Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
| 3 * | 3 * |
| 4 * ***** BEGIN LICENSE BLOCK ***** | 4 * ***** BEGIN LICENSE BLOCK ***** |
| 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
| 6 * | 6 * |
| 7 * The contents of this file are subject to the Mozilla Public License Version | 7 * The contents of this file are subject to the Mozilla Public License Version |
| 8 * 1.1 (the "License"); you may not use this file except in compliance with | 8 * 1.1 (the "License"); you may not use this file except in compliance with |
| 9 * the License. You may obtain a copy of the License at | 9 * the License. You may obtain a copy of the License at |
| 10 * http://www.mozilla.org/MPL/ | 10 * http://www.mozilla.org/MPL/ |
| (...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 73 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */ | 73 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */ |
| 74 #define SSL_IS_SSL2_CIPHER(which) (((which) & 0xfff0) == 0xff00) | 74 #define SSL_IS_SSL2_CIPHER(which) (((which) & 0xfff0) == 0xff00) |
| 75 | 75 |
| 76 /* | 76 /* |
| 77 ** Imports fd into SSL, returning a new socket. Copies SSL configuration | 77 ** Imports fd into SSL, returning a new socket. Copies SSL configuration |
| 78 ** from model. | 78 ** from model. |
| 79 */ | 79 */ |
| 80 SSL_IMPORT PRFileDesc *SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd); | 80 SSL_IMPORT PRFileDesc *SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd); |
| 81 | 81 |
| 82 /* | 82 /* |
| 83 ** Imports fd into DTLS, returning a new socket. Copies DTLS configuration | |
| 84 ** from model. | |
| 85 */ | |
| 86 SSL_IMPORT PRFileDesc *DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd); | |
| 87 | |
| 88 /* | |
| 83 ** Enable/disable an ssl mode | 89 ** Enable/disable an ssl mode |
| 84 ** | 90 ** |
| 85 ** SSL_SECURITY: | 91 ** SSL_SECURITY: |
| 86 ** enable/disable use of SSL security protocol before connect | 92 ** enable/disable use of SSL security protocol before connect |
| 87 ** | 93 ** |
| 88 ** SSL_SOCKS: | 94 ** SSL_SOCKS: |
| 89 ** enable/disable use of socks before connect | 95 ** enable/disable use of socks before connect |
| 90 ** (No longer supported). | 96 ** (No longer supported). |
| 91 ** | 97 ** |
| 92 ** SSL_REQUEST_CERTIFICATE: | 98 ** SSL_REQUEST_CERTIFICATE: |
| (...skipping 842 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 935 ** Output parameter valid only if function returns SECSuccess | 941 ** Output parameter valid only if function returns SECSuccess |
| 936 */ | 942 */ |
| 937 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, | 943 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, |
| 938 SSLExtensionType extId, | 944 SSLExtensionType extId, |
| 939 PRBool *yes); | 945 PRBool *yes); |
| 940 | 946 |
| 941 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, | 947 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, |
| 942 PRBool *last_handshake_resumed) ; | 948 PRBool *last_handshake_resumed) ; |
| 943 | 949 |
| 944 /* | 950 /* |
| 951 ** How long should we wait before retransmitting the next flight of | |
| 952 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a | |
| 953 ** handshake. | |
| 954 */ | |
| 955 SSL_IMPORT SECStatus DTLS_GetTimeout(PRFileDesc *socket, | |
|
wtc
2012/03/21 23:12:16
Nit: DTLS_GetTimeout => DTLS_GetHandshakeTimeout?
ekr
2012/03/22 15:07:17
That would be fine with me.
| |
| 956 PRIntervalTime *timeout); | |
| 957 | |
| 958 /* | |
| 945 * Return a boolean that indicates whether the underlying library | 959 * Return a boolean that indicates whether the underlying library |
| 946 * will perform as the caller expects. | 960 * will perform as the caller expects. |
| 947 * | 961 * |
| 948 * The only argument is a string, which should be the version | 962 * The only argument is a string, which should be the version |
| 949 * identifier of the NSS library. That string will be compared | 963 * identifier of the NSS library. That string will be compared |
| 950 * against a string that represents the actual build version of | 964 * against a string that represents the actual build version of |
| 951 * the SSL library. It also invokes the version checking functions | 965 * the SSL library. It also invokes the version checking functions |
| 952 * of the dependent libraries such as NSPR. | 966 * of the dependent libraries such as NSPR. |
| 953 */ | 967 */ |
| 954 extern PRBool NSSSSL_VersionCheck(const char *importedVersion); | 968 extern PRBool NSSSSL_VersionCheck(const char *importedVersion); |
| (...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1017 * should continue using the connection. If the application passes a non-zero | 1031 * should continue using the connection. If the application passes a non-zero |
| 1018 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1032 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
| 1019 * anything other than SECSuccess, then the application should close the | 1033 * anything other than SECSuccess, then the application should close the |
| 1020 * connection. | 1034 * connection. |
| 1021 */ | 1035 */ |
| 1022 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1036 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
| 1023 PRErrorCode error); | 1037 PRErrorCode error); |
| 1024 SEC_END_PROTOS | 1038 SEC_END_PROTOS |
| 1025 | 1039 |
| 1026 #endif /* __ssl_h_ */ | 1040 #endif /* __ssl_h_ */ |
| OLD | NEW |