OLD | NEW |
1 /* | 1 /* |
2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
3 * | 3 * |
4 * ***** BEGIN LICENSE BLOCK ***** | 4 * ***** BEGIN LICENSE BLOCK ***** |
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
6 * | 6 * |
7 * The contents of this file are subject to the Mozilla Public License Version | 7 * The contents of this file are subject to the Mozilla Public License Version |
8 * 1.1 (the "License"); you may not use this file except in compliance with | 8 * 1.1 (the "License"); you may not use this file except in compliance with |
9 * the License. You may obtain a copy of the License at | 9 * the License. You may obtain a copy of the License at |
10 * http://www.mozilla.org/MPL/ | 10 * http://www.mozilla.org/MPL/ |
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
135 /* verifying the server's Finished message. This means that we could end up */ | 135 /* verifying the server's Finished message. This means that we could end up */ |
136 /* sending data to an imposter. However, the data will be encrypted and */ | 136 /* sending data to an imposter. However, the data will be encrypted and */ |
137 /* only the true server can derive the session key. Thus, so long as the */ | 137 /* only the true server can derive the session key. Thus, so long as the */ |
138 /* cipher isn't broken this is safe. Because of this, False Start will only */ | 138 /* cipher isn't broken this is safe. Because of this, False Start will only */ |
139 /* occur on RSA or DH ciphersuites where the cipher's key length is >= 80 */ | 139 /* occur on RSA or DH ciphersuites where the cipher's key length is >= 80 */ |
140 /* bits. The advantage of False Start is that it saves a round trip for */ | 140 /* bits. The advantage of False Start is that it saves a round trip for */ |
141 /* client-speaks-first protocols when performing a full handshake. */ | 141 /* client-speaks-first protocols when performing a full handshake. */ |
142 #define SSL_ENABLE_OCSP_STAPLING 23 /* Request OCSP stapling (client) */ | 142 #define SSL_ENABLE_OCSP_STAPLING 23 /* Request OCSP stapling (client) */ |
143 #define SSL_ENABLE_CACHED_INFO 24 /* Enable TLS cached information */ | 143 #define SSL_ENABLE_CACHED_INFO 24 /* Enable TLS cached information */ |
144 /* extension, off by default. */ | 144 /* extension, off by default. */ |
| 145 #define SSL_ENABLE_OB_CERTS 25 /* Enable origin bound certs. */ |
145 | 146 |
146 #ifdef SSL_DEPRECATED_FUNCTION | 147 #ifdef SSL_DEPRECATED_FUNCTION |
147 /* Old deprecated function names */ | 148 /* Old deprecated function names */ |
148 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); | 149 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); |
149 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); | 150 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); |
150 #endif | 151 #endif |
151 | 152 |
152 /* New function names */ | 153 /* New function names */ |
153 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); | 154 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); |
154 SSL_IMPORT SECStatus SSL_OptionGet(PRFileDesc *fd, PRInt32 option, PRBool *on); | 155 SSL_IMPORT SECStatus SSL_OptionGet(PRFileDesc *fd, PRInt32 option, PRBool *on); |
(...skipping 562 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
717 SSLExtensionType extId, | 718 SSLExtensionType extId, |
718 PRBool *yes); | 719 PRBool *yes); |
719 | 720 |
720 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, | 721 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, |
721 PRBool *last_handshake_resumed)
; | 722 PRBool *last_handshake_resumed)
; |
722 | 723 |
723 | 724 |
724 SEC_END_PROTOS | 725 SEC_END_PROTOS |
725 | 726 |
726 #endif /* __ssl_h_ */ | 727 #endif /* __ssl_h_ */ |
OLD | NEW |