Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(109)

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 9764001: Add DTLS support to NSS, contributed by Eric Rescorla. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Made one pass, dtls1con.c not reviewed yet Created 8 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after
73 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */ 73 /* Macro to tell which ciphers in table are SSL2 vs SSL3/TLS. */
74 #define SSL_IS_SSL2_CIPHER(which) (((which) & 0xfff0) == 0xff00) 74 #define SSL_IS_SSL2_CIPHER(which) (((which) & 0xfff0) == 0xff00)
75 75
76 /* 76 /*
77 ** Imports fd into SSL, returning a new socket. Copies SSL configuration 77 ** Imports fd into SSL, returning a new socket. Copies SSL configuration
78 ** from model. 78 ** from model.
79 */ 79 */
80 SSL_IMPORT PRFileDesc *SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd); 80 SSL_IMPORT PRFileDesc *SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd);
81 81
82 /* 82 /*
83 ** Imports fd into DTLS, returning a new socket. Copies DTLS configuration
84 ** from model.
85 */
86 SSL_IMPORT PRFileDesc *DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd);
87
88 /*
83 ** Enable/disable an ssl mode 89 ** Enable/disable an ssl mode
84 ** 90 **
85 ** SSL_SECURITY: 91 ** SSL_SECURITY:
86 ** enable/disable use of SSL security protocol before connect 92 ** enable/disable use of SSL security protocol before connect
87 ** 93 **
88 ** SSL_SOCKS: 94 ** SSL_SOCKS:
89 ** enable/disable use of socks before connect 95 ** enable/disable use of socks before connect
90 ** (No longer supported). 96 ** (No longer supported).
91 ** 97 **
92 ** SSL_REQUEST_CERTIFICATE: 98 ** SSL_REQUEST_CERTIFICATE:
(...skipping 842 matching lines...) Expand 10 before | Expand all | Expand 10 after
935 ** Output parameter valid only if function returns SECSuccess 941 ** Output parameter valid only if function returns SECSuccess
936 */ 942 */
937 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, 943 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket,
938 SSLExtensionType extId, 944 SSLExtensionType extId,
939 PRBool *yes); 945 PRBool *yes);
940 946
941 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, 947 SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd,
942 PRBool *last_handshake_resumed) ; 948 PRBool *last_handshake_resumed) ;
943 949
944 /* 950 /*
951 ** How long should we wait before retransmitting the next flight of
952 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a
953 ** handshake.
954 */
955 SSL_IMPORT SECStatus DTLS_GetTimeout(PRFileDesc *socket,
wtc 2012/03/21 23:12:16 Nit: DTLS_GetTimeout => DTLS_GetHandshakeTimeout?
ekr 2012/03/22 15:07:17 That would be fine with me.
956 PRIntervalTime *timeout);
957
958 /*
945 * Return a boolean that indicates whether the underlying library 959 * Return a boolean that indicates whether the underlying library
946 * will perform as the caller expects. 960 * will perform as the caller expects.
947 * 961 *
948 * The only argument is a string, which should be the version 962 * The only argument is a string, which should be the version
949 * identifier of the NSS library. That string will be compared 963 * identifier of the NSS library. That string will be compared
950 * against a string that represents the actual build version of 964 * against a string that represents the actual build version of
951 * the SSL library. It also invokes the version checking functions 965 * the SSL library. It also invokes the version checking functions
952 * of the dependent libraries such as NSPR. 966 * of the dependent libraries such as NSPR.
953 */ 967 */
954 extern PRBool NSSSSL_VersionCheck(const char *importedVersion); 968 extern PRBool NSSSSL_VersionCheck(const char *importedVersion);
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after
1017 * should continue using the connection. If the application passes a non-zero 1031 * should continue using the connection. If the application passes a non-zero
1018 * value for second argument (error), or if SSL_AuthCertificateComplete returns 1032 * value for second argument (error), or if SSL_AuthCertificateComplete returns
1019 * anything other than SECSuccess, then the application should close the 1033 * anything other than SECSuccess, then the application should close the
1020 * connection. 1034 * connection.
1021 */ 1035 */
1022 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, 1036 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd,
1023 PRErrorCode error); 1037 PRErrorCode error);
1024 SEC_END_PROTOS 1038 SEC_END_PROTOS
1025 1039
1026 #endif /* __ssl_h_ */ 1040 #endif /* __ssl_h_ */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698