| OLD | NEW |
| 1 /* | 1 /* |
| 2 * This file is PRIVATE to SSL and should be the first thing included by | 2 * This file is PRIVATE to SSL and should be the first thing included by |
| 3 * any SSL implementation file. | 3 * any SSL implementation file. |
| 4 * | 4 * |
| 5 * ***** BEGIN LICENSE BLOCK ***** | 5 * ***** BEGIN LICENSE BLOCK ***** |
| 6 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 6 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
| 7 * | 7 * |
| 8 * The contents of this file are subject to the Mozilla Public License Version | 8 * The contents of this file are subject to the Mozilla Public License Version |
| 9 * 1.1 (the "License"); you may not use this file except in compliance with | 9 * 1.1 (the "License"); you may not use this file except in compliance with |
| 10 * the License. You may obtain a copy of the License at | 10 * the License. You may obtain a copy of the License at |
| (...skipping 320 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 331 unsigned int fdx : 1; /* 12 */ | 331 unsigned int fdx : 1; /* 12 */ |
| 332 unsigned int v2CompatibleHello : 1; /* 13 */ | 332 unsigned int v2CompatibleHello : 1; /* 13 */ |
| 333 unsigned int detectRollBack : 1; /* 14 */ | 333 unsigned int detectRollBack : 1; /* 14 */ |
| 334 unsigned int noStepDown : 1; /* 15 */ | 334 unsigned int noStepDown : 1; /* 15 */ |
| 335 unsigned int bypassPKCS11 : 1; /* 16 */ | 335 unsigned int bypassPKCS11 : 1; /* 16 */ |
| 336 unsigned int noLocks : 1; /* 17 */ | 336 unsigned int noLocks : 1; /* 17 */ |
| 337 unsigned int enableSessionTickets : 1; /* 18 */ | 337 unsigned int enableSessionTickets : 1; /* 18 */ |
| 338 unsigned int enableDeflate : 1; /* 19 */ | 338 unsigned int enableDeflate : 1; /* 19 */ |
| 339 unsigned int enableRenegotiation : 2; /* 20-21 */ | 339 unsigned int enableRenegotiation : 2; /* 20-21 */ |
| 340 unsigned int requireSafeNegotiation : 1; /* 22 */ | 340 unsigned int requireSafeNegotiation : 1; /* 22 */ |
| 341 unsigned int enableFalseStart : 1; /* 23 */ |
| 341 } sslOptions; | 342 } sslOptions; |
| 342 | 343 |
| 343 typedef enum { sslHandshakingUndetermined = 0, | 344 typedef enum { sslHandshakingUndetermined = 0, |
| 344 sslHandshakingAsClient, | 345 sslHandshakingAsClient, |
| 345 sslHandshakingAsServer | 346 sslHandshakingAsServer |
| 346 } sslHandshakingType; | 347 } sslHandshakingType; |
| 347 | 348 |
| 348 typedef struct sslServerCertsStr { | 349 typedef struct sslServerCertsStr { |
| 349 /* Configuration state for server sockets */ | 350 /* Configuration state for server sockets */ |
| 350 CERTCertificate * serverCert; | 351 CERTCertificate * serverCert; |
| (...skipping 908 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1259 int len, int flags); | 1260 int len, int flags); |
| 1260 | 1261 |
| 1261 extern PRBool ssl_FdIsBlocking(PRFileDesc *fd); | 1262 extern PRBool ssl_FdIsBlocking(PRFileDesc *fd); |
| 1262 | 1263 |
| 1263 extern PRBool ssl_SocketIsBlocking(sslSocket *ss); | 1264 extern PRBool ssl_SocketIsBlocking(sslSocket *ss); |
| 1264 | 1265 |
| 1265 extern void ssl_SetAlwaysBlock(sslSocket *ss); | 1266 extern void ssl_SetAlwaysBlock(sslSocket *ss); |
| 1266 | 1267 |
| 1267 extern SECStatus ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled); | 1268 extern SECStatus ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled); |
| 1268 | 1269 |
| 1270 extern PRBool ssl3_CanFalseStart(sslSocket *ss); |
| 1271 |
| 1269 #define SSL_LOCK_READER(ss) if (ss->recvLock) PZ_Lock(ss->recvLock) | 1272 #define SSL_LOCK_READER(ss) if (ss->recvLock) PZ_Lock(ss->recvLock) |
| 1270 #define SSL_UNLOCK_READER(ss) if (ss->recvLock) PZ_Unlock(ss->recvLock
) | 1273 #define SSL_UNLOCK_READER(ss) if (ss->recvLock) PZ_Unlock(ss->recvLock
) |
| 1271 #define SSL_LOCK_WRITER(ss) if (ss->sendLock) PZ_Lock(ss->sendLock) | 1274 #define SSL_LOCK_WRITER(ss) if (ss->sendLock) PZ_Lock(ss->sendLock) |
| 1272 #define SSL_UNLOCK_WRITER(ss) if (ss->sendLock) PZ_Unlock(ss->sendLock
) | 1275 #define SSL_UNLOCK_WRITER(ss) if (ss->sendLock) PZ_Unlock(ss->sendLock
) |
| 1273 | 1276 |
| 1274 #define ssl_Get1stHandshakeLock(ss) \ | 1277 #define ssl_Get1stHandshakeLock(ss) \ |
| 1275 { if (!ss->opt.noLocks) PZ_EnterMonitor((ss)->firstHandshakeLock); } | 1278 { if (!ss->opt.noLocks) PZ_EnterMonitor((ss)->firstHandshakeLock); } |
| 1276 #define ssl_Release1stHandshakeLock(ss) \ | 1279 #define ssl_Release1stHandshakeLock(ss) \ |
| 1277 { if (!ss->opt.noLocks) PZ_ExitMonitor((ss)->firstHandshakeLock); } | 1280 { if (!ss->opt.noLocks) PZ_ExitMonitor((ss)->firstHandshakeLock); } |
| 1278 #define ssl_Have1stHandshakeLock(ss) \ | 1281 #define ssl_Have1stHandshakeLock(ss) \ |
| (...skipping 366 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1645 #elif defined(_WIN32_WCE) | 1648 #elif defined(_WIN32_WCE) |
| 1646 #define SSL_GETPID GetCurrentProcessId | 1649 #define SSL_GETPID GetCurrentProcessId |
| 1647 #elif defined(WIN32) | 1650 #elif defined(WIN32) |
| 1648 extern int __cdecl _getpid(void); | 1651 extern int __cdecl _getpid(void); |
| 1649 #define SSL_GETPID _getpid | 1652 #define SSL_GETPID _getpid |
| 1650 #else | 1653 #else |
| 1651 #define SSL_GETPID() 0 | 1654 #define SSL_GETPID() 0 |
| 1652 #endif | 1655 #endif |
| 1653 | 1656 |
| 1654 #endif /* __sslimpl_h_ */ | 1657 #endif /* __sslimpl_h_ */ |
| OLD | NEW |