Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(141)

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 9663043: Add a boolean |had_context| argument to the TLS ExportKeyingMaterial (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Make suggested changes, add patch file Created 8 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 774 matching lines...) Expand 10 before | Expand all | Expand 10 after
785 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, 785 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info,
786 PRUintn len); 786 PRUintn len);
787 SSL_IMPORT SECStatus SSL_GetCipherSuiteInfo(PRUint16 cipherSuite, 787 SSL_IMPORT SECStatus SSL_GetCipherSuiteInfo(PRUint16 cipherSuite,
788 SSLCipherSuiteInfo *info, PRUintn len); 788 SSLCipherSuiteInfo *info, PRUintn len);
789 789
790 /* Returnes negotiated through SNI host info. */ 790 /* Returnes negotiated through SNI host info. */
791 SSL_IMPORT SECItem *SSL_GetNegotiatedHostInfo(PRFileDesc *fd); 791 SSL_IMPORT SECItem *SSL_GetNegotiatedHostInfo(PRFileDesc *fd);
792 792
793 /* Export keying material according to RFC 5705. 793 /* Export keying material according to RFC 5705.
794 ** fd must correspond to a TLS 1.0 or higher socket and out must 794 ** fd must correspond to a TLS 1.0 or higher socket and out must
795 ** already be allocated. If contextLen is zero it uses the no-context 795 ** already be allocated. If hasContext is false, it uses the no-context
796 ** construction from the RFC. 796 ** construction from the RFC and ignores the context and contextLen
797 ** arguments.
797 */ 798 */
798 SSL_IMPORT SECStatus SSL_ExportKeyingMaterial(PRFileDesc *fd, 799 SSL_IMPORT SECStatus SSL_ExportKeyingMaterial(PRFileDesc *fd,
799 const char *label, 800 const char *label,
800 unsigned int labelLen, 801 unsigned int labelLen,
802 PRBool hasContext,
801 const unsigned char *context, 803 const unsigned char *context,
802 unsigned int contextLen, 804 unsigned int contextLen,
803 unsigned char *out, 805 unsigned char *out,
804 unsigned int outLen); 806 unsigned int outLen);
805 807
806 /* 808 /*
807 ** Return a new reference to the certificate that was most recently sent 809 ** Return a new reference to the certificate that was most recently sent
808 ** to the peer on this SSL/TLS connection, or NULL if none has been sent. 810 ** to the peer on this SSL/TLS connection, or NULL if none has been sent.
809 */ 811 */
810 SSL_IMPORT CERTCertificate * SSL_LocalCertificate(PRFileDesc *fd); 812 SSL_IMPORT CERTCertificate * SSL_LocalCertificate(PRFileDesc *fd);
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after
927 * should continue using the connection. If the application passes a non-zero 929 * should continue using the connection. If the application passes a non-zero
928 * value for second argument (error), or if SSL_AuthCertificateComplete returns 930 * value for second argument (error), or if SSL_AuthCertificateComplete returns
929 * anything other than SECSuccess, then the application should close the 931 * anything other than SECSuccess, then the application should close the
930 * connection. 932 * connection.
931 */ 933 */
932 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, 934 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd,
933 PRErrorCode error); 935 PRErrorCode error);
934 SEC_END_PROTOS 936 SEC_END_PROTOS
935 937
936 #endif /* __ssl_h_ */ 938 #endif /* __ssl_h_ */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698