype char_array is Interfaces.C.char_array; -- Remove?
- subtype Byte_Type is Interfaces.C.char;
- subtype Byte_Index is Interfaces.C.size_t range 0 .. 16_000;
- subtype Byte_Array is Interfaces.C.char_array;
- type Context_Type is limited private;
- -- Instances of this type are called SSL Contexts.
- function Is_Valid (Context : Context_Type) return Boolean;
- -- Indicates if the SSL Context has successfully been initialized.
- -- If initialized, the SSL Context has allocated resources
- -- that needs to be deallocated before application exit.
- type Method_Type is limited private;
- function TLSv1_2_Server_Method return Method_Type;
- -- This function is used to indicate that the application is a server
- -- and will only support the TLS 1.2 protocol.
- function TLSv1_2_Client_Method return Method_Type;
- -- This function is used to indicate that the application is a client
- -- and will only support the TLS 1.2 protocol.
- function TLSv1_3_Server_Method return Method_Type;
- -- This function is used to indicate that the application is a server
- -- and will only support the TLS 1.3 protocol.
- function TLSv1_3_Client_Method return Method_Type;
- -- This function is used to indicate that the application is a client
- -- and will only support the TLS 1.3 protocol.
- function DTLSv1_2_Server_Method return Method_Type;
- -- This function is used to indicate that the application is a server
- -- and will only support the DTLS 1.2 protocol.
- function DTLSv1_2_Client_Method return Method_Type;
- -- This function is used to indicate that the application is a client
- -- and will only support the DTLS 1.2 protocol.
- function DTLSv1_3_Server_Method return Method_Type;
- -- This function is used to indicate that the application is a server
- -- and will only support the DTLS 1.3 protocol.
- function DTLSv1_3_Client_Method return Method_Type;
- -- This function is used to indicate that the application is a client
- -- and will only support the DTLS 1.3 protocol.
- procedure Create_Context (Method : Method_Type;
- Context : out Context_Type);
- -- This function creates a new SSL context, taking a desired SSL/TLS
- -- protocol method for input.
- -- If successful Is_Valid (Context) = True, otherwise False.
- procedure Free (Context : in out Context_Type) with
- Pre => Is_Valid (Context),
- Post => not Is_Valid (Context);
- -- This function frees an allocated SSL Context object.
- type Mode_Type is private;
- function "or" (Left, Right : Mode_Type) return Mode_Type;
- Verify_None : constant Mode_Type;
- -- Client mode: the client will not verify the certificate received
- -- from the server and the handshake will continue as normal.
- --
- -- Server mode: the server will not send a certificate request to
- -- the client. As such, client verification will not be enabled.
- Verify_Peer : constant Mode_Type;
- -- Client mode: the client will verify the certificate received from
- -- the server during the handshake. This is turned on by default
- -- in wolfSSL, therefore, using this option has no effect.
- --
- -- Server mode: the server will send a certificate request to
- -- the client and verify the client certificate received.
- Verify_Fail_If_No_Peer_Cert : constant Mode_Type;
- -- Client mode: no effect when used on the client side.
- --
- -- Server mode: the verification will fail on the server side if
- -- the client fails to send a certificate when requested to do so
- -- (when using Verify_Peer on the SSL server).
- Verify_Client_Once : constant Mode_Type;
- Verify_Post_Handshake : constant Mode_Type;
- Verify_Fail_Except_Psk : constant Mode_Type;
- -- Client mode: no effect when used on the client side.
- --
- -- Server mode: the verification is the same as
- -- Verify_Fail_If_No_Peer_Cert except in the case of a PSK connection.
- -- If a PSK connection is being made then the connection
- -- will go through without a peer cert.
- Verify_Default : constant Mode_Type;
- procedure Set_Verify (Context : Context_Type;
- Mode : Mode_Type) with
- Pre => Is_Valid (Context);
- -- This function sets the verification method for remote peers
- function Get_Verify (Context : Context_Type) return Mode_Type;
- type File_Format is private;
- Format_Asn1 : constant File_Format;
- Format_Pem : constant File_Format;
- Format_Default : constant File_Format;
- function Use_Certificate_File (Context : Context_Type;
- File : String;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads a certificate file into the SSL context.
- -- The file is provided by the file argument. The format argument
- -- specifies the format type of the file, either ASN1 or
- -- PEM file types. Please see the examples for proper usage.
- function Use_Certificate_Buffer (Context : Context_Type;
- Input : char_array;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads a certificate buffer into the SSL Context.
