Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
| 3 * | 3 * |
| 4 * ***** BEGIN LICENSE BLOCK ***** | 4 * ***** BEGIN LICENSE BLOCK ***** |
| 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
| 6 * | 6 * |
| 7 * The contents of this file are subject to the Mozilla Public License Version | 7 * The contents of this file are subject to the Mozilla Public License Version |
| 8 * 1.1 (the "License"); you may not use this file except in compliance with | 8 * 1.1 (the "License"); you may not use this file except in compliance with |
| 9 * the License. You may obtain a copy of the License at | 9 * the License. You may obtain a copy of the License at |
| 10 * http://www.mozilla.org/MPL/ | 10 * http://www.mozilla.org/MPL/ |
| (...skipping 818 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 829 * a suitable match and send it if one is found. | 829 * a suitable match and send it if one is found. |
| 830 */ | 830 */ |
| 831 SSL_IMPORT SECStatus | 831 SSL_IMPORT SECStatus |
| 832 NSS_GetClientAuthData(void * arg, | 832 NSS_GetClientAuthData(void * arg, |
| 833 PRFileDesc * socket, | 833 PRFileDesc * socket, |
| 834 struct CERTDistNamesStr * caNames, | 834 struct CERTDistNamesStr * caNames, |
| 835 struct CERTCertificateStr ** pRetCert, | 835 struct CERTCertificateStr ** pRetCert, |
| 836 struct SECKEYPrivateKeyStr **pRetKey); | 836 struct SECKEYPrivateKeyStr **pRetKey); |
| 837 | 837 |
| 838 /* | 838 /* |
| 839 ** Configure DTLS-SRTP (RFC 5764) cipher suite preferences. | |
| 840 ** Input is a list of ciphers in descending preference order and a length | |
| 841 ** of the list. As a side effect, this causes the use_srtp extension to be | |
| 842 ** negotiated. | |
| 843 */ | |
| 844 SSL_IMPORT SECStatus SSL_SetSRTPCiphers(PRFileDesc *socket, | |
| 845 const PRUint16 *ciphers, | |
| 846 unsigned int numCiphers); | |
|
wtc
2012/04/20 02:02:13
To enable SSL/TLS cipher suites, one has to call t
ekr
2012/04/26 14:33:42
That seems to be a change consistent with NSS styl
wtc
2012/04/27 01:06:08
I just realized that one disadvantage of the
SSL_C
ekr
2012/04/27 03:36:34
I think it's likely to remain very small; there's
| |
| 847 | |
| 848 /* | |
| 849 ** Get the selected DTLS-SRTP cipher suite (if any). | |
| 850 ** To be called after the handshake completes. | |
| 851 ** Returns SECFailure if not negotiated. | |
| 852 */ | |
| 853 SSL_IMPORT SECStatus SSL_GetSRTPCipher(PRFileDesc *socket, | |
| 854 PRUint16 *cipher); | |
| 855 | |
| 856 /* | |
| 839 * Look to see if any of the signers in the cert chain for "cert" are found | 857 * Look to see if any of the signers in the cert chain for "cert" are found |
| 840 * in the list of caNames. | 858 * in the list of caNames. |
| 841 * Returns SECSuccess if so, SECFailure if not. | 859 * Returns SECSuccess if so, SECFailure if not. |
| 842 * Used by NSS_GetClientAuthData. May be used by other callback functions. | 860 * Used by NSS_GetClientAuthData. May be used by other callback functions. |
| 843 */ | 861 */ |
| 844 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, | 862 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, |
| 845 CERTDistNames *caNames); | 863 CERTDistNames *caNames); |
| 846 | 864 |
| 847 /* | 865 /* |
| 848 * Returns key exchange type of the keys in an SSL server certificate. | 866 * Returns key exchange type of the keys in an SSL server certificate. |
| (...skipping 182 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1031 * should continue using the connection. If the application passes a non-zero | 1049 * should continue using the connection. If the application passes a non-zero |
| 1032 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1050 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
| 1033 * anything other than SECSuccess, then the application should close the | 1051 * anything other than SECSuccess, then the application should close the |
| 1034 * connection. | 1052 * connection. |
| 1035 */ | 1053 */ |
| 1036 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1054 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
| 1037 PRErrorCode error); | 1055 PRErrorCode error); |
| 1038 SEC_END_PROTOS | 1056 SEC_END_PROTOS |
| 1039 | 1057 |
| 1040 #endif /* __ssl_h_ */ | 1058 #endif /* __ssl_h_ */ |
| OLD | NEW |