Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(157)

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 6804032: Add TLS-SRP (RFC 5054) support Base URL: http://git.chromium.org/git/chromium.git@trunk
Patch Set: use system srp and mpi libs, not local copies Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 419 matching lines...) Expand 10 before | Expand all | Expand 10 after
430 */ 430 */
431 SSL_IMPORT PRFileDesc *SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd); 431 SSL_IMPORT PRFileDesc *SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd);
432 432
433 /* 433 /*
434 * Set the client side argument for SSL to retrieve PKCS #11 pin. 434 * Set the client side argument for SSL to retrieve PKCS #11 pin.
435 * fd - the file descriptor for the connection in question 435 * fd - the file descriptor for the connection in question
436 * a - pkcs11 application specific data 436 * a - pkcs11 application specific data
437 */ 437 */
438 SSL_IMPORT SECStatus SSL_SetPKCS11PinArg(PRFileDesc *fd, void *a); 438 SSL_IMPORT SECStatus SSL_SetPKCS11PinArg(PRFileDesc *fd, void *a);
439 439
440
441 /*
442 * Set the client side user name and password non-interactively.
443 */
444 SSL_IMPORT SECStatus SSL_SetUserLogin(PRFileDesc *fd,
445 const char *u,
446 const char *p);
447
448 /*
449 * This sets the client side callback for SSL to retrieve the user password.
450 * fd - the file descriptor for the connection in question
451 * func - callback function pointer
452 * pw - user password
453 */
454
455 typedef SECStatus (PR_CALLBACK *SSLUserPasswdCB)(PRFileDesc *fd,
456 SECItem *pw, void *arg);
457
458 SSL_IMPORT SECStatus SSL_UserPasswdHook(PRFileDesc *fd, SSLUserPasswdCB func,
459 void *arg);
460
461 /*
462 * This sets the server side callback function for SSL to retrieve the SRP
463 * authentication parameters associated with a specific user login.
464 * fd - the file descriptor of the connection
465 * func - pointer to the callback function
466 * user - username to lookup in app database
467 * srp - SRP auth paramters supplied to SSL by app
468 */
469
470 typedef SECStatus (PR_CALLBACK *SSLGetSRPParamsCB)(PRFileDesc *fd,
471 SECKEYSRPParams *srp,
472 void *arg);
473
474 SSL_IMPORT SECStatus SSL_GetSRPParamsHook(PRFileDesc *fd,
475 SSLGetSRPParamsCB func, void *arg);
476
440 /* 477 /*
441 ** This is a callback for dealing with server certs that are not authenticated 478 ** This is a callback for dealing with server certs that are not authenticated
442 ** by the client. The client app can decide that it actually likes the 479 ** by the client. The client app can decide that it actually likes the
443 ** cert by some external means and restart the connection. 480 ** cert by some external means and restart the connection.
444 */ 481 */
445 typedef SECStatus (PR_CALLBACK *SSLBadCertHandler)(void *arg, PRFileDesc *fd); 482 typedef SECStatus (PR_CALLBACK *SSLBadCertHandler)(void *arg, PRFileDesc *fd);
446 SSL_IMPORT SECStatus SSL_BadCertHook(PRFileDesc *fd, SSLBadCertHandler f, 483 SSL_IMPORT SECStatus SSL_BadCertHook(PRFileDesc *fd, SSLBadCertHandler f,
447 void *arg); 484 void *arg);
448 485
449 /* 486 /*
(...skipping 246 matching lines...) Expand 10 before | Expand all | Expand 10 after
696 * nation of France will permit to be imported into their country. 733 * nation of France will permit to be imported into their country.
697 * See documentation for the list. 734 * See documentation for the list.
698 */ 735 */
699 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); 736 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void);
700 737
701 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); 738 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void);
702 739
703 /* Report more information than SSL_SecurityStatus. 740 /* Report more information than SSL_SecurityStatus.
704 ** Caller supplies the info struct. Function fills it in. 741 ** Caller supplies the info struct. Function fills it in.
705 */ 742 */
743 SSL_IMPORT SECStatus SSL_GetChannelUsername(PRFileDesc *fd, SECItem *user);
706 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, 744 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info,
707 PRUintn len); 745 PRUintn len);
708 SSL_IMPORT SECStatus SSL_GetCipherSuiteInfo(PRUint16 cipherSuite, 746 SSL_IMPORT SECStatus SSL_GetCipherSuiteInfo(PRUint16 cipherSuite,
709 SSLCipherSuiteInfo *info, PRUintn len); 747 SSLCipherSuiteInfo *info, PRUintn len);
710 748
711 /* Returnes negotiated through SNI host info. */ 749 /* Returnes negotiated through SNI host info. */
712 SSL_IMPORT SECItem *SSL_GetNegotiatedHostInfo(PRFileDesc *fd); 750 SSL_IMPORT SECItem *SSL_GetNegotiatedHostInfo(PRFileDesc *fd);
713 751
714 /* 752 /*
715 ** Return a new reference to the certificate that was most recently sent 753 ** Return a new reference to the certificate that was most recently sent
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
752 ** Did the handshake with the peer negotiate the given extension? 790 ** Did the handshake with the peer negotiate the given extension?
753 ** Output parameter valid only if function returns SECSuccess 791 ** Output parameter valid only if function returns SECSuccess
754 */ 792 */
755 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, 793 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket,
756 SSLExtensionType extId, 794 SSLExtensionType extId,
757 PRBool *yes); 795 PRBool *yes);
758 796
759 SEC_END_PROTOS 797 SEC_END_PROTOS
760 798
761 #endif /* __ssl_h_ */ 799 #endif /* __ssl_h_ */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698