- -- It behaves like the non-buffered version (Use_Certificate_File),
- -- only differing in its ability to be called with a buffer as input
- -- instead of a file. The buffer is provided by the Input argument.
- -- Format specifies the format type of the buffer; ASN1 or PEM.
- -- Please see the examples for proper usage.
- function Use_Private_Key_File (Context : Context_Type;
- File : String;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads a private key file into the SSL context.
- -- The file is provided by the File argument. The Format argument
- -- specifies the format type of the file - ASN1 or PEM.
- -- Please see the examples for proper usage.
- function Use_Private_Key_Buffer (Context : Context_Type;
- Input : Byte_Array;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads a private key buffer into the SSL Context.
- -- It behaves like the non-buffered version (Use_Private_Key_File),
- -- only differing in its ability to be called with a buffer as input
- -- instead of a file. The buffer is provided by the Input argument.
- -- Format specifies the format type of the buffer; ASN1 or PEM.
- -- Please see the examples for proper usage.
- function Load_Verify_Locations (Context : Context_Type;
- File : String;
- Path : String)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads PEM-formatted CA certificate files into
- -- the SSL context. These certificates will be treated as trusted
- -- root certificates and used to verify certs received from peers
- -- during the SSL handshake. The root certificate file,
- -- provided by the File argument, may be a single certificate or
- -- a file containing multiple certificates. If multiple CA certs
- -- are included in the same file, wolfSSL will load them in the same
- -- order they are presented in the file. The path argument is
- -- a pointer to the name of a directory that contains certificates
- -- of trusted root CAs. If the value of File is not empty "",
- -- path may be specified as "" if not needed. If path is specified
- -- and NO_WOLFSSL_DIR was not defined when building the library,
- -- wolfSSL will load all CA certificates located in the given
- -- directory. This function will attempt to load all files in
- -- the directory. This function expects PEM formatted CERT_TYPE file
- -- with header "--BEGIN CERTIFICATE--".
- function Load_Verify_Buffer (Context : Context_Type;
- Input : Byte_Array;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Context);
- -- This function loads a CA certificate buffer into the SSL
- -- Context. It behaves like the non-buffered version, only differing
- -- in its ability to be called with a buffer as input instead of
- -- a file. The buffer is provided by the Input argument.
- -- Format specifies the format type of the buffer; ASN1 or PEM.
- -- More than one CA certificate may be loaded
- -- per buffer as long as the format is in PEM.
- -- Please see the examples for proper usage.
- type WolfSSL_Type is limited private;
- -- Instances of this type are called SSL Sessions.
- function Is_Valid (Ssl : WolfSSL_Type) return Boolean;
- -- Indicates if the SSL Session has successfully been initialized.
- -- If initialized, the SSL Session has allocated resources
- -- that needs to be deallocated before application exit.
- procedure Create_WolfSSL (Context : Context_Type;
- Ssl : out WolfSSL_Type) with
- Pre => Is_Valid (Context);
- -- This function creates a new SSL session, taking an already created
- -- SSL context as input.
- -- If successful Is_Valid (Ssl) = True, otherwise False.
- function Use_Certificate_File (Ssl : WolfSSL_Type;
- File : String;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function loads a certificate file into the SSL session.
- -- The certificate file is provided by the file argument.
- -- The format argument specifies the format type of the file
- -- either ASN1 or PEM.
- function Use_Certificate_Buffer (Ssl : WolfSSL_Type;
- Input : char_array;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function loads a certificate buffer into the SSL session
- -- object. It behaves like the non-buffered version, only differing
- -- in its ability to be called with a buffer as input instead
- -- of a file. The buffer is provided by the Input argument.
- -- Format specifies the format type of the buffer; ASN1 or PEM.
- -- Please see the examples for proper usage.
- function Use_Private_Key_File (Ssl : WolfSSL_Type;
- File : String;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function loads a private key file into the SSL session.
- -- The key file is provided by the File argument. The Format argument
- -- specifies the format type of the file - ASN1 or PEM.
- function Use_Private_Key_Buffer (Ssl : WolfSSL_Type;
- Input : Byte_Array;
- Format : File_Format)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function loads a private key buffer into the SSL session
- -- object. It behaves like the non-buffered version, only differing
- -- in its ability to be called with a buffer as input instead
- -- of a file. The buffer is provided by the Input argument.
- -- Format specifies the format type of the buffer; ASN1 or PEM.
- -- Please see the examples for proper usage.
- function DTLS_Set_Peer
- (Ssl : WolfSSL_Type;
- Address : GNAT.Sockets.Sock_Addr_Type)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function wraps the corresponding WolfSSL C function to allow
- -- clients to use Ada socket types when implementing a DTLS client.
