Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(913)

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 9982019: Implement RFC 5764 (DTLS-SRTP). (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Avoid goto Created 8 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/ssl/ssl3ext.c » ('j') | net/third_party/nss/ssl/ssl3ext.c » ('J')
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 818 matching lines...) Expand 10 before | Expand all | Expand 10 after
829 * a suitable match and send it if one is found. 829 * a suitable match and send it if one is found.
830 */ 830 */
831 SSL_IMPORT SECStatus 831 SSL_IMPORT SECStatus
832 NSS_GetClientAuthData(void * arg, 832 NSS_GetClientAuthData(void * arg,
833 PRFileDesc * socket, 833 PRFileDesc * socket,
834 struct CERTDistNamesStr * caNames, 834 struct CERTDistNamesStr * caNames,
835 struct CERTCertificateStr ** pRetCert, 835 struct CERTCertificateStr ** pRetCert,
836 struct SECKEYPrivateKeyStr **pRetKey); 836 struct SECKEYPrivateKeyStr **pRetKey);
837 837
838 /* 838 /*
839 ** Configure DTLS-SRTP (RFC 5764) cipher suite preferences.
840 ** Input is a list of ciphers in descending preference order and a length
841 ** of the list. As a side effect, this causes the use_srtp extension to be
842 ** negotiated.
843 */
844 SSL_IMPORT SECStatus SSL_SetSRTPCiphers(PRFileDesc *fd,
845 const PRUint16 *ciphers,
846 unsigned int numCiphers);
847
848 /*
849 ** Get the selected DTLS-SRTP cipher suite (if any).
850 ** To be called after the handshake completes.
851 ** Returns SECFailure if not negotiated.
852 */
853 SSL_IMPORT SECStatus SSL_GetSRTPCipher(PRFileDesc *fd,
854 PRUint16 *cipher);
855
856 /*
839 * Look to see if any of the signers in the cert chain for "cert" are found 857 * Look to see if any of the signers in the cert chain for "cert" are found
840 * in the list of caNames. 858 * in the list of caNames.
841 * Returns SECSuccess if so, SECFailure if not. 859 * Returns SECSuccess if so, SECFailure if not.
842 * Used by NSS_GetClientAuthData. May be used by other callback functions. 860 * Used by NSS_GetClientAuthData. May be used by other callback functions.
843 */ 861 */
844 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, 862 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert,
845 CERTDistNames *caNames); 863 CERTDistNames *caNames);
846 864
847 /* 865 /*
848 * Returns key exchange type of the keys in an SSL server certificate. 866 * Returns key exchange type of the keys in an SSL server certificate.
(...skipping 182 matching lines...) Expand 10 before | Expand all | Expand 10 after
1031 * should continue using the connection. If the application passes a non-zero 1049 * should continue using the connection. If the application passes a non-zero
1032 * value for second argument (error), or if SSL_AuthCertificateComplete returns 1050 * value for second argument (error), or if SSL_AuthCertificateComplete returns
1033 * anything other than SECSuccess, then the application should close the 1051 * anything other than SECSuccess, then the application should close the
1034 * connection. 1052 * connection.
1035 */ 1053 */
1036 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, 1054 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd,
1037 PRErrorCode error); 1055 PRErrorCode error);
1038 SEC_END_PROTOS 1056 SEC_END_PROTOS
1039 1057
1040 #endif /* __ssl_h_ */ 1058 #endif /* __ssl_h_ */
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/ssl/ssl3ext.c » ('j') | net/third_party/nss/ssl/ssl3ext.c » ('J')

Powered by Google App Engine
This is Rietveld 408576698