- function Attach (Ssl : WolfSSL_Type;
- Socket : Integer)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- Attach wolfSSL to the socket.
- --
- -- This function assigns a file descriptor (Socket) as
- -- the input/output facility for the SSL connection.
- -- Typically this will be a socket file descriptor.
- procedure Keep_Arrays (Ssl : WolfSSL_Type) with
- Pre => Is_Valid (Ssl);
- -- Normally, at the end of the SSL handshake, wolfSSL frees
- -- temporary arrays. Calling this function before the handshake
- -- begins will prevent wolfSSL from freeing temporary arrays.
- -- Temporary arrays may be needed for things such as
- -- wolfSSL_get_keys() or PSK hints. When the user is done with
- -- temporary arrays, either Free_Arrays(..) may be called to free
- -- the resources immediately, or alternatively the resources will
- -- be freed when the associated SSL object is freed.
- procedure Free_Arrays (Ssl : WolfSSL_Type) with
- Pre => Is_Valid (Ssl);
- -- Normally, at the end of the SSL handshake, wolfSSL frees temporary
- -- arrays. If Keep_Arrays(..) has been called before the handshake,
- -- wolfSSL will not free temporary arrays. This function explicitly
- -- frees temporary arrays and should be called when the user is done
- -- with temporary arrays and does not want to wait for the SSL object
- -- to be freed to free these resources.
- function Accept_Connection (Ssl : WolfSSL_Type)
- return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- The name of this function is not Accept (..) because the word
- -- "accept" is a reserved keyword in the Ada language.
- --
- -- This function is called on the server side and waits for an
- -- SSL client to initiate the SSL/TLS handshake. When this function
- -- is called, the underlying communication channel has already been
- -- set up. This function works with both blocking and
- -- non-blocking I/O. When the underlying I/O is non-blocking,
- -- Accept_Connection (..) will return when the underlying I/O could
- -- not satisfy the needs of Accept_Connection (..) to continue
- -- the handshake. In this case, a call to Get_Error(..) will
- -- yield either Error_Want_Read or Error_Want_Write.
- -- The calling process must then repeat the call to
- -- Accept_Connection (..) when data is available to read and
- -- wolfSSL will pick up where it left off. When using a
- -- non_blocking socket, nothing needs to be done, but select() can
- -- be used to check for the required condition.
- -- If the underlying I/O is blocking, Accept_Connection (..) will
- -- only return once the handshake has been finished or
- -- an error occurred.
- -- This record type has discriminants with default values to be able
- -- to compile this code under the restriction No Secondary Stack.
- type Read_Result (Success : Boolean := False;
- Last : Byte_Index := Byte_Index'Last) is record
- case Success is
- when True => Buffer : Byte_Array (1 .. Last);
- when False => Code : Subprogram_Result; -- Error code
- end case;
- end record;
- function Read (Ssl : WolfSSL_Type) return Read_Result with
- Pre => Is_Valid (Ssl);
- -- This function reads a number of bytes from the SSL session (ssl)
- -- internal read buffer into the buffer data. The bytes read are
- -- removed from the internal receive buffer.
- -- If necessary Read(..) will negotiate an SSL/TLS session
- -- if the handshake has not already
- -- been performed yet by Connect(..) or Accept_Connection (..).
- -- The SSL/TLS protocol uses SSL records which have a maximum size
- -- of 16kB (the max record size can be controlled by the
- -- MAX_RECORD_SIZE define in /wolfssl/internal.h). As such, wolfSSL
- -- needs to read an entire SSL record internally before it is able
- -- to process and decrypt the record. Because of this, a call to
- -- Read(..) will only be able to return the maximum buffer
- -- size which has been decrypted at the time of calling. There may
- -- be additional not-yet-decrypted data waiting in the internal
- -- wolfSSL receive buffer which will be retrieved and decrypted with
- -- the next call to Read(..).
- -- This record type has discriminants with default values to be able
- -- to compile this code under the restriction No Secondary Stack.
- type Write_Result (Success : Boolean := False) is record
- case Success is
- when True => Bytes_Written : Byte_Index;
- when False => Code : Subprogram_Result; -- Error code
- end case;
- end record;
- function Write (Ssl : WolfSSL_Type;
- Data : Byte_Array) return Write_Result with
- Pre => Is_Valid (Ssl);
- -- The number of bytes written is returned.
- -- This function writes bytes from the buffer, Data,
- -- to the SSL connection, ssl. If necessary, Write(..) will
- -- negotiate an SSL/TLS session if the handshake has not already
- -- been performed yet by Connect(..) or Accept_Connection(..).
- -- Write(..) works with both blocking and non-blocking I/O.
- -- When the underlying I/O is non-blocking, Write(..) will return
- -- when the underlying I/O could not satisfy the needs of Write(..)
- -- to continue. In this case, a call to Get_Error(..) will
- -- yield either Error_Want_Read or Error_Want_Write.
- -- The calling process must then repeat the call to Write(..)
- -- when the underlying I/O is ready. If the underlying I/O is
- -- blocking, Write(..) will only return once the buffer data
- -- has been completely written or an error occurred.
- function Shutdown (Ssl : WolfSSL_Type) return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function shuts down an active SSL/TLS connection using
- -- the SSL session, ssl. This function will try to send a
- -- "close notify" alert to the peer. The calling application can
- -- choose to wait for the peer to send its "close notify" alert
- -- in response or just go ahead and shut down the underlying
- -- connection after directly calling wolfSSL_shutdown (to save
- -- resources). Either option is allowed by the TLS specification.
- -- If the underlying connection will be used again in the future,
- -- the complete two_directional shutdown procedure must be performed
- -- to keep synchronization intact between the peers.
- -- Shutdown(..) works with both blocking and non_blocking I/O.
- -- When the underlying I/O is non_blocking, Shutdown(..) will
- -- return an error if the underlying I/O could not satisfy the needs
- -- of Shutdown(..) to continue. In this case, a call to
- -- Get_Error(..) will yield either Error_Want_Read or
- -- Error_Want_Write. The calling process must then repeat
- -- the call to Shutdown() when the underlying I/O is ready.
- procedure Free (Ssl : in out WolfSSL_Type) with
- Pre => Is_Valid (Ssl),
- Post => not Is_Valid (Ssl);
- -- Frees the resources allocated by the SSL session object.
- function Connect (Ssl : WolfSSL_Type) return Subprogram_Result with
- Pre => Is_Valid (Ssl);
- -- This function is called on the client side and initiates
- -- an SSL/TLS handshake with a server. When this function is called,
- -- the underlying communication channel has already been set up.
- -- Connect(..) works with both blocking and non_blocking I/O.
- -- When the underlying I/O is non_blocking, Connect(..) will
- -- return when the underlying I/O could not satisfy the needs
- -- of wolfSSL_connect to continue the handshake. In this case,
- -- a call to Get_Error(..) will yield either
- -- Error_Want_Read or SSL_ERROR_WANT_WRITE. The calling process
- -- must then repeat the call to Connect(..) when
- -- the underlying I/O is ready and wolfSSL will pick up where
- -- it left off. When using a non_blocking socket, nothing needs
- -- to be done, but select() can be used to check for the required
- -- condition. If the underlying I/O is blocking, Connect(..)
- -- will only return once the handshake has been finished or an error
- -- occurred. wolfSSL takes a different approach to certificate
- -- verification than OpenSSL does. The default policy for the client
- -- is to verify the server, this means that if you don't load CAs
- -- to verify the server you'll get a connect error,
- -- unable to verify. It you want to mimic OpenSSL behavior
- -- of having SSL_connect succeed even if verifying the server fails
- -- and reducing security you can do this by calling:
- -- Set_Verify (Ctx, Verify_None, 0); before calling
- -- Create_WolfSSL(...); Though it's not recommended.
- type Error_Code is new Integer;
- Error_Want_Read : constant Error_Code;
- Error_Want_Write : constant Error_Code;
- function Get_Error (Ssl : WolfSSL_Type;
- Result : Subprogram_Result) return Error_Code;
- -- This function returns a unique error code describing why
- -- the previous API function call (Connect, Accept_Connection,
- -- Read, Write, etc.) resulted in an error return code.
- -- After Get_Error is called and returns the unique error code,
- -- wolfSSL_ERR_error_string() may be called to get a human readable
- -- error string.
- subtype Error_Message_Index is Natural range 0 .. 80;
- -- The default error message length is 80 in WolfSSL unless
- -- configured to another value. See the result
- -- of the Max_Error_Size function.
- type Error_Message (Last : Error_Message_Index := 0) is record
- Text : String (1 .. Last);
- end record;
- function Error (Code : Error_Code) return Error_Message;
- -- This function converts an error code returned by Get_Error(..)
- -- into a more human readable error string. Code is the error code
- -- returned by Get_error(). The maximum length of error strings is
- -- 80 characters by default, as defined by MAX_ERROR_SZ
- -- is wolfssl/wolfcrypt/error.h.
- function Max_Error_Size return Natural;
- -- Returns the value of the defined MAX_ERROR_SZ integer
- -- in wolfssl/wolfcrypt/error.h.
- private
- pragma SPARK_Mode (Off);
- subtype int is Interfaces.C.int; use type int;
- type Opaque_Method is limited null record;
- type Opaque_Context is limited null record;
- type Opaque_WolfSSL is limited null record;
- -- Access-to-object types with convention C uses the same amount of
- -- memory for storing pointers as is done in the C programming
- -- language. The following access type definitions are used in
- -- the Ada binding to the WolfSSL library:
- type Context_Type is access Opaque_Context with Convention => C;
- type Method_Type is access Opaque_Method with Convention => C;
- type WolfSSL_Type is access Opaque_WolfSSL with Convention => C;
- subtype Unsigned_32 is Interfaces.Unsigned_32; use type Unsigned_32;
- type Mode_Type is new Unsigned_32;
- -- The following imported subprograms are used to initialize
- -- the constants defined in the public part of this package
- -- specification. They cannot therefore be moved to the body
- -- of this package.
- function WolfSSL_Verify_None return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_none",
- Import => True;
- function WolfSSL_Verify_Peer return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_peer",
- Import => True;
- function WolfSSL_Verify_Fail_If_No_Peer_Cert return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_fail_if_no_peer_cert",
- Import => True;
- function WolfSSL_Verify_Client_Once return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_client_once",
- Import => True;
- function WolfSSL_Verify_Post_Handshake return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_post_handshake",
- Import => True;
- function WolfSSL_Verify_Fail_Except_Psk return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_fail_except_psk",
- Import => True;
- function WolfSSL_Verify_Default return int with
- Convention => C,
- External_Name => "get_wolfssl_verify_default",
- Import => True;
- Verify_None : constant Mode_Type := Mode_Type (WolfSSL_Verify_None);
- Verify_Peer : constant Mode_Type := Mode_Type (WolfSSL_Verify_Peer);
- Verify_Fail_If_No_Peer_Cert : constant Mode_Type :=
- Mode_Type (WolfSSL_Verify_Fail_If_No_Peer_Cert);
- Verify_Client_Once : constant Mode_Type :=
- Mode_Type (WolfSSL_Verify_Client_Once);
- Verify_Post_Handshake : constant Mode_Type :=
- Mode_Type (WolfSSL_Verify_Post_Handshake);
- Verify_Fail_Except_Psk : constant Mode_Type :=
- Mode_Type (WolfSSL_Verify_Fail_Except_Psk);
- Verify_Default : constant Mode_Type :=
- Mode_Type (WolfSSL_Verify_Default);
- type File_Format is new Unsigned_32;
- function WolfSSL_Filetype_Asn1 return int with
- Convention => C,
- External_Name => "get_wolfssl_filetype_asn1",
- Import => True;
- function WolfSSL_Filetype_Pem return int with
- Convention => C,
- External_Name => "get_wolfssl_filetype_pem",
- Import => True;
- function WolfSSL_Filetype_Default return int with
- Convention => C,
- External_Name => "get_wolfssl_filetype_default",
- Import => True;
- Format_Asn1 : constant File_Format :=
- File_Format (WolfSSL_Filetype_Asn1);
- Format_Pem : constant File_Format :=
- File_Format (WolfSSL_Filetype_Pem);
- Format_Default : constant File_Format :=
- File_Format (WolfSSL_Filetype_Default);
- function Get_WolfSSL_Success return int with
- Convention => C,
- External_Name => "get_wolfssl_success",
- Import => True;
- function Get_WolfSSL_Failure return int with
- Convention => C,
- External_Name => "get_wolfssl_failure",
- Import => True;
- Success : constant Subprogram_Result :=
- Subprogram_Result (Get_WolfSSL_Success);
- Failure : constant Subprogram_Result :=
- Subprogram_Result (Get_WolfSSL_Failure);
- function Get_WolfSSL_Error_Want_Read return int with
- Convention => C,
- External_Name => "get_wolfssl_error_want_read",
- Import => True;
- function Get_WolfSSL_Error_Want_Write return int with
- Convention => C,
- External_Name => "get_wolfssl_error_want_write",
- Import => True;
- Error_Want_Read : constant Error_Code :=
- Error_Code (Get_WolfSSL_Error_Want_Read);
- Error_Want_Write : constant Error_Code :=
- Error_Code (Get_WolfSSL_Error_Want_Write);
- end WolfSSL;